2011国际可信系统会议概况及论文征集
Programme(Finalised)(WORD Version) Programme(Finalised)(PDF Version)
 
Accepted Papers(WORD Version) Accepted Papers(PDF Version) REGISTRATION FORM(English) REGISTRATION FORM(Chinese)   Download PDF Version Download WORD Version

INTRUST 2011

The Third International Conference on Trusted Systems

Nov 27 - 29, 2011
Conference Venue :International Exchange Center of Beijing Institute of Technology(MAP)
(You can see the detailed information in the REGISTRATION FORM)
Beijing, P. R. China

Conference website: www.onets.com.cn//intrust11.

Paper Submission Web Server: https://www.easychair.org/conferences/?conf=intrust2011.

Important Dates:

Submission due (extended): 17th September 2011
Notification: 18 October 2011
Camera ready for pre-proceedings due: 1 November 2011
Conference: 27-29 November 2011
Camera ready for proceedings due: 31 January 2012

Introduction

Building on the success of INTRUST 2009 and INTRUST 2010 (both were held in Beijing, P. R. China), this conference focuses on the theory, technologies and applications of trusted systems. It is devoted to all aspects of trusted computing systems, including trusted modules, platforms, networks, services and applications, from their fundamental features and functionalities to design principles, architecture and implementation technologies. The goal of the conference is to bring academic and industrial researchers, designers, and implementers together with end-users of trusted systems, in order to foster the exchange of ideas in this challenging and fruitful area. The conference will be hosted by the Beijing Institute of Technology and ONETS.

INTRUST 2011 solicits original papers on any aspect of the theory, advanced development and applications of trusted computing, trustworthy systems and general trust issues in modern computing systems. The conference will have an academic track and an industrial track. This call for papers is for contributions to both of the tracks. Submissions to the academic track should emphasize theoretical and practical research contributions to general trusted system technologies, while submissions to the industrial track may focus on experiences in the implementation and deployment of real-world systems.

Instructions for authors

Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to any journal or other conference or workshop that has proceedings. Submissions will take place entirely via a web system. All submissions will be blind-reviewed. Papers must be anonymous, with no author names, affiliations, acknowledgements, or obvious references. A submitted paper should begin with a title, a short abstract, and a list of keywords.

As was the case for INTRUST 2009 (LNCS 6163) and INTRUST 2010 (LNCS 6802), the proceedings of INTRUST 2011 will be published in the Springer-Verlag Lecture Notes in Computer Science series and will be available after the conference.Papers of LNCS are indexed by both EI and ISTP. Clear instructions for the preparation of a final proceedings version will be sent to the authors of accepted papers. We strongly recommend that authors submit their papers in the standard LNCS format (see http://www.springer.com/computer/lncs?SGWID=0-164-0-0-0 for the details) with length at most 15 pages (excluding bibliography and appendices). Committee members are not required to review more than that, so the paper should be intelligible and self-contained within this length. Submissions not meeting these guidelines risk rejection without consideration of their merits.

Authors of accepted papers must guarantee that their paper will be presented at the conference. Authors are asked to clearly indicate whether their submissions are for the academic track or the industrial track in the title.

Best paper award

The conference has a best paper award sponsored by Singapore Management University for US$1000; all papers are eligible for this award.

Topics of relevance include but are not limited to:

- Fundamental features and functionalities of trusted systems
- Primitives and mechanisms for building a chain of trust
- Design principles and architectures of trusted modules and platforms
- Implementation technologies for trusted modules and platforms
- Cryptographic aspects of trusted systems, including cryptographic algorithms and protocols, and their implementation and application in trusted systems
- Scalable safe network operation in trusted systems
- Mobile trusted systems, such as trusted mobile platforms, sensor networks, mobile (ad hoc) networks, peer-to-peer networks, Bluetooth, etc.
- Storage aspects for trusted systems
- Applications of trusted systems, e.g. trusted email, web services and various e-commerce services
- Trustworthy infrastructures and services for cloud computing
- Trusted intellectual property protection: metering, watermarking, digital rights management and enterprise rights management
- Software protection for trusted systems
- Hardware security for trusted systems
- Authentication and access control for trusted systems
- Key, identity and certificate management for trusted systems
- Privacy aspects for trusted systems
- Attestation aspects for trusted systems, including the measurement and verification of the behaviour of trusted systems
- Standards organizations and their contributions to trusted systems, such as TCG, ISO/IEC, IEEE 802.11, etc.
- Emerging technologies for trusted systems, such as RFID, memory spots, smart cards, etc.
- Trust metrics and robust trust inference in distributed systems
- Usability and reliability aspects for trusted systems
- Trust modeling, economic analysis and protocol design for rational and malicious adversaries
- Virtualisation for trusted systems
- Limitations of trusted systems
- Security analysis of trusted systems, including formal method proofs, provable security and automated analysis
- Security policies for, and management of, trusted systems
- Intrusion resilience and revocation aspects for trusted systems
- Scalability aspects of trusted systems
- Compatibility aspects of trusted systems
- Experiences in building real-world trusted systems
- Socio-economic aspects of trusted systems

