-------- Original Message --------
Call for Papers
InTrust 2012: 4th International conference on Trusted Systems
17th-19th December 2012, London, UK
www.intrust2012.com
Building on the success of INTRUST 2009, 2010 and 2011 (all of
which were held in Beijing), this conference focuses on the
theory, technologies and applications of trusted systems. It
is devoted to all aspects of trusted computing systems,
including trusted modules, platforms, networks, services and
applications, from their fundamental features and
functionalities to design principles, architecture and
implementation technologies. The goal of the conference is to
bring academic and industrial researchers, designers, and
implementers together with end-users of trusted systems, in
order to foster the exchange of ideas in this challenging and
fruitful area. The conference will be hosted by the
Information Security Group at Royal Holloway, University of
London. INTRUST 2012 solicits original papers on any aspect of
the theory, advanced development and applications of trusted
computing, trustworthy systems and general trust issues in
modern computing systems.
Submissions must not substantially duplicate work that any of
the authors have published elsewhere or have submitted in
parallel to any journal or other conference or workshop that
has proceedings. Submissions will take place entirely via a
web system. All submissions will be blind-reviewed. Papers
must be anonymous, with no author names, affiliations,
acknowledgements, or obvious references. A submitted paper
should begin with a title, a short abstract, and a list of
keywords.
As was the case for INTRUST 2009 (LNCS 6163), INTRUST 2010
(LNCS 6802) and INTRUST 2011 (LNCS, to appear), it is
anticipated that the proceedings of INTRUST 2012 will be
published in the Springer-Verlag Lecture Notes in Computer
Science series. Unlike previous editions of this conference, it
is intended that the proceedings will be available at the
conference. Papers published in the LNCS series are indexed by
both EI and ISTP.
Clear instructions for the preparation of a final proceedings
version will be sent to the authors of accepted papers. Authors
are strongly recommended to submit their papers in the standard
LNCS format (see
http://www.springer.com/computer/lncs?SGWID=0-164-0-0-0
for details), with length at most 15 pages (excluding
bibliography and appendices). Committee members are not
required to review more pages than this, so papers should be
intelligible within this length. Submissions not meeting these
guidelines risk rejection without consideration of their
merits. Authors of accepted papers must guarantee that their
paper will be presented at the conference.
Papers must be submitted using the EasyChair conference
management system at:
https://www.easychair.org//conferences/?conf=intrust2012
Please send any enquiries to:
webmaster@intrust2012.com
The conference has a best paper award to the value of US$1,000,
sponsored by Singapore Management University; all papers are
eligible for this award.
Topics of relevance include but are not limited to:
Fundamental features and functionalities of trusted systems
Primitives and mechanisms for building a chain of trust
Design principles and architectures for trusted modules and
platforms
Implementation technologies for trusted modules and platforms
Cryptographic aspects of trusted systems, including
cryptographic algorithms and protocols, and their
implementation and application in trusted systems
Scalable safe network operation in trusted systems
Mobile trusted systems, including trusted mobile
platforms, sensor networks, mobile (ad hoc) networks,
peer-to-peer networks, Bluetooth, etc.
Storage aspects of trusted systems
Applications of trusted systems, e.g. trusted email,
web services and e-commerce services
Trustworthy infrastructures and cloud computing services
Trusted intellectual property protection: metering,
watermarking, digital rights management and enterprise
rights management
Software protection for trusted systems
Hardware security for trusted systems
Authentication and access control for trusted systems
Key, identity & certificate management for trusted
systems
Privacy aspects of trusted systems
Attestation for trusted systems, including measurement
and verification of the behaviour of trusted systems
Standards organisations and their contributions to
trusted systems, e.g. TCG, ISO/IEC, IEEE 802.11
Emerging technologies for trusted systems, e.g. RFID,
memory spots, smart cards
Trust metrics and robust trust inference in distributed
systems
Usability and reliability aspects of trusted systems
Trust modeling, economic analysis and protocol design
for rational and malicious adversaries
Virtualisation for trusted systems
Limitations of trusted systems
Security analysis of trusted systems, including formal
methods proofs, provable security and automated analysis
Security policies for, and management of, trusted systems
Intrusion resilience and revocation aspects of trusted
systems
Scalability aspects of trusted systems
Compatibility aspects of trusted systems
Experiences in building real-world trusted systems
Socio-economic aspects of trusted systems
Key dates
Deadline for submissions: Friday 13 July 2012
Notifications to authors: Friday 24 August 2012
Camera ready due: Friday 28 September 2012
Opening of conference: Monday 17 December 2012
Conference organisation
Honorary Chairs
Yongfei Han, BJUT & ONETS, China
Moti Yung, Google & Columbia University, USA
General Chairs
Liqun Chen, HP Laboratories, UK
Chris Mitchell, RHUL, UK
Allan Tomlinson, RHUL, UK
Programme Committee Chairs
Chris Mitchell, RHUL, UK
Allan Tomlinson, RHUL, UK
Programme Committee
Feng Bao, I2R, Singapore
Haibo Chen, Shanghai Jiao Tong University, China
Zhong Chen, Peking University, China
Kurt Dietrich, Graz University of Technology, Austria
Xuhua Ding, Singapore Management University, Singapore
Loic Duflot, SGDN, France
Dieter Gollmann, Hamburg University of Technology, Germany
David Grawrock, Intel, USA
Sigrid Guergens, Fraunhofer Institute for Secure Information Technology,
Germany
Xuejia Lai, Shanghai Jiao Tong University, China
Jiangtao Li, Intel, USA
Shujun Li, University of Konstanz, Germany
Peter Lipp, Graz University of Technology, Austria
Javier Lopez, University of Malaga, Spain
Andrew Martin, University of Oxford, UK
Shin'ichiro Matsuo, NICT, Japan
Yi Mu, University of Wollongong, Australia
David Naccache, ENS, France
Kenny Paterson, Royal Holloway, University of London, UK
Graeme Proudler, HP Laboratories, UK
Sihan Qing, Chinese Academy of Sciences, China
Scott Rotondo, Oracle, USA
Mark Ryan, University of Birmingham, UK
Willy Susilo, University of Wollongong, Australia
Qiang Tang, University of Twente, Netherlands
Claire Vishik, Intel, USA
Jian Weng, Jinan University, China
Shouhuai Xu, UTSA, USA
Rui Xue, Chinese Academy of Sciences, China
Xinwen Zhang, Huawei Research Center, USA
Yongbin Zhou, Chinese Academy of Sciences, China
Liehuang Zhu, Beijing Institute of Technology, China
Yan Zhu, Peking University, China
Steering Committee
Yongfei Han, BJUT & ONETS, China
Moti Yung, Google & Columbia University, USA
Liqun Chen, HP Laboratories, UK
Robert Deng, SMU, Singapore
Chris Mitchell, RHUL, UK
Sponsors
Singapore Management University