[Air-L] CFP: TRUST 2013, the 6th International Conference on Trust and Trustworthy Computing

John Vines john.vines at newcastle.ac.uk
Sat Jan 26 03:36:10 PST 2013

Air-L members may be interested in the socio-technical strand of TRUST 2013, call for papers and posters below.


The 6th International Conference on Trust and Trustworthy Computing (TRUST)

London, UK, June 17-19, 2013




TRUST 2013 is an international conference on the technical and socio-economic aspects of trustworthy infrastructures. It provides an excellent interdisciplinary forum for researchers, practitioners, and decision makers to explore new ideas and discuss experiences in building, designing, using and understanding trustworthy computing systems.

The conference solicits original papers on any aspect (technical, social or socio-economic) of the design, application and usage of trusted and trustworthy computing. Papers can address design, application and usage of trusted and trustworthy computing in a broad range of concepts including, but not limited to, trustworthy infrastructures, cloud computing, services, hardware, software and protocols.

Two types of submissions are solicited:

- Full papers (up to 18 pages in LNCS format) that report on in-depth, mature research results

- Short papers (up to 9 pages in LNCS format) that describe brief results or exciting work-in-progress

Topics of Interest


Technical Strand


- Architecture and implementation technologies for trusted platforms and trustworthy infrastructures

- Trust, Security and Privacy in embedded systems

- Trust, Security and Privacy in social networks

- Trusted mobile platforms and mobile phone security

- Implementations of trusted computing (hardware and software)

- Applications of trusted computing

- Trustworthy infrastructures and services for cloud computing (including resilience)

- Attestation and integrity verification

- Cryptographic aspects of trusted and trustworthy computing

- Design, implementation and analysis of security hardware

- Security hardware with cryptographic and security functions, physically unclonable functions (PUFs)

- Intrusion resilience in trusted computing

- Virtualization for trusted platforms

- Secure storage

- Security policy and management of trusted computing

- Access control for trusted platforms

- Privacy aspects of trusted computing

- Verification of trusted computing architectures

- Usability and end-user interactions with trusted platforms

- Limitations of trusted computing

Social and Socio-economic Strand


- The role of trust in human-computer interactions

- Usability and user perceptions of trustworthy systems and risks

- Patterns of trust practices in human-computer interactions

- Effects of trustworthy systems upon user, corporate, and governmental behavior

- The impact of trustworthy systems in enhancing trust in cloud-like infrastructures

- The adequacy of guarantees provided by trustworthy systems for systems critically dependent upon trust, such as elections and government oversight

- The impact of trustworthy systems upon digital forensics, police investigations and court proceedings

- Game theoretical approaches to modeling or designing trustworthy systems

- Approaches to model and simulate scenarios of how trustworthy systems would be used in corporate environments and in personal space

- Economic drivers for trustworthy systems in corporate environment

- Experimental economics studies of trustworthiness

- The interplay between privacy, privacy enhancing technologies and trustworthy systems

- Evaluation of research methods used in the research of trustworthy and trusted computing

- Critiques of trustworthy systems

- Metrics of trust

- Privacy Aspects of Trust Computing

- Engineering Processes for Trustworthy Computing

Submissions must be in LNCS format subject to the page limits mentioned above. No changes to margins, spacing, or font sizes (or anything else) are allowed from those specified. We reserve the right to request the source files for a submission to verify compliance with this requirement. Only PDF files will be accepted. Papers must be written in English.

All submissions must be anonymized. An author’s name should occur only in references to that author’s related work, which should be referenced in the third person and not overtly distinguishable from the referenced work of others.

Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal, conference or workshop. Simultaneous submission of the same work is not allowed. Authors of accepted papers must guarantee that their papers will be presented at the conference.

Important Dates


Submission due: February 15, 2013, 23:49 UTC

Notification: March 22, 2013

Camera ready: April 10, 2013

Conference: June 17-19, 2013





TRUST 2013 encourages the presentation of posters that aim at the rapid dissemination of  new ideas, work in progress or preliminary results. We particularly encourage PhD students to present their ongoing work. Posters can only be presented if a 2-page abstract (PDF format required) of the work has been submitted in LNCS format by email to <conference[@]sba-research.org> by 1 March 2013, and if the abstract has then been accepted (notifications will be sent by 15 March). All accepted 2-page abstracts will appear in the formal conference proceedings and at least one author is therefore required to register for the conference.

The abstract should be a concise description of the work (and not of what actual content is planned to be on the poster); no changes to margins, spacing, or font sizes or any other deviations form the LNCS format are allowed. And we reserve the right to request the source files for a submission in order to verify compliance with this requirement. Abstracts and posters must be written in English. The camera-ready copy and a signed copyright form of accepted 2-page abstracts are due on 10 April 2013.

