======================================================================
Call for Papers: TRUST 2014
7th International Conference on Trust & Trustworthy Computing
June 30 - July 2, 2014 - Hersonissos, Crete, Greece
======================================================================

http://www.ics.forth.gr/trust2014/ / http://bit.ly/trust2014

About TRUST
----------------------------------------
TRUST 2014 is an international conference on the technical and
socio-economic aspects of trustworthy infrastructures. It provides
an excellent interdisciplinary forum for researchers, practitioners,
and decision makers to explore new ideas and discuss experiences in
building, designing, using and understanding trustworthy computing
systems.

TRUST 2014 will be held from June 30 to July 2 2014 in Hersonissos,
Crete, Greece. Hersonissos is a popular holiday resort located 30km
from Heraklion, the island's largest city.

Important Dates
----------------------------------------
     * Paper submission: March  7, 2014
     * Acceptance notification: April 7, 2014
     * Final paper due: April 21, 2014
     * Conference: June 30 - July 2, 2014

Topics of Interest
----------------------------------------
TRUST 2014 solicits original contributions on any aspect of the
design, application and usage of trusted and trustworthy computing.
Submissions should align with one of two strands of contributions
of the conference. The topics of the strands include (but are not
limited to):

Technical Strand
     * Architecture and implementation technologies for trusted
       platforms and trustworthy infrastructures
     * Trust, Security and Privacy in embedded systems
     * Trust, Security and Privacy in social networks
     * Trusted mobile platforms and mobile phone security
     * Implementations of trusted computing (hardware and software)
     * Applications of trusted computing
     * Trustworthy infrastructures and services for cloud computing
       (including resilience)
     * Attestation and integrity verification
     * Cryptographic aspects of trusted and trustworthy computing
     * Design, implementation and analysis of security hardware
     * Security hardware with cryptographic and security functions,
       physically unclonable functions (PUFs)
     * Intrusion resilience in trusted computing
     * Virtualization for trusted platforms
     * Secure storage
     * Security policy and management of trusted computing
     * Access control for trusted platforms
     * Privacy aspects of trusted computing
     * Verification of trusted computing architectures
     * Usability and end-user interactions with trusted platforms
     * Limitations of trusted computing

Social and Socio-economic Strand
     * Role of trust in human-computer interactions
     * Usability and user perceptions of trustworthy systems and risks
     * Patterns of trust practices in human-computer interactions
     * Effects of trustworthy systems upon user, corporate, and
       governmental behavior
     * Impact of trustworthy systems in enhancing trust in cloud-like
       infrastructures
     * Adequacy of guarantees provided by trustworthy systems for
       systems critically dependent upon trust, such as elections and
       government oversight
     * Impact of trustworthy systems upon digital forensics, police
       investigations and court proceedings
     * Game theoretical approaches to modelling or designing trustworthy
       systems
     * Approaches to model and simulate scenarios of how trustworthy
       systems would be used in corporate environments and in personal
       space
     * Economic drivers for trustworthy systems in corporate
       environment
     * Experimental economics studies of trustworthiness
     * Interplay between privacy, privacy enhancing technologies and
       trustworthy systems
     * Evaluation of research methods used in the research of
       trustworthy and trusted computing
     * Critiques of trustworthy systems
     * Metrics of trust
     * Privacy Aspects of Trust Computing
     * Engineering Processes for Trustworthy Computing

Submitted papers must not substantially overlap papers that have
been published or that are simultaneously submitted to a journal,
conference or workshop. Simultaneous submission of the same work
is not allowed. Authors of accepted papers must guarantee that their
papers will be presented at the conference.

Format of paper submissions
----------------------------------------
Two formats of submissions are solicited:
     * Full papers (up to 18 pages) that report on in-depth, mature
       research results.
     * Short papers (up to 9 pages) that describe brief results or
       exciting work-in-progress.

All paper submissions to TRUST 2014 must be in LNCS format and written
in English. The templates for LNCS format can be downloaded from:
http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0

All submissions must be within the page limits mentioned above.
No changes to margins, spacing, or font sizes (or anything else)
are allowed. The program committee reserves the right to request
the source files for a submission to verify compliance with this
requirement.

Moreover, all submissions must be anonymized. An author's name should
occur only in references to that author's related work, which should
be referenced in the third person and not be overtly distinguishable
from the referenced work of others.

Only PDF files will be accepted.

Poster submissions
----------------------------------------
TRUST 2014 encourages the presentation of posters that aim at the
rapid dissemination of new ideas, work in progress or preliminary
results. We particularly encourage PhD students to present their
ongoing work.

For details on poster submissions check our website:
http://bit.ly/trust2014poster

Organisation Committee
----------------------------------------
     * General Chair: Ioannis Askoxylakis, FORTH-ICS, GR
     * Program Chair - Socio-economic Strand:
         - Daniel J. Weitzner, MIT, USA
     * Program Chairs - Technical Strand:
         - Sotiris Ioannidis, FORTH-ICS, GR
         - Thorsten Holz, Ruhr University Bochum, DE

For the full Program Committee see: http://bit.ly/trust2014pc

TRUST 2014 Twitter Updates
----------------------------------------
Announcements regarding TRUST 2014 will be sent through @syssecproject
on Twitter: https://twitter.com/syssecproject