Conference Information
InTrust 2014: International Conference on Trustworthy Systems
http://crypto.fudan.edu.cn/intrust2014/Submission Date: |
2014-10-20 Extended |
Notification Date: |
2014-11-10 |
Conference Date: |
2014-12-16 |
Location: |
Beijing, China |
Years: |
6 |
Viewed: 13725 Tracked: 1 Attend: 0
Call For Papers
The InTrust conference focuses on the theory, technologies and applications of trustworthy systems. It is devoted to all aspects of trustworthy computing systems, including trusted modules, platforms, networks, services and applications, as well as security concerns and privacy issues of systems, from their fundamental features and functionalities to design principles, architecture and implementation technologies. The goal of the conference is to bring academic and industrial researchers, designers, and implementers together with end-users of trusted systems, in order to foster the exchange of ideas in this challenging and fruitful area.
INTRUST 2014 is the next event in a series of highly successful International Conferences, previously held as INTRUST (International conference on Trusted Systems) 2013 (Graz, Austria), INTRUST 2012 (London, UK), INTRUST 2011 (Beijing, China), INTRUST 2010 (Beijing, China), and INTRUST 2009 (Beijing, China). The conference will be hosted by Beijing Institute of Technology. INTRUST 2014 solicits original papers on any aspect of the theory, advanced development and applications of trusted computing, trustworthy systems and general trust issues in modern computing systems.
Scope of Conference
Topics of relevance include but are not limited to:
Fundamental features and functionalities of trusted systems
Primitives and mechanisms for building a chain of trust
Design principles and architectures for trusted modules and platforms
Trustworthy infrastructures and cloud computing services
Implementation technologies for trusted modules and platforms
Cryptographic aspects of trusted systems, including cryptographic algorithms and protocols, and their implementation and application in trusted systems
Secure network operation
Mobile trusted systems
Applications of trusted systems
Trusted intellectual property protection: metering, watermarking, digital rights management and enterprise rights management
Software & hardware protection for trusted systems
Authentication and access control for trusted systems
Identity & privacy aspects of trusted systems
Attestation for trusted systems, including measurement and verification of the behavior of trusted systems
Emerging technologies and standards for trusted systems
Trust metrics and robust trust inference in distributed systems
Usability and reliability aspects of trusted systems
Trust modeling, economic analysis and protocol design for rational and malicious adversaries
Virtualization for trusted systems
Limitations of trusted systems
Security analysis of trusted systems, including formal methods proofs, provable security and automated analysis
Security policies for, and management of, trusted systems
Intrusion resilience and revocation aspects of trusted systems
Scalability aspects of trusted systems
Compatibility aspects of trusted systems
Experiences in building real-world trusted systems
Socio-economic aspects of trusted systems
Instructions for Authors
Submissions must not substantially duplicate work that any of the authors have published elsewhere or have submitted in parallel to any journal or other conference or workshop that has proceedings.
All submissions will be blind-reviewed. Papers must be anonymous, with no author names, affiliations, acknowledgements, or obvious references. A submitted paper should begin with a title, a short abstract, and a list of keywords.
The proceedings of InTrust 2014 will be published in the Springer-Verlag Lecture Notes in Computer Science series. Papers published in the LNCS series are indexed by both EI and ISTP. Clear instructions for the preparation of a final proceedings version will be sent to the authors of accepted papers.
Selected papers will be invited to be published (in approval) in
International Journal of Information Security
Frontiers of Computer Science
Papers should be submitted in standard LNCS format (http://www.springer.com/computer/lncs?SGWID=0-164-0-0-0), with length at most 15 pages (excluding bibliography and appendices). Authors of accepted papers must guarantee that their paper will be presented at the conference.
Papers must be submitted in PDF format using the EasyChair conference management system at https://www.easychair.org/conferences/?conf=intrust2014
Best Paper Award
The conference has a best paper award to the value of US$1,000; all papers are eligible for this award.
Last updated by Dou Sun in 2014-10-04
Related Conferences
| Short | Full Name | Conference |
|---|---|---|
| DS | International Conference on Discovery Science | 2018-10-30 |
| CEVVE | International Conference on Electric Vehicle and Vehicle Engineering | 2025-12-26 |
| iCCECE | IEEE International Conference on Computing, Electronics & Communications Engineering | 2020-08-17 |
| ICECOS | International Conference on Electrical Engineering and Computer Science | 2017-08-22 |
| LCTES | ACM SIGPLAN/SIGBED Conference on Languages, Compilers, Tools and Theory for Embedded Systems | 2025-06-16 |
| ICADL | International Conference on Asia Digital Libraries | 2024-12-04 |
| MSAM | International Conference on Modelling, Simulation and Applied Mathematics | 2017-03-26 |
| MCSoC | International Symposium on Embedded Multicore/Many-core Systems-on-Chip | 2025-12-15 |
| IEEE Inertial Sensors | International Symposium on Inertial Sensors and Systems | 2017-03-28 |
| INTERCON | International Conference on Electronics, Electrical Engineering and Computing | 2021-08-05 |
Related Journals
| CCF | Full Name | Impact Factor | Publisher | ISSN |
|---|---|---|---|---|
| Archive for Rational Mechanics and Analysis | 2.600 | Springer | 0003-9527 | |
| IEEE Transaction on Emerging Topics in Computing | 5.100 | IEEE | 2168-6750 | |
| c | Personal and Ubiquitous Computing | Springer | 1617-4909 | |
| c | International Journal of Information Security and Privacy | 0.800 | Idea Group Inc | 1930-1650 |
| International Journal of Digital Signal and Image Processing | AR Publication | 2347-4521 | ||
| c | IET Information Security | 1.300 | IET | 1751-8709 |
| Computational Materials Science | 3.100 | Elsevier | 0927-0256 | |
| Active and Passive Electronic Components | 1.300 | Hindawi | 0882-7516 | |
| International Journal of Parallel Programming | 0.900 | Springer | 0885-7458 | |
| International Journal of Computer Assisted Radiology and Surgery | 2.300 | Springer | 1861-6410 |
| Full Name | Impact Factor | Publisher |
|---|---|---|
| Archive for Rational Mechanics and Analysis | 2.600 | Springer |
| IEEE Transaction on Emerging Topics in Computing | 5.100 | IEEE |
| Personal and Ubiquitous Computing | Springer | |
| International Journal of Information Security and Privacy | 0.800 | Idea Group Inc |
| International Journal of Digital Signal and Image Processing | AR Publication | |
| IET Information Security | 1.300 | IET |
| Computational Materials Science | 3.100 | Elsevier |
| Active and Passive Electronic Components | 1.300 | Hindawi |
| International Journal of Parallel Programming | 0.900 | Springer |
| International Journal of Computer Assisted Radiology and Surgery | 2.300 | Springer |