8th International Conference on Trust & Trustworthy Computing
The proceedings of TRUST 2014 -LNCS 7904- are now available online here!
Sponsored by:
University of padova
Call for Papers

Call for Papers (short), Call for Papers (full)

International Conference

TRUST 2015 is an international conference on the technical and socio-economic aspects of trustworthy infrastructures. It provides an excellent interdisciplinary forum for researchers, practitioners, and decision makers to explore new ideas and discuss experiences in building, designing, using and understanding trustworthy computing systems.

Important dates:

  • Submission due: 7 May 2015 / deadline extended: 18 May 2015
  • Notification: 10 June 2015 / deadline extended: 17 June 2015
  • Camera ready: 21 June 2015 / deadline extended: 28 June 2015
  • Conference: 24 - 26 August 2015

The conference solicits original papers on any aspect (technical, social or socio-economic) of the design, application and usage of trusted and trustworthy computing. Papers can address design, application and usage of trusted and trustworthy computing in a broad range of concepts including, but not limited to, trustworthy infrastructures, cloud computing, services, hardware, software and protocols.

Two types of submissions are solicited:

  • Full papers (up to 18 pages in LNCS format) that report on in-depth, mature research results
  • Short papers (up to 9 pages in LNCS format) that describe brief results or exciting work-in-progress

Topics of interest for the technical strand include, but are not limited to:

  • *NEW TOPIC* Applications as well as security analysis of trusted computing. We particularly encourage early explorations and results on new paradigms or emerging technologies (e.g., Intel SGX)
  • *NEW TOPIC* Trust, Security and Privacy in embedded systems and IoT systems
  • Architecture, applications and implementation technologies for trusted platforms and trustworthy infrastructures
  • Trust, Security and Privacy in social networks
  • Trusted mobile platforms and mobile phone security
  • Trustworthy infrastructures and services for cloud computing (including resilience)
  • Attestation and integrity verification
  • Cryptographic aspects of trusted and trustworthy computing
  • Security hardware with cryptographic and security functions, physically unclonable functions (PUFs)
  • Intrusion resilience in trusted computing
  • Virtualization for trusted platforms
  • Security policy and management of trusted computing
  • Privacy aspects of trusted computing
  • Verification of trusted computing architectures
  • Usability and end-user interactions with trusted platforms
  • Limitations of trusted computing
  • Usability and user perceptions of trustworthy systems and risks

Topics of interest for the socio-economic strand include, but are not limited to:

  • *NEW TOPIC* Trust in the Web: protocols and implementations of mechanisms to measure and leverage trust from the web (e.g., using social networks to establish trust for other services)
  • The role of trust in human-computer interactions
  • Patterns of trust practices in human-computer interactions
  • Effects of trustworthy systems upon user, corporate, and governmental behavior
  • The impact of trustworthy systems in enhancing trust in cloud-like infrastructures
  • The adequacy of guarantees provided by trustworthy systems for systems critically dependent upon trust, such as elections and government oversight
  • The impact of trustworthy systems upon digital forensics, police investigations and court proceedings
  • Game theoretical approaches to modeling or designing trustworthy systems
  • Approaches to model and simulate scenarios of how trustworthy systems would be used in corporate environments and in personal space
  • Economic drivers for trustworthy systems in corporate environment
  • Experimental economics studies of trustworthiness
  • The interplay between privacy, privacy enhancing technologies and trustworthy systems
  • Evaluation of research methods used in the research of trustworthy and trusted computing
  • Critiques of trustworthy systems
  • Metrics of trust
  • Privacy Aspects of Trust Computing
  • Engineering Processes for Trustworthy Computing

Submissions must be in LNCS format subject to the page limits mentioned above. No changes to margins, spacing, or font sizes (or anything else) are allowed from those specified. We reserve the right to request the source files for a submission to verify compliance with this requirement. Only PDF files will be accepted. Papers must be written in English.

All submissions must be anonymized. An author’s name should occur only in references to that author’s related work, which should be referenced in the third person and not overtly distinguishable from the referenced work of others.

Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal, conference or workshop. Simultaneous submission of the same work is not allowed. Authors of accepted papers must guarantee that their papers will be presented at the conference.

General Chair:

Program Chairs