<p><big> <font>STM (Security and Trust Management)</font></big><big><span class="tc"><font> is a working group of ERCIM (European Research Consortium in Informatics and Mathematics). STM′10 is the sixth workshop in this series and will be held in Athens, Greece, in conjunction with </font></span></big><big><font><a href="http://www.ds.unipi.gr/europki10/">EUROPKI′10</a> and <a href="http://www.critis.net/2010/index.html">CRITIS′10</…;, and just after <a href="http://www.esorics2010.org/">ESORICS′10</a>.</font… class="tc"><font><br></font></span></big></p> <p><big><font>STM has the following aims: </font> </big></p> <ul><li><font>to investigate the foundations and applications of security and trust in ICT; </font></li><li><font>to study the deep interplay between trust management and common security issues such as confidentiality, integrity, and availability; </font></li><li><font> to identify and promote new areas of research connected with security management (e.g., dynamic and mobile coalition management, P2P, MANETs, Web/GRID services); </font></li><li><font> to identify and promote new areas of research connected with trust management (e.g., reputation, recommendation, and collaboration); </font></li><li><font> to provide a platform for presenting and discussing emerging ideas and trends. </font></li></ul> <font><br>Topics of interest include, but are not limited to:<br></font><font> </font><font> </font> <center> <table style="width: 805px; height: 296px;"> <tbody> <tr> <td style="text–align: justify;" width="350px"><font>access control</font></td> <td style="text–align: justify;" width="350px"><font>reputation systems and architectures</font></td> </tr> <tr> <td style="text–align: justify;"><font>cryptography</font></td> <td style="text–align: justify;"><font>security and trust management architectures</font></td> </tr> <tr> <td style="text–align: justify;"><font>data protection</font></td> <td style="text–align: justify;"><font>semantics and computational models for security and trust</font></td> </tr> <tr> <td style="text–align: justify;"><font>digital right management</font></td> <td style="text–align: justify;"><font>trust assessment and negotiation</font></td> </tr> <tr> <td style="text–align: justify;"><font>economics of security and privacy</font></td> <td style="text–align: justify;"><font>trust in mobile code</font></td> </tr> <tr> <td style="text–align: justify;"><font>key management</font></td> <td style="text–align: justify;"><font>trust in pervasive environments</font></td> </tr> <tr> <td style="text–align: justify;"><font>ICT for securing digital as well as physical assets</font></td> <td style="text–align: justify;"><font>trust models</font></td> </tr> <tr> <td style="text–align: justify;"><font>identity management</font></td> <td style="text–align: justify;"><font>trust management policies</font></td> </tr> <tr> <td style="text–align: justify;"><font>networked systems security</font></td> <td style="text–align: justify;"><font>trusted platforms and trustworthy systems</font></td> </tr> <tr> <td style="text–align: justify;"><font>privacy and anonymity</font></td> <td style="text–align: justify;"><font>trustworthy user devices</font></td> </tr> </tbody> </table> </center> <font><br></font> <big><font><span class="tc">The primary focus is on high–quality original unpublished research, case studies, and implementation experiences. We encourage submissions discussing the application and deployment of security technologies in practice.</span></font></big>
Abbrevation
STM 10
City
Athens
Country
Greece
Deadline Paper
Start Date
End Date
Abstract