Conference organization

General Chairs
- Robert Deng, Singapore Management University, Singapore
- Heyuan Huang, Beijing Institute of Technology, China
- Chris Mitchell, RHUL, UK

Programme Committee Chairs
- Moti Yung, Columbia University & Google Inc., USA
- Liqun Chen, HP Laboratories, UK
- Liehuang Zhu, Beijing Institute of Technology, China

Organising Chair
- Liehuang Zhu, Beijing Institute of Technology, China

Publicity Chairs
- Xuhua Ding, Singapore Management University, Singapore
- Lejian Liao, Beijing Institute of Technology, China

PC members
- Endre Bangerter, Bern University of Applied Sciences, Switzerland
- Boris Balacheff, HP Laboratories, UK
- Feng Bao, I2R, Singapore
- Kefei Chen, Shanghai Jiaotong University, China
- Haibo Chen, Fudan University, China
- Zhen Chen, Tsinghua University, China
- Zhong Chen, Peking University, China
- Xuhua Ding, Singapore Management University, Singapore
- Kurt Dietrich, Graz University of Technology, Austria
- Lo颿 Duflot, SGDN, France
- Dengguo Feng, Chinese Academy of Sciences, China
- Dieter Gollmann, Hamburg University of Technology, Germany
- David Grawrock, Intel, USA
- Sigrid G黵gens, Fraunhofer Institute for Secure Information Technology, Germany
- Weili Han, Fudan University, China
- Dirk Kuhlmann, HP Laboratories, UK
- Xuejia Lai, Shanghai Jiaotong University, China
- Jiangtao Li, Intel, USA
- Shujun Li, University of Konstanz, Germany
- Peter Lipp, Graz University of Technology, Austria
- Javier Lopez, University of Malaga, Spain
- Andrew Martin, University of Oxford, UK
- Shin'ichiro Matsuo, NICT, Japan
- Chris Mitchell, RHUL, UK
- Yi Mu, University of Wollongong, Australia
- David Naccache, ENS, France
- Raphael Phan, Loughborough University, UK
- Bart Preneel, KU Leuven, Belgium
- Graeme Proudler, HP Laboratories, UK
- Sihan Qing, Chinese Academy of Sciences, China
- Emily Ratliff, IBM, USA
- Scott Rotondo, Sun Microsystems, USA
- Ahmad-Reza Sadeghi, Technical University Darmstadt and Fraunhofer SIT Darmstadt, Germany
- Kouichi Sakurai, Kyushu University, Japan
- Wenchang Shi, Renmin University, China
- Willy Susilo, University of Wollongong, Australia
- Qiang Tang, University of Twente, Netherlands
- Claire Vishik, Intel, USA
- Guilin Wang, University of Wollongong, Australia
- Jian Weng, Jinan University, China
- Shouhuai Xu, UTSA, USA
- Rui Xue, Chinese Academy of Sciences, China
- Huanguo Zhang, Wuhan University, China
- Xing Zhang, BJUT, China
- Xinwen Zhang, Huawei Research Center, USA
- Yongbin Zhou, Chinese Academy of Sciences, China
- Yan Zhou, Peking University

Steering Committee
- Yongfei Han, BJUT & ONETS, China
- Moti Yung, Google & Columbia University, USA
- Liqun Chen, HP Laboratories, UK
- Robert Deng, SMU, Singapore
- Chris Mitchell, RHUL, UK

Sponsors
- Beijing Institute of Technology
- ONETS
- Singapore Management University
- Springer
- The Administrative Committee of Zhongguangcun Haidian Science Park

Conference enquiries email: intrust@onets.com.cn

 

Sponsors


The Administrative Committee of Zhongguangcun Haidian Science Park

 
 

版权所有:北京密安公司 邮编:100085

北京密安网络技术有限责任公司  地址:北京市海淀区上地信息路12号中关村发展大厦A座402/418室

                            电话:010-84852425   传真:010-84852425-807