• December 6 2015:Programme is updated.
  • December 2 2015:Programme is available online.
  • November 19 2015:Registration notice is available online.For those who need a conference registration notice, please click here.
  • November 18 2015:Contacts is updated.
  • November 17 2015:Accepted papers is available online.

Welcome to The 7th International Conference on Trusted Systems(INTRUST 2015)

The 7th International Conference on Trusted Systems(INTRUST 2015) focuses on the theory, technologies and applications of trusted systems. It is devoted to all aspects of trust computing systems, including trusted modules, platforms, networks, services and applications, as well as security concerns and privacy issues of systems, from their fundamental features and functionalities to design principles, architecture and implementation technologies. The goal of the conference is to bring academic and industrial researchers, designers, and implementers together with end-users of trusted systems, in order to foster the exchange of ideas in this challenging and fruitful area.INTRUST 2015 will be held at Beijing, China, on Dec. 7th-8th, 2015.

INTRUST 2015 is the next event in a series of highly successful international conferences, previously held as INTRUST 2014 (The 6th International Conference on Trusted Systems) (Beijing, China),INTRUST 2013 (Graz, Austria), INTRUST 2012 (London, UK), INTRUST 2011 (Beijing, China), INTRUST 2010 (Beijing, China), and INTRUST 2009 (Beijing, China). The conference will be hosted by Beijing University of Technology. INTRUST 2015 solicits original papers on any aspect of the theory, advanced development and applications of trusted computing, trusted systems and general trust issues in modern computing systems.

We are looking forward to welcoming you in Beijing, China.

Sincerely Yours!

Yongfei Han

Chairman of the General Committee 


Conference website:

Paper Submission Web Server:

 The Deadline of Registration is 2015-12-05 or on desk.          Registration Page >>>   

updated: 2015-11-21

 Copyright © The 7th International Conference on Trusted Systems(INTRUST 2015)