INTRUST 2011
The Third International Conference on Trusted Systems
Nov 27 - 29, 2011
Beijing, P. R. China
Conference website: http://www.onets.com.cn/intrust11
Important Dates:
Submission due: 01 August 2011
Notification: 18 October 2011
Camera ready for pre-proceedings due: 1 November 2011
Conference: Nov 27 - 29, 2011
Camera ready for proceedings due: 31 January 2012
Paper Submission Web Server:
https://www.easychair.org/conferences/?conf=intrust2011

Introduction

Building on the success of INTRUST 2009 and INTRUST 2010 (both were
held in Beijing, P. R. China), this conference focuses on the theory,
technologies and applications of trusted systems. It is devoted to all
aspects of trusted computing systems, including trusted modules,
platforms, networks, services and applications, from their fundamental
features and functionalities to design principles, architecture and
implementation technologies. The goal of the conference is to bring
academic and industrial researchers, designers, and implementers
together with end-users of trusted systems, in order to foster the
exchange of ideas in this challenging and fruitful area. The
conference will be hosted by the Beijing Institute of Technology (BIT)
and ONETS.

INTRUST 2011 solicits original papers on any aspect of the theory,
advanced development and applications of trusted computing,
trustworthy systems and general trust issues in modern computing
systems. The conference will have an academic track and an industrial
track. This call for papers is for contributions to both of the
tracks. Submissions to the academic track should emphasize theoretical
and practical research contributions to general trusted system
technologies, while submissions to the industrial track may focus on
experiences in the implementation and deployment of real-world
systems.

Instructions for authors

Submissions must not substantially duplicate work that any of the
authors has published elsewhere or has submitted in parallel to any
journal or other conference or workshop that has
proceedings. Submissions will take place entirely via a web
system. All submissions will be blind-reviewed. Papers must be
anonymous, with no author names, affiliations, acknowledgements, or
obvious references. A submitted paper should begin with a title, a
short abstract, and a list of keywords.

As was the vase for INTRUST 2009 and 2010, the proceedings of INTRUST
2011 will, as a plan, be published in the Springer-Verlag Lecture
Notes in Computer Science series and will be available after the
conference. Clear instructions for the preparation of a final
proceedings version will be sent to the authors of accepted papers. We
strongly recommend that authors submit their papers in the standard
LNCS format (see
http://www.springer.com/computer/lncs?SGWID=0-164-0-0-0 for the
details) with length at most 15 pages (excluding bibliography and
appendices). Committee members are not required to review more than
that, so the paper should be intelligible and self-contained within
this length. Submissions not meeting these guidelines risk rejection
without consideration of their merits.

Authors of accepted papers must guarantee that their paper will be
presented at the conference. Authors are asked to clearly indicate
whether their submissions are for the academic track or the industrial
track in the title.

The conference has a best paper award sponsored by Singapore
Management University for US$1000; all papers are eligible for this
award.

Topics of relevance include but are not limited to:

- Fundamental features and functionalities of trusted systems
- Primitives and mechanisms for building a chain of trust
- Design principles and architectures of trusted modules and platforms
- Implementation technologies for trusted modules and platforms
- Cryptographic aspects of trusted systems, including cryptographic
  algorithms and protocols, and their implementation and application
  in trusted systems
- Scalable safe network operation in trusted systems
- Mobile trusted systems, such as trusted mobile platforms, sensor
  networks, mobile (ad hoc) networks, peer-to-peer networks,
  Bluetooth, etc.
- Storage aspects for trusted systems
- Applications of trusted systems, e.g. trusted email, web services
  and various e-commerce services
- Trustworthy infrastructures and services for cloud computing
- Trusted intellectual property protection: metering, watermarking,
  digital rights management and enterprise rights management
- Software protection for trusted systems
- Hardware security for trusted systems
- Authentication and access control for trusted systems
- Key, identity and certificate management for trusted systems
- Privacy aspects for trusted systems
- Attestation aspects for trusted systems, including the measurement
  and verification of the behaviour of trusted systems
- Standards organizations and their contributions to trusted systems,
  such as TCG, ISO/IEC, IEEE 802.11, etc.
- Emerging technologies for trusted systems, such as RFID, memory
  spots, smart cards, etc.
- Trust metrics and robust trust inference in distributed systems
- Usability and reliability aspects for trusted systems
- Trust modeling, economic analysis and protocol design for rational
  and malicious adversaries
- Virtualisation for trusted systems
- Limitations of trusted systems
- Security analysis of trusted systems, including formal method
  proofs, provable security and automated analysis
- Security policies for, and management of, trusted systems
- Intrusion resilience and revocation aspects for trusted systems
- Scalability aspects of trusted systems
- Compatibility aspects of trusted systems
- Experiences in building real-world trusted systems
- Socio-economic aspects of trusted systems

Conference organization
General Chairs
- Robert Deng, Singapore Management University, Singapore
- Heyuan Huang, Beijing Institute of Technology, China

- Chris Mitchell, RHUL, UK

Programme Committee Chairs
- Moti Yung, Columbia University & Google Inc., USA
- Liqun Chen, HP Laboratories, UK
- Liehuang Zhu, Beijing Institute of Technology, China

PC members
TBD

Steering Committee
- Yongfei Han, BJUT & ONETS, China
- Moti Yung, Google & Columbia University, USA
- Liqun Chen, HP Laboratories, UK
- Robert Deng, SMU, Singapore
- Chris Mitchell, RHUL, UK

Organising Chair
- Liehuang Zhu, Beijing Institute of Technology, China

Publicity Chairs
- Xuhua Ding, Singapore Management University, Singapore
- Lejian Liao, Beijing Institute of Technology, China

Sponsors
- Beijing Institute of Technology
- ONETS
- Singapore Management University
- The Administrative Committee of Zhongguangcun Haidian Science Park

Conference enquiries email: intrust@onets.com.cn