-------- Original Message --------
Subject: [computational.science] First call for papers - InTrust 2012 - London, December 2012
Date: Fri, 20 Jan 2012 16:56:44 -0000
From: Chris Mitchell <me@chrismitchell.net>
Organization: "ICCSA"
To: Computational Science Mailing List <computational.science@lists.iccsa.org>


                       Call for Papers

InTrust 2012: 4th International conference on Trusted Systems
              17th-19th December 2012, London, UK
                      www.intrust2012.com

Building on the success of INTRUST 2009, 2010 and 2011 (all of
which were held in Beijing), this conference focuses on the
theory, technologies and applications of trusted systems.  It
is devoted to all aspects of trusted computing systems,
including trusted modules, platforms, networks, services and
applications, from their fundamental features and
functionalities to design principles, architecture and
implementation technologies.  The goal of the conference is to
bring academic and industrial researchers, designers, and
implementers  together with end-users of trusted systems, in
order to foster the exchange of ideas in this challenging and
fruitful area.  The conference will be hosted by the
Information Security Group at Royal Holloway, University of
London. INTRUST 2012 solicits original papers on any aspect of
the theory, advanced development and applications of trusted
computing, trustworthy systems and general trust issues in
modern computing systems.

Submissions must not substantially duplicate work that any of
the authors have published elsewhere or have submitted in
parallel to any journal or other conference or workshop that
has proceedings.  Submissions will take place entirely via a
web system.  All submissions will be blind-reviewed.  Papers
must be anonymous, with no author names, affiliations,
acknowledgements, or obvious references.  A submitted paper
should begin with a title, a short abstract, and a list of
keywords.

As was the case for INTRUST 2009 (LNCS 6163), INTRUST 2010
(LNCS 6802) and INTRUST 2011 (LNCS, to appear), it is
anticipated that the proceedings of INTRUST 2012 will be
published in the Springer-Verlag Lecture Notes in Computer
Science series. Unlike previous editions of this conference, it
is intended that the proceedings will be available at the
conference. Papers published in the LNCS series are indexed by
both EI and ISTP.

Clear instructions for the preparation of a final proceedings
version will be sent to the authors of accepted papers. Authors
are strongly recommended to submit their papers in the standard
LNCS format (see
  http://www.springer.com/computer/lncs?SGWID=0-164-0-0-0
for details), with length at most 15 pages (excluding
bibliography and appendices).  Committee members are not
required to review more pages than this, so papers should be
intelligible within this length. Submissions not meeting these
guidelines risk rejection without consideration of their
merits. Authors of accepted papers must guarantee that their
paper will be presented at the conference.

Papers must be submitted using the EasyChair conference
management system at:
  https://www.easychair.org//conferences/?conf=intrust2012
Please send any enquiries to:
  webmaster@intrust2012.com

The conference has a best paper award to the value of US$1,000,
sponsored by Singapore Management University; all papers are
eligible for this award.

Topics of relevance include but are not limited to:

 Fundamental features and functionalities of trusted systems
 Primitives and mechanisms for building a chain of trust
 Design principles and architectures for trusted modules and
   platforms
 Implementation technologies for trusted modules and platforms
 Cryptographic aspects of trusted systems, including
   cryptographic algorithms and protocols, and their
   implementation and application in trusted systems
 Scalable safe network operation in trusted systems
 Mobile trusted systems, including trusted mobile
   platforms, sensor networks, mobile (ad hoc) networks,
   peer-to-peer networks, Bluetooth, etc.
 Storage aspects of trusted systems
 Applications of trusted systems, e.g. trusted email,
   web services and e-commerce services
 Trustworthy infrastructures and cloud computing services
 Trusted intellectual property protection: metering,
   watermarking, digital rights management and enterprise
  rights management
 Software protection for trusted systems
 Hardware security for trusted systems
 Authentication and access control for trusted systems
 Key, identity & certificate management for trusted
   systems
 Privacy aspects of trusted systems
 Attestation for trusted systems, including measurement
   and verification of the behaviour of trusted systems
 Standards organisations and their contributions to
   trusted systems, e.g. TCG, ISO/IEC, IEEE 802.11
 Emerging technologies for trusted systems, e.g. RFID,
   memory spots, smart cards
 Trust metrics and robust trust inference in distributed
   systems
 Usability and reliability aspects of trusted systems
 Trust modeling, economic analysis and protocol design
   for rational and malicious adversaries
 Virtualisation for trusted systems
 Limitations of trusted systems
 Security analysis of trusted systems, including formal
   methods proofs, provable security and automated analysis
 Security policies for, and management of, trusted systems
 Intrusion resilience and revocation aspects of trusted
   systems
 Scalability aspects of trusted systems
 Compatibility aspects of trusted systems
 Experiences in building real-world trusted systems
 Socio-economic aspects of trusted systems


Key dates

 Deadline for submissions:  Friday 13 July 2012
 Notifications to authors:  Friday 24 August 2012
 Camera ready due:  Friday 28 September 2012
 Opening of conference:  Monday 17 December 2012


Conference organisation

Honorary Chairs

 Yongfei Han, BJUT & ONETS, China
 Moti Yung, Google & Columbia University, USA

General Chairs

 Liqun Chen, HP Laboratories, UK
 Chris Mitchell, RHUL, UK
 Allan Tomlinson, RHUL, UK

Programme Committee Chairs

 Chris Mitchell, RHUL, UK
 Allan Tomlinson, RHUL, UK

Programme Committee

 Feng Bao, I2R, Singapore
 Haibo Chen, Shanghai Jiao Tong University, China
 Zhong Chen, Peking University, China
 Kurt Dietrich, Graz University of Technology, Austria
 Xuhua Ding, Singapore Management University, Singapore
 Loic Duflot, SGDN, France
 Dieter Gollmann, Hamburg University of Technology, Germany
 David Grawrock, Intel, USA
 Sigrid Guergens, Fraunhofer Institute for Secure Information Technology,
Germany
 Xuejia Lai, Shanghai Jiao Tong University, China
 Jiangtao Li, Intel, USA
 Shujun Li, University of Konstanz, Germany
 Peter Lipp, Graz University of Technology, Austria
 Javier Lopez, University of Malaga, Spain
 Andrew Martin, University of Oxford, UK
 Shin'ichiro Matsuo, NICT, Japan
 Yi Mu, University of Wollongong, Australia
 David Naccache, ENS, France
 Kenny Paterson, Royal Holloway, University of London, UK
 Graeme Proudler, HP Laboratories, UK
 Sihan Qing, Chinese Academy of Sciences, China
 Scott Rotondo, Oracle, USA
 Mark Ryan, University of Birmingham, UK
 Willy Susilo, University of Wollongong, Australia
 Qiang Tang, University of Twente, Netherlands
 Claire Vishik, Intel, USA
 Jian Weng, Jinan University, China
 Shouhuai Xu, UTSA, USA
 Rui Xue, Chinese Academy of Sciences, China
 Xinwen Zhang, Huawei Research Center, USA
 Yongbin Zhou, Chinese Academy of Sciences, China
 Liehuang Zhu, Beijing Institute of Technology, China
 Yan Zhu, Peking University, China

Steering Committee

 Yongfei Han, BJUT & ONETS, China
 Moti Yung, Google & Columbia University, USA
 Liqun Chen, HP Laboratories, UK
 Robert Deng, SMU, Singapore
 Chris Mitchell, RHUL, UK

Sponsors

Singapore Management University