Call for Papers InTrust 2012: 4th International conference on Trusted Systems 17th-19th December 2012, London, UK www.intrust2012.com Building on the success of INTRUST 2009, 2010 and 2011 (all of which were held in Beijing), this conference focuses on the theory, technologies and applications of trusted systems. It is devoted to all aspects of trusted computing systems, including trusted modules, platforms, networks, services and applications, from their fundamental features and functionalities to design principles, architecture and implementation technologies. The goal of the conference is to bring academic and industrial researchers, designers, and implementers together with end-users of trusted systems, in order to foster the exchange of ideas in this challenging and fruitful area. The conference will be hosted by the Information Security Group at Royal Holloway, University of London. INTRUST 2012 solicits original papers on any aspect of the theory, advanced development and applications of trusted computing, trustworthy systems and general trust issues in modern computing systems. Submissions must not substantially duplicate work that any of the authors have published elsewhere or have submitted in parallel to any journal or other conference or workshop that has proceedings. Submissions will take place entirely via a web system. All submissions will be blind-reviewed. Papers must be anonymous, with no author names, affiliations, acknowledgements, or obvious references. A submitted paper should begin with a title, a short abstract, and a list of keywords. As was the case for INTRUST 2009 (LNCS 6163), INTRUST 2010 (LNCS 6802) and INTRUST 2011 (LNCS 7222, to appear), the proceedings of INTRUST 2012 will be published in the Springer-Verlag Lecture Notes in Computer Science series. Unlike previous editions of this conference, it is intended that the proceedings will be available at the conference. Papers published in the LNCS series are indexed by both EI and ISTP. Clear instructions for the preparation of a final proceedings version will be sent to the authors of accepted papers. Authors are strongly recommended to submit their papers in the standard LNCS format (see http://www.springer.com/computer/lncs?SGWID=0-164-0-0-0 for details), with length at most 15 pages (excluding bibliography and appendices). Committee members are not required to review more pages than this, so papers should be intelligible within this length. Submissions not meeting these guidelines risk rejection without consideration of their merits. Authors of accepted papers must guarantee that their paper will be presented at the conference. Papers must be submitted using the EasyChair conference management system at: https://www.easychair.org//conferences/?conf=intrust2012 Please send any enquiries to: webmaster@intrust2012.com The conference has a best paper award to the value of US$1,000, sponsored by Singapore Management University; all papers are eligible for this award. Topics of relevance include but are not limited to: Fundamental features and functionalities of trusted systems Primitives and mechanisms for building a chain of trust Design principles and architectures for trusted modules and platforms Implementation technologies for trusted modules and platforms Cryptographic aspects of trusted systems, including cryptographic algorithms and protocols, and their implementation and application in trusted systems Scalable safe network operation in trusted systems Mobile trusted systems, including trusted mobile platforms, sensor networks, mobile (ad hoc) networks, peer-to-peer networks, Bluetooth, etc. Storage aspects of trusted systems Applications of trusted systems, e.g. trusted email, web services and e-commerce services Trustworthy infrastructures and cloud computing services Trusted intellectual property protection: metering, watermarking, digital rights management and enterprise rights management Software protection for trusted systems Hardware security for trusted systems Authentication and access control for trusted systems Key, identity & certificate management for trusted systems Privacy aspects of trusted systems Attestation for trusted systems, including measurement and verification of the behaviour of trusted systems Standards organisations and their contributions to trusted systems, e.g. TCG, ISO/IEC, IEEE 802.11 Emerging technologies for trusted systems, e.g. RFID, memory spots, smart cards Trust metrics and robust trust inference in distributed systems Usability and reliability aspects of trusted systems Trust modeling, economic analysis and protocol design for rational and malicious adversaries Virtualisation for trusted systems Limitations of trusted systems Security analysis of trusted systems, including formal methods proofs, provable security and automated analysis Security policies for, and management of, trusted systems Intrusion resilience and revocation aspects of trusted systems Scalability aspects of trusted systems Compatibility aspects of trusted systems Experiences in building real-world trusted systems Socio-economic aspects of trusted systems Key dates Extended deadline for submissions: Friday 20 July 2012 Notifications to authors: Friday 24 August 2012 Camera ready due: Friday 28 September 2012 Opening of conference: Monday 17 December 2012 Conference organisation Honorary Chairs Yongfei Han, BJUT & ONETS, China Moti Yung, Google & Columbia University, USA General Chairs Liqun Chen, HP Laboratories, UK Chris Mitchell, RHUL, UK Allan Tomlinson, RHUL, UK Programme Committee Chairs Chris Mitchell, RHUL, UK Allan Tomlinson, RHUL, UK Programme Committee Endre Bangerter, Bern University of Applied Sciences, Switzerland Feng Bao, I2R, Singapore Giampaolo Bella, Università di Catania, Italy Haibo Chen, Shanghai Jiao Tong University, China Zhong Chen, Peking University, China Kurt Dietrich, Graz University of Technology, Austria Xuhua Ding, Singapore Management University, Singapore Loic Duflot, SGDN, France Dieter Gollmann, Hamburg University of Technology, Germany David Grawrock, Intel, USA Sigrid Guergens, Fraunhofer Institute for Secure Information Technology, Germany Dirk Kuhlmann, HP Laboratories, UK Xuejia Lai, Shanghai Jiao Tong University, China Jiangtao Li, Intel, USA Shujun Li, University of Konstanz, Germany Peter Lipp, Graz University of Technology, Austria Javier Lopez, University of Malaga, Spain Andrew Martin, University of Oxford, UK Shin'ichiro Matsuo, NICT, Japan Yi Mu, University of Wollongong, Australia David Naccache, ENS, France Kenny Paterson, Royal Holloway, University of London, UK Graeme Proudler, HP Laboratories, UK Sihan Qing, Chinese Academy of Sciences, China Scott Rotondo, Oracle, USA Mark Ryan, University of Birmingham, UK Willy Susilo, University of Wollongong, Australia Qiang Tang, University of Twente, Netherlands Claire Vishik, Intel, USA Jian Weng, Jinan University, China Shouhuai Xu, UTSA, USA Rui Xue, Chinese Academy of Sciences, China Xinwen Zhang, Huawei Research Center, USA Yongbin Zhou, Chinese Academy of Sciences, China Liehuang Zhu, Beijing Institute of Technology, China Yan Zhu, Peking University, China Steering Committee Yongfei Han, BJUT & ONETS, China Moti Yung, Google & Columbia University, USA Liqun Chen, HP Laboratories, UK Robert Deng, SMU, Singapore Chris Mitchell, RHUL, UK Sponsors Singapore Management University