At least one author of accepted posters will be expected to be present during the poster session of TRUST, and be prepared to discuss their work and answer questions. The poster sessions are anticipated to be held on 17 and/or 18 June 2013 during the conference lunch breaks (subject to confirmation).

We encourage submissions from all research areas relevant mentioned in the call for papers of TRUST 2013, such as information security, trusted computing, trustworthy infrastructures and usability of security.

Important dates:

Submission due: 1 March 2013 23:59 UTC

Notification: 15 March 2013

Camera Ready: 10 April 2013

Conference: 17-19 June 2013

Poster Sessions: 17-18 June 2013


A 2-page abstract (PDF format required) of the work has been submitted in LNCS format by email to <conference[@]sba-research.org>.



General chair:

- Michael Huth (Imperial College London, UK)

Program chairs (Socio-economic Strand):

- Lizzie Coles-Kemp (Royal Holloway University of London, UK)

- Ivan Flechais (University of Oxford, UK)

Program chairs (Technical Strand):

- Srdjan Capkun (ETH Zurich, Switzerland)

- N. Asokan (University of Helsinki)

Program Commitee (Socio-economic Strand):

- Shamal Faily (University of Oxford, UK)

- Paul Dunphy (Newcastle University, UK)

- Anne-Marie Oostveen (University of Oxford, UK)

- Mina Vasalou (University of Birmingham, UK)

- Peter Ryan (University of Luxembourg, Luxembourg)

- Simone Fischer-Hübner (Karlstad University, Sweden)

- Pam Briggs (Northumbria University, UK)

- Jeff Yan (Newcastle University, UK)

- Tara Whalen (Carleton University, Canada)

- Yang Wang (Syracuse University, USA)

- Heather Lipford (UNC Charlotte, USA)

- Cormac Herley (Microsoft, USA)

- Ian Brown (University of Oxford, UK)

- Garbiele Lenzini (University of Luxembourg, Luxembourg)

- Jean Camp (Indiana University, USA)

- Melanie Volkamer (TU Darmstadt and CASED, Germany)

- Alf Zugenmaier (Munich University of Applied Science, Germany)

- Dusko Pavlovic (Royal Holloway, UK)

- Debi Ashenden (Cranfield University, UK)

- Geraint Price (Royal Holloway, UK)

- Christina Hochleitner (Center for Usability Research & Engineering, Austria)

Program Commitee (Technical Strand):

- Haibo Chen (Fudan University, China)

- Liqun Chen (HP Labs, UK)

- Xuhua Ding (Singapore Management University,  Singapore)

- Jan-Erik Ekberg (Nokia Research Center, Finland)

- William Enck (NC State, US)

- Michael Franz (UC Irvine, US)

- Peter Gutman (University of Auckland, New Zealand)

- Trent Jaeger (Penn State University, US)

- Limin Jia (CMU, US)

- Apu Kapadia (Indiana University, US)

- Ghassan Karame (NEC Laboratories, Germany)

- Engin Kirda (NorthEastern University, US)

- Jiangtao Li (Intel Labs, US)

- Mohammad Mannan (Concordia University, Canada)

- Ivan Martinovic (Oxford University, UK)

- Jonathan McCune (Google, US)

- Aziz Mohaisen (Verizon, US)

- Mohammad Nauman (MIIT, Universiti Kuala Lumpur, Malaysia)

- Bryan Parno (Microsoft Research, US)

- Ahmad Sadeghi (TU Darmstadt, Germany)

- Matthias Schunter (Intel, Germany)

- Jean-Pierre Seifert (DT-Lab, Germany)

- Sean Smith (Dartmouth College, US)

- Vijay Varadharajan (Macquarie University, Australia)

- Martin Vechev (ETH Zurich, Switzerland)

- Xinwen Zhang (Huawei, US)

Publicity Chair (Socio-economic Strand):

- John Vines, (Newcastle University, UK)

- Shamal Faily (University of Oxford, UK)

Publicity Chair (Technical Strand):

- Elli Androulaki (ETH Zurich)

- Thomas Schneider (EC-SPRIDE/TU Darmstadt)

Steering Committee:

- Alessandro Acquisti (Carnegie Mellon University, USA)

- Boris Balacheff (Hewlett Packard, UK)

- Paul England (Microsoft, USA)

- Andrew Martin (University of Oxford, UK)

- Chris Mitchell (Royal Holloway, University of London, UK)

- Sean Smith (Dartmouth College, USA)

- Ahmad-Reza Sadeghi (TU Darmstadt / Fraunhofer SIT, Germany)

- Claire Vishik (Intel, UK)

More information about the Air-L mailing list