Call for papers The International Conference on Trusted Systems (INTRUST 2009) 17-19 December 2009, Beijing, P. R. China http://www.tcgchina.org INTRUST 2009 is the first International Conference on the theory, technologies and applications of trusted systems. It is devoted to all aspects of trusted computing systems, including trusted modules, platforms, networks, services and applications, from their fundamental features and functionalities to design principles, architecture and implementation technologies. The goal of the conference is to bring academic and industrial researchers, designers, and implementers together with end-users of trusted systems, in order to foster the exchange of ideas in this challenging and fruitful area. The conference will be held in Beijing University of Technology & ONETS. INTRUST 2009 solicits original papers on any aspect of the theory, advanced development and applications of trusted computing, trustworthy systems and general trust issues in modern computing systems. The conference will have an academic track and an industrial track. This call for papers is for contributions to both of the tracks. Submissions to the academic track should emphasize theoretical and practical research contributions to general trusted system technologies, while submissions to the industrial track may focus on experiences on the implementation and deployment of real-world systems. Topics of relevance include but are not limited to: o Fundamental features and functionalities of trusted systems o Primitives and mechanisms for building a chain of trust o Design principles and architectures of trusted modules and platforms o Implementation technologies for trusted modules and platforms o Cryptographic aspects of trusted systems, including cryptographic algorithms and protocols, and their implementation and application in trusted systems o Scalable safe network operation in trusted systems o Mobile trusted systems, such as trusted mobile platforms, sensor networks, mobile (ad hoc) networks, peer-to-peer networks, Bluetooth, etc. o Storage aspects for trusted systems o Applications of trusted systems, e.g. trusted email, web services and various e-commerce services o Trusted intellectual property protection: metering, watermarking and digital rights management o Software protection for trusted systems o Authentication and access control for trusted systems o Key, identity and certificate management for trusted systems o Privacy aspects for trusted systems o Attestation aspects for trusted systems, such as measurement and verification of the behavior of trusted systems o Standards organizations and their contributions to trusted systems, such as TCG, ISO/IEC, IEEE 802.11, etc. o Emerging technologies for trusted systems, such as RFID, memory spots, etc. o Trust metrics and robust trust inference in distributed systems o Usability and reliability aspects for trusted systems o Trust modeling, economic analysis and protocol design for rational and malicious adversaries o Virtualisation for trusted systems o Limitations of trusted systems o Security analysis of trusted systems, including formal method proofs, provable security and automated analysis o Security policies for, and management of, trusted systems o Intrusion resilience and revocation aspects for trusted systems o Scalability aspects of trusted systems o Compatibility aspects of trusted systems o Experiences in building real-world trusted systems o Socio-economic aspects of trusted systems Instructions for authors ======================== Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to any journal or other conference or workshop that has proceedings. Submissions will take place entirely via a web system. All submissions will be blind-reviewed. Papers must be anonymous, with no author names, affiliations, acknowledgments, or obvious references. A submitted paper should begin with a title, a short abstract, and a list of keywords. It has been confirmed by the Springer that the proceedings of INTRUST 2009 will be published in the Springer-Verlag Lecture Notes in Computer Science series and will be available after the conference. Clear instructions about the preparation of a final proceedings version will be sent to the authors of accepted papers. Authors of accepted papers must guarantee that their paper will be presented at the conference. We strongly recommend that authors submit their papers in the standard LNCS format (see http://www.springer.com/computer/lncs?SGWID=0-164-0-0-0 for the details) of length at most 12 pages (excluding bibliography and appendices). Committee members are not required to review more than that, so the paper should be intelligible and self-contained within this length. Submissions not meeting these guidelines risk rejection without consideration of their merits. Authors are asked to clearly indicate whether their submissions are for the academic track or the industrial track in the title. Authors are also asked to indicate whether their submissions should be considered for the best student paper award; any paper co-authored by a full-time student is eligible for this award. Important Dates: =============== Submission due: 17 August 2009 Notification: 10 October 2009 Camera ready for pre-proceedings due: 28 October 2009 Conference: 17-19 December 2009 Camera ready for proceedings due: 16 February 2010 Paper Submission: ================ http://www.easychair.org/conferences/?conf=intrust2009 Conference enquire email: intrust@onets.com.cn Conference organization: ======================= General Chairs - Yongfei Han, Beijing University of Technology & ONETS, China - Robert Deng, Singapore Management University, Singapore Programme Committee Chairs: - Moti Yung, Columbia University & Google Inc., USA - Liqun Chen, HP Laboratories, UK PC members: N. Asokan, Nokia Research Center, Finland Endre Bangerter, Bern University of Applied Sciences, Switzerland Boris Balacheff, HP Laboratories, UK Feng Bao, I2R, Singapore Kefei Chen, Shanghai Jiaotong University, China James Davenport, University of Bath, UK Xuhua Ding, Singapore Management University, Singapore Loc Duflot, SGDN, France Paul England, Microsoft, USA Dengguo Feng, Chinese Academy of Sciences, China Dieter Gollmann, Hamburg University of Technology, Germany David Grawrock, Intel, USA Sigrid Grgens, Fraunhofer Institute for Secure Information Technology, Germany Dirk Kuhlmann, HP Laboratories, UK Xuejia Lai, Shanghai Jiaotong University, China Jian Li, BJUT, China Qing Liang, Ricoh Software Institute, China Peter Lipp, Graz University of Technology, Austria Javier Lopez, University of Malaga, Spain Wenbo Mao, EMC Research, China Andrew Martin, University of Oxford, UK Chris Mitchell, RHUL, UK SangJae Moon, Kyungpook National University, Korea Yi Mu, University of Wollongong, Australia David Naccache, ENS, France Yoram Ofek, Trento, Italy Alina Oprea, RSA Laboratories, USA Kenny Paterson, RHUL, UK Raphael Phan, Loughborough University, UK Bart Preneel, KU Leuven, Belgium Graeme Proudler, HP Laboratories, UK Sihan Qing, Chinese Academy of Sciences, China Zulfikar Ramzan, Symantec, USA Carsten Rudolph, Fraunhofer Institute for Secure Information Technology, Germany Mark Ryan, University of Birmingham, UK Ahmad-Reza Sadeghi, Ruhr-University Bochum, Germany Kouichi Sakurai, Kyushu University, Japan Luis Sarmenta, MIT, USA Jean-Pierre Seifert, Technical University of Berlin & T-Labs, Germany Sean Smith, Dartmouth College, USA Willy Susilo, University of Wollongong, Australia Qiang Tang, University of Twente, Netherlands Vijay Varadharajan, Macquarie University, Australia Claire Vishik, Intel, USA Guilin Wang, University of Birmingham, UK Steve Weis, Google, USA Duncan S. Wong, City University of Hong Kong, China Shouhuai Xu, UTSA, USA Huanguo Zhang, Wuhan University, China Xing Zhang, BJUT, China Steering Committee Yongfei Han, BJUT & ONETS, China Moti Yung, Google & Columbia University, USA Liqun Chen, HP Laboratories, UK Robert Deng, SMU, Singapore Chris Mitchell, RHUL, UK Sponsors: Singapore Management University Beijing University of Technology Chinese Academy of Engineering Organising Chairs: Jian Li, Beijing University of Technology, China Lijuan Duan, Beijing University of Technology, China Publicity Chairs: Xuhua Ding, Singapore Management University, Singapore Xiaona Chen, ONETS, China