**************************************************************************
                           Call for Papers

                             Trust 2011
     4th International Conference on Trust and Trustworthy Computing

                           June 22-24, 2011
                    CyLab/CMU, Pittsburgh, PA, USA
                      http://www.trust2011.org

**************************************************************************
     Submissions due:     15 February 2011 (11:59pm EST)
**************************************************************************

Building on the success of Trust 2010 (held in Berlin, Germany), Trust
2009 (Oxford, UK) and Trust 2008 (Villach, Austria), this conference
focuses on trusted and trustworthy computing, both from the technical
and social perspectives. The conference itself has two main strands,
one devoted to technical aspects and one devoted to socio-economic
aspects of trusted computing.

The conference solicits original papers on any aspect (technical or social
and economic) of the design, application and usage of trusted and
trustworthy computing, which concerns a broad range of concepts including
trustworthy infrastructures, cloud computing, services, hardware, software
and protocols. Topics of interest include, but are not limited to:

Technical Strand:
-----------------
     * Architecture and implementation technologies for trusted platforms
       and trustworthy infrastructures
     * Trust, Security and Privacy in embedded systems
     * Trust, Security and Privacy in social networks
     * Trusted mobile platforms and mobile phone security
     * Implementations of trusted computing (hardware and software)
     * Applications of trusted computing
     * Trustworthy infrastructures and services for cloud computing
       (including resilience)
     * Attestation and integrity verification
     * Cryptographic aspects of trusted and trustworthy  computing
     * Design, implementation and analysis of security hardware, i.e.,
       hardware with cryptographic and security functions, physically
       unclonable functions (PUFs)
     * Intrusion resilience in trusted computing
     * Virtualization for trusted platforms
     * Secure storage
     * Security policy and management of trusted computing
     * Access control for trusted platforms
     * Privacy aspects of trusted computing
     * Verification of trusted computing architectures
     * Usability and end-user interactions with trusted platforms
     * Limitations of trusted computing


Socio-economic Strand:
----------------------
    * Usability and user perceptions of trustworthy systems and risks
    * Effects of trustworthy systems upon user, corporate, and
      governmental behavior
    * Economic drivers for trustworthy systems in corporate environment
    * The impact of trustworthy systems in enhancing trust in cloud-like
      infrastructures
    * The adequacy of guarantees provided by trustworthy systems for
      systems critically dependent upon trust, such as elections and
      government oversight
    * The impact of trustworthy systems upon digital forensics, police
      investigations and court proceedings
    * Game theoretical approaches to modeling or designing trustworthy
      systems
    * Approaches to model and simulate scenarios of how trustworthy systems
      would be used in corporate environments and in personal space
    * Experimental economics studies of trustworthiness
    * The interplay between privacy, privacy enhancing technologies and
      trustworthy systems
    * Critiques of trustworthy systems


General Chairs:
    Jonathan McCune (Carnegie Mellon University, USA)
    Boris Balacheff (HP Labs, UK)

Program Chairs (Technical Strand)
    Adrian Perrig (Carnegie Mellon University, USA)
    Ahmad-Reza Sadeghi (TU Darmstadt / Fraunhofer SIT, Germany)

Program Chairs (Socio-economic Strand)
    Angela Sasse (UCL, UK)
    Yolanta Beres (HP Labs, UK)

Program Committee (Technical Strand)
    Frederik Armknecht (University of Mannheim, Germany)
    Marina Blanton (University of Notre Dame, USA)
    Sergey Bratus (Dartmouth College, USA)
    Christian Cachin (IBM Research, Switzerland)
    Liqun Chen (HP Laboratories, UK)
    Xuhua Ding (Singapore Management University, Singapore)
    Paul England (Microsoft, USA)
    Michael Franz (University of California, Irvine, USA)
    Christian Gehrmann (SICS, Sweden)
    David Grawrock (Intel, USA)
    Helena Handschuh (Intrinsic-ID, USA / KU Leuven, Belgium)
    Gernot Heiser (NICTA, Australia)
    Thorsten Holz (Ruhr-University Bochum, Germany)
    Cynthia Irvine (Naval Postgraduate School, USA)
    Stefan Katzenbeisser (TU Darmstadt, Germany)
    Michael LeMay (University of Illinois Urbana-Champaign, USA)
    David Lie (University of Toronto, Canada)
    Peter Lipp (TU Graz, Austria)
    Michael Locasto (University of Calgary, Canada)
    Andrew Martin (University of Oxford, UK)
    Jon Millen (The MITRE Corporation, USA)
    Chris Mitchell (Royal Holloway University, UK)
    David Naccache (ENS, France)
    Bart Preneel (KU Leuven, Belgium)
    Graeme Proudler (HP Laboratories, UK)
    Anand Rajan (Intel Labs, USA)
    Scott Rotondo (Oracle, USA)
    Mark Ryan (University of Birmingham, UK)
    Jean-Pierre Seifert (TU Berlin / T-Labs, Germany)
    Reiner Sailer (IBM Research, USA)
    Matthias Schunter (IBM Research, Switzerland)
    Sean Smith (Dartmouth College, USA)
    Christian Stueble (Sirrix, Germany)
    G. Edward Suh (Cornell University, USA)
    Berk Sunar (WPI, USA)
    Leendert van Doorn (AMD, USA)
    Claire Vishik (Intel, UK)
    Michael Waidner (Fraunhofer SIT / TU Darmstadt, Germany)
    Marcel Winandy  (Ruhr-University Bochum, Germany)
    Xinwen Zhang (Huawei America Research Center, USA)

Program Committee (Socio-economic Strand)
    Alessandro Acquisti (Carnegie Mellon University, USA)
    Andrew A. Adams (Meiji University, Japan)
    Rainer Boehme (University of Muenster, Germany)
    Ian Brown (University of Oxford, UK)
    Johann Cas (Austrian Academy of Science)
    Tamara Dinev (Florida Atlantic University, USA)
    Jens Grossklags (Pennsylvania State University, USA)
    Peter Gutmann (University of Auckland, New Zealand)
    Tristan Henderson (University of St Andrews, UK)
    Adam Joinson (Bath University, UK)
    Eleni Kosta (Katholieke Universiteit Leuven, Belgium)
    Meryem Marzouki (French National Scientific Research Center)
    Tyler Moore (Harvard University, USA)
    Andrew Patrick (Office of the Privacy Commissioner of Canada)
    Jens Riegelsberger (Google Research, UK)


Important Dates:
    Submission due:     15 February 2011 (11:59pm EST)
    Notification:       25 March 2011
    Camera ready:       12 April 2011
    Conference:         22-24 June 2010

Paper Submission:
    http://www.trust2011.org