header photo


Deadline for submissions had passed, however registration is open for those interested in attending.

[PDF version for printing]

Important dates:

  • Submission due: extended to March 4, 2011 (11:59pm ET)
  • Notification: 25 March 2011 31 March 2011
  • Camera ready: 12 April 2011
  • Conference: 22-24 June 2011

The conference solicits original papers on any aspect (technical or social and economic) of the design, application and usage of trusted and trustworthy computing, which concerns a broad range of concepts including trustworthy infrastructures, cloud computing, services, hardware, software and protocols. Topics of interest include, but are not limited to:

Technical Strand:

  • Architecture and implementation technologies for trusted platforms and trustworthy infrastructures
  • Trust, Security and Privacy in embedded systems
  • Trust, Security and Privacy in social networks
  • Trusted mobile platforms and mobile phone security
  • Implementations of trusted computing (hardware and software)
  • Applications of trusted computing
  • Trustworthy infrastructures and services for cloud computing (including resilience)
  • Attestation and integrity verification
  • Cryptographic aspects of trusted and trustworthy computing
  • Design, implementation and analysis of security hardware, i.e., hardware with cryptographic and security functions, physically unclonable functions (PUFs)
  • Intrusion resilience in trusted computing
  • Virtualization for trusted platforms
  • Secure storage
  • Security policy and management of trusted computing
  • Access control for trusted platforms
  • Privacy aspects of trusted computing
  • Verification of trusted computing architectures
  • Usability and end-user interactions with trusted platforms
  • Limitations of trusted computing

Socio-economic Strand:

  • Usability and user perceptions of trustworthy systems and risks
  • Effects of trustworthy systems upon user, corporate, and governmental behavior
  • Economic drivers for trustworthy systems in corporate environment
  • The impact of trustworthy systems in enhancing trust in cloud-like infrastructures
  • The adequacy of guarantees provided by trustworthy systems for systems critically dependent upon trust, such as elections and government oversight
  • The impact of trustworthy systems upon digital forensics, police investigations and court proceedings
  • Game theoretical approaches to modeling or designing trustworthy systems
  • Approaches to model and simulate scenarios of how trustworthy systems would be used in corporate environments and in personal space
  • Experimental economics studies of trustworthiness
  • The interplay between privacy, privacy enhancing technologies and trustworthy systems
  • Critiques of trustworthy systems

Authors are requested to submit papers in anonymized form, of length at most 15 pages (including references and appendices), using at least a 10pt font and 1“ margins on A4 or letter paper. All submissions must be in pdf format.


See Springer website for online version of proceedings.