Abbrevation
STM 10
City
Athens
Country
Greece
Deadline Paper
Start Date
End Date
Abstract

<p><big> <font>STM (Security and Trust Management)</font></big><big><span class="tc"><font> is a working group of ERCIM (European Research Consortium in Informatics and Mathematics)&#046; STM&#8242;10 is the sixth workshop in this series and will be held in Athens, Greece, in conjunction with </font></span></big><big><font><a href="http://www&#046;ds&#046;unipi&#046;gr/europki10/">EUROPKI&#8242;10</a&gt; and <a href="http://www&#046;critis&#046;net/2010/index&#046;html">CRITIS&#8242;10</…;, and just after <a href="http://www&#046;esorics2010&#046;org/">ESORICS&#8242;10</a>&#046;</font… class="tc"><font><br></font></span></big></p> <p><big><font>STM has the following aims: </font> </big></p> <ul><li><font>to investigate the foundations and applications of security and trust in ICT; </font></li><li><font>to study the deep interplay between trust management and common security issues such as confidentiality, integrity, and availability; </font></li><li><font> to identify and promote new areas of research connected with security management (e&#046;g&#046;, dynamic and mobile coalition management, P2P, MANETs, Web/GRID services); </font></li><li><font> to identify and promote new areas of research connected with trust management (e&#046;g&#046;, reputation, recommendation, and collaboration); </font></li><li><font> to provide a platform for presenting and discussing emerging ideas and trends&#046; </font></li></ul> <font><br>Topics of interest include, but are not limited to:<br></font><font> </font><font> </font> <center> <table style="width: 805px; height: 296px;"> <tbody> <tr> <td style="text&#8211;align: justify;" width="350px"><font>access control</font></td> <td style="text&#8211;align: justify;" width="350px"><font>reputation systems and architectures</font></td> </tr> <tr> <td style="text&#8211;align: justify;"><font>cryptography</font></td> <td style="text&#8211;align: justify;"><font>security and trust management architectures</font></td> </tr> <tr> <td style="text&#8211;align: justify;"><font>data protection</font></td> <td style="text&#8211;align: justify;"><font>semantics and computational models for security and trust</font></td> </tr> <tr> <td style="text&#8211;align: justify;"><font>digital right management</font></td> <td style="text&#8211;align: justify;"><font>trust assessment and negotiation</font></td> </tr> <tr> <td style="text&#8211;align: justify;"><font>economics of security and privacy</font></td> <td style="text&#8211;align: justify;"><font>trust in mobile code</font></td> </tr> <tr> <td style="text&#8211;align: justify;"><font>key management</font></td> <td style="text&#8211;align: justify;"><font>trust in pervasive environments</font></td> </tr> <tr> <td style="text&#8211;align: justify;"><font>ICT for securing digital as well as physical assets</font></td> <td style="text&#8211;align: justify;"><font>trust models</font></td> </tr> <tr> <td style="text&#8211;align: justify;"><font>identity management</font></td> <td style="text&#8211;align: justify;"><font>trust management policies</font></td> </tr> <tr> <td style="text&#8211;align: justify;"><font>networked systems security</font></td> <td style="text&#8211;align: justify;"><font>trusted platforms and trustworthy systems</font></td> </tr> <tr> <td style="text&#8211;align: justify;"><font>privacy and anonymity</font></td> <td style="text&#8211;align: justify;"><font>trustworthy user devices</font></td> </tr> </tbody> </table> </center> <font><br></font> <big><font><span class="tc">The primary focus is on high&#8211;quality original unpublished research, case studies, and implementation experiences&#046; We encourage submissions discussing the application and deployment of security technologies in practice&#046;</span></font></big>