<<

S TM 2 0 1 0 6 t h I n t er n a t i o n a l W o r k s h o p o n S ecu r i t y a n d Tr u s t M a n a g em en t

h t t p :/ / w w w . i s a c. u m a . es / s t m 1 0

23-24 September, 2010, Athens, Greece C a l l f o r P a p e r s

Program Co-Chairs Workshop scope Jorge Cuellar, Siemens, Germany STM (Security and Trust Management) is a working Javier Lopez, of Malaga, Spain group of ERCIM (European Research Consortium in Informatics and Mathematics). STM’10 is the sixth General Co-Chairs workshop in this series and will be held in Athens, Gilles Barthe, IMDEA Software, Spain Greece in conjunction with EUROPKI'10 and Alex Pretschner, Fraunhofer IESE, Germany CRITIS'10, and just after ESORICS'10. Local Organization Chair Topics of interest include, but are not limited to: Angeliki Tsochou, University of Piraeus, Greece - access control - cryptography Publicity Chair - digital right management Carmen Fernandez-Gago, University of Malaga, Spain - of security - key management Program Committee (confirmed) - ICT for securing digital as well as physical assets Rafael Accorsi, Freiburg University, Germany - identity management Iliano Cervesato, Carnegie Mellon University, Qatar - networked systems security Joris Claessens, Microsoft EMIC, Germany - privacy and anonymity Jim Clarke, WIT, Ireland - reputation systems and architectures Cas Cremers, ETH Zurich, - security and trust management architectures Sabrina de Capitani, Universitá degli Studi diMilano, Italy - semantics and computational models for security Christian Damsgaard Jensen, Techical University of Denmark and trust Holger Dreger, Siemens, Germany - trust assessment and negotiation - trust in mobile code Simone Fischer-Huebner, , Sweden - trust in pervasive environments Peter Herrmann, NTNU, Norway - trust models Sushil Jajodia, George Mason University, USA - trust management policies Martin Johns, SAP Research, Germany - trusted platforms and trustworthy systems Guenter Karjoth, IBM Research, Switzerland - trustworthy user devices Costas Lambrinoudakis, University of Piraeus, Greece Instructions for paper submission Daniel Le Metayer, INRIA, France Authors are invited to submit original papers not Ninghui Li, Purdue University, USA previously published nor submitted in parallel for Peng Liu, Pennsylvania State University, USA publication to any other conference, workshop or Volkmar Lotz, SAP Research, France journal. All submissions (in PDF format) must be Fabio Martinelli, CNR, Italy anonymous. They will be blind reviewed by at least Sjouke Mauw, University of , Luxembourg three reviewers. Catherine Meadows, NRL, USA

Stig F. Mjolsnes, NTNU, Norway Post-proceedings will be published by Springer in the Ricardo Neisse, Fraunhofer IESE, Germany Lecture Notes in Computer Science (LNCS) series. Michael Rusinowitch, INRIA, France Additionally, extended versions of selected papers will Peter Ryan, University of Luxembourg, Luxembourg be published in a special issue of "Journal of Computer Pierangela Samarati, Università degli Studi di Milano, Italy Security". Damien Sauveron, XLIM, , France

Jean-Marc Seigneur, , Switzerland All submissions should comply with the “Authors Ketil Stoelen, SINTEF, Norway Instructions” that can be found at: Ulrich Ultes-Nitsche, University of , Switzerland http://www.springer.de/comp/lncs/authors.html and Luca Viganò, Università di Verona, Italy should not exceed 16 pages including references. Bogdan Warinschi, University of Bristol, UK

Important dates Submission of papers: June 20, 2010 25th of June 2010 Notification to authors: July 20, 2010 Camera-ready version: August 18, 2010