*STM 2016 - 12th International Workshop on Security and Trust Management 
(STM), Heraklion, Crete, Greece on September 26-27th, 2016 (Submissions 
due June 23, 2016)*

This is the twelfth workshop in this series 
(http://stm2016.ics.forth.gr/) and
will be held in conjunction with the 21st European Symposium On Research
in Computer Security (ESORICS 2016 http://www.ics.forth.gr/esorics2016/).
The workshop seeks submissions from academia, industry, and government
presenting novel research on all theoretical and practical aspects of 
security
and trust in ICTs.

Submission Instructions
------------------------------------
     Submitted papers must not substantially overlap papers that have been
     published or that are simultaneously submitted to a journal or a
     conference with proceedings. Submissions are to be made to the 
submission
     web site at https://www.easychair.org/conferences/?conf=stm2015.
     Authors of accepted papers must guarantee that their
     papers will be presented at the workshop. The proceedings will be
     published by Springer in the Lecture Notes in Computer Science (LNCS)
     series.

Topics of interest
------------------------------------
     * Access control
     * Mobile security
     * Security and trust in the Internet of Things
     * Anonymity
     * Networked systems security
     * Security and trust in pervasive computing
     * Applied cryptography
     * Operating systems security
     * Security and trust in services
     * Authentication
     * Privacy
     * Security and trust in social networks
     * Complex systems security
     * Security and trust metrics
     * Social implications of security and trust
     * Data and application security
     * Security and trust policies
     * Trust assessment and negotiation
     * Data protection
     * Security and trust management architectures
     * Trust in mobile code
     * Data/system integrity
     * Security and trust for big data
     * Trust models
     * Digital right management
     * Security and trust in cloud environments
     * Trust management policies
     * Economics of security and privacy
     * Security and trust in content delivery networks
     * Trust and reputation systems
     * Formal methods for security and trust
     * Security and trust in crowdsourcing
     * Trusted platforms
     * Identity management
     * Security and trust in grid computing
     * Trustworthy systems and user devices
     * Legal and ethical issues

For any questions, please contact the program chair at stm2016@ics.forth.gr