Call for Paper

The Call for Paper is available here.

Scope of Conference

Topics of relevance include but are not limited to:

  • Fundamental features and functionalities of trusted systems
  • Primitives and mechanisms for building a chain of trust
  • Design principles and architectures for trusted modules and platforms
  • Trustworthy infrastructures and cloud computing services
  • Implementation technologies for trusted modules and platforms
  • Cryptographic aspects of trusted systems, including cryptographic algorithms and protocols, and their implementation and application in trusted systems
  • Secure network operation
  • Mobile trusted systems
  • Applications of trusted systems
  • Trusted cloud computing
  • Trusted intellectual property protection: metering, watermarking, digital rights management and enterprise rights management
  • Software & hardware protection for trusted systems
  • Authentication and access control for trusted systems
  • Identity & privacy aspects of trusted systems
  • Attestation for trusted systems, including measurement and verification of the behavior of trusted systems
  • Emerging technologies and standards for trusted systems
  • Trust metrics and robust trust inference in distributed systems
  • Usability and reliability aspects of trusted systems
  • Trust modeling, economic analysis and protocol design for rational and malicious adversaries
  • Virtualization for trusted systems
  • Limitations of trusted systems
  • Security analysis of trusted systems, including formal methods proofs, provable security and automated analysis
  • Security policies for, and management of, trusted systems
  • Intrusion resilience and revocation aspects of trusted systems
  • Scalability aspects of trusted systems
  • Compatibility aspects of trusted systems
  • Experiences in building real-world trusted systems
  • Socio-economic aspects of trusted systems


Instructions for Authors

Submissions must not substantially duplicate work that any of the authors have published elsewhere or have submitted in parallel to any journal or other conference or workshop that has proceedings.

All submissions will be blind-reviewed. Papers must be anonymous, with no author names, affiliations, acknowledgements, or obvious references. A submitted paper should begin with a title, a short abstract, and a list of keywords.

The proceedings of INTRUST 2015 will be published in the Springer-Verlag Lecture Notes in Computer Science series. Papers published in the LNCS series are indexed by both EI and ISTP. Clear instructions for the preparation of a final proceedings version will be sent to the authors of accepted papers.

Selected papers will be invited to be published (in approval) in

  • International Journal of Information Security
  • Frontiers of Computer Science

Papers should be submitted in standard LNCS format (, with length at most 15 pages (excluding bibliography and appendices). Authors of accepted papers must guarantee that their paper will be presented at the conference.

Papers must be submitted in PDF format using the EasyChair conference management system at

Please send any enquiries

Best Paper Award

The conference has a best paper award to the value of US$1,000; all papers are eligible for this award.

 Copyright © The 7th International Conference on Trusted Systems(INTRUST 2015)