Call for papers

The International Conference on Trusted Systems (INTRUST 2009)
17-19 December 2009, Beijing, P. R. China
http://www.tcgchina.org

INTRUST 2009 is the first International Conference on the theory,
technologies and applications of trusted systems. It is devoted to all
aspects of trusted computing systems, including trusted modules,
platforms, networks, services and applications, from their fundamental
features and functionalities to design principles, architecture and
implementation technologies. The goal of the conference is to bring
academic and industrial researchers, designers, and implementers
together with end-users of trusted systems, in order to foster the
exchange of ideas in this challenging and fruitful area. The
conference will be held in Beijing University of Technology & ONETS.

INTRUST 2009 solicits original papers on any aspect of the theory,
advanced development and applications of trusted computing,
trustworthy systems and general trust issues in modern computing
systems. The conference will have an academic track and an industrial
track. This call for papers is for contributions to both of the
tracks. Submissions to the academic track should emphasize theoretical
and practical research contributions to general trusted system
technologies, while submissions to the industrial track may focus on
experiences on the implementation and deployment of real-world
systems.

Topics of relevance include but are not limited to:
 o  Fundamental features and functionalities of trusted systems
 o  Primitives and mechanisms for building a chain of trust
 o  Design principles and architectures of trusted modules and platforms
 o  Implementation technologies for trusted modules and platforms
 o  Cryptographic aspects of trusted systems, including cryptographic
    algorithms and protocols, and their implementation and application in
    trusted systems
 o  Scalable safe network operation in trusted systems

 o  Mobile trusted systems, such as trusted mobile platforms, sensor
    networks, mobile (ad hoc) networks, peer-to-peer networks, Bluetooth, etc.
 o  Storage aspects for trusted systems
 o  Applications of trusted systems, e.g. trusted email, web services
    and various e-commerce services
 o  Trusted intellectual property protection: metering, watermarking
    and digital rights management
 o  Software protection for trusted systems
 o  Authentication and access control for trusted systems
 o  Key, identity and certificate management for trusted systems
 o  Privacy aspects for trusted systems
 o  Attestation aspects for trusted systems, such as measurement and
    verification of the behavior of trusted systems
 o  Standards organizations and their contributions to trusted systems,
    such as TCG, ISO/IEC, IEEE 802.11, etc.
 o  Emerging technologies for trusted systems, such as RFID, memory spots, etc.
 o  Trust metrics and robust trust inference in distributed systems
 o  Usability and reliability aspects for trusted systems
 o  Trust modeling, economic analysis and protocol design for rational
    and malicious adversaries
 o  Virtualisation for trusted systems
 o  Limitations of trusted systems
 o  Security analysis of trusted systems, including formal method
    proofs, provable security and automated analysis
 o  Security policies for, and management of, trusted systems
 o  Intrusion resilience and revocation aspects for trusted systems
 o  Scalability aspects of trusted systems
 o  Compatibility aspects of trusted systems
 o  Experiences in building real-world trusted systems
 o  Socio-economic aspects of trusted systems

Instructions for authors
========================

Submissions must not substantially duplicate work that any of the
authors has published elsewhere or has submitted in parallel to any
journal or other conference or workshop that has
proceedings. Submissions will take place entirely via a web
system. All submissions will be blind-reviewed. Papers must be
anonymous, with no author names, affiliations, acknowledgments, or
obvious references. A submitted paper should begin with a title, a
short abstract, and a list of keywords.

It has been confirmed by the Springer that the proceedings of INTRUST
2009 will be published in the Springer-Verlag Lecture Notes in
Computer Science series and will be available after the
conference. Clear instructions about the preparation of a final
proceedings version will be sent to the authors of accepted
papers. Authors of accepted papers must guarantee that their paper
will be presented at the conference.

We strongly recommend that authors submit their papers in the standard
LNCS format (see
http://www.springer.com/computer/lncs?SGWID=0-164-0-0-0 for the
details) of length at most 12 pages (excluding bibliography and
appendices). Committee members are not required to review more than
that, so the paper should be intelligible and self-contained within
this length. Submissions not meeting these guidelines risk rejection
without consideration of their merits.

Authors are asked to clearly indicate whether their submissions are
for the academic track or the industrial track in the title. Authors
are also asked to indicate whether their submissions should be
considered for the best student paper award; any paper co-authored by
a full-time student is eligible for this award.

Important Dates:
===============
Submission due: 17 August 2009
Notification: 10 October 2009
Camera ready for pre-proceedings due: 28 October 2009
Conference: 17-19 December 2009
Camera ready for proceedings due: 16 February 2010

Paper Submission:
================
http://www.easychair.org/conferences/?conf=intrust2009
Conference enquire email: intrust@onets.com.cn

Conference organization:
=======================
General Chairs
- Yongfei Han, Beijing University of Technology & ONETS, China
- Robert Deng, Singapore Management University, Singapore

Programme Committee Chairs:
- Moti Yung, Columbia University & Google Inc., USA
- Liqun Chen, HP Laboratories, UK

PC members:
N. Asokan, Nokia Research Center, Finland
Endre Bangerter, Bern University of Applied Sciences, Switzerland
Boris Balacheff, HP Laboratories, UK
Feng Bao, I2R, Singapore
Kefei Chen, Shanghai Jiaotong University, China
James Davenport, University of Bath, UK
Xuhua Ding, Singapore Management University, Singapore
Loc Duflot, SGDN, France
Paul England, Microsoft, USA
Dengguo Feng, Chinese Academy of Sciences, China
Dieter Gollmann, Hamburg University of Technology, Germany
David Grawrock, Intel, USA
Sigrid Grgens, Fraunhofer Institute for Secure Information Technology, Germany
Dirk Kuhlmann, HP Laboratories, UK
Xuejia Lai, Shanghai Jiaotong University, China
Jian Li, BJUT, China
Qing Liang, Ricoh Software Institute, China
Peter Lipp, Graz University of Technology, Austria
Javier Lopez, University of Malaga, Spain
Wenbo Mao, EMC Research, China
Andrew Martin, University of Oxford, UK
Chris Mitchell, RHUL, UK
SangJae Moon, Kyungpook National University, Korea
Yi Mu, University of Wollongong, Australia
David Naccache, ENS, France
Yoram Ofek, Trento, Italy
Alina Oprea, RSA Laboratories, USA
Kenny Paterson, RHUL, UK
Raphael Phan, Loughborough University, UK
Bart Preneel, KU Leuven, Belgium
Graeme Proudler, HP Laboratories, UK
Sihan Qing, Chinese Academy of Sciences, China
Zulfikar Ramzan, Symantec, USA
Carsten Rudolph, Fraunhofer Institute for Secure Information Technology, Germany
Mark Ryan, University of Birmingham, UK
Ahmad-Reza Sadeghi, Ruhr-University Bochum, Germany
Kouichi Sakurai, Kyushu University, Japan
Luis Sarmenta, MIT, USA
Jean-Pierre Seifert, Technical University of Berlin & T-Labs, Germany
Sean Smith, Dartmouth College, USA
Willy Susilo, University of Wollongong, Australia
Qiang Tang, University of Twente, Netherlands
Vijay Varadharajan, Macquarie University, Australia
Claire Vishik, Intel, USA
Guilin Wang, University of Birmingham, UK
Steve Weis, Google, USA
Duncan S. Wong, City University of Hong Kong, China
Shouhuai Xu, UTSA, USA
Huanguo Zhang, Wuhan University, China
Xing Zhang, BJUT, China

Steering Committee
Yongfei Han, BJUT & ONETS, China
Moti Yung, Google & Columbia University, USA
Liqun Chen, HP Laboratories, UK
Robert Deng, SMU, Singapore
Chris Mitchell, RHUL, UK

Sponsors:
Singapore Management University
Beijing University of Technology
Chinese Academy of Engineering

Organising Chairs:
Jian Li, Beijing University of Technology, China
Lijuan Duan, Beijing University of Technology, China

Publicity Chairs:
Xuhua Ding, Singapore Management University, Singapore
Xiaona Chen, ONETS, China