9th International Workshop on Security and Trust Management (STM 2013)
9th International Workshop on Security and Trust Management (STM 2013)
in conjunction with ESORICS 2013
STM (Security and Trust Management) is a working group of ERCIM (European Research Consortium in Informatics and Mathematics). STM 2013 is the ninth workshop in this series and will be held in Egham, UK, in conjunction with the 18th European Symposium on Research in Computer Security (ESORICS 2013).
*KEYNOTE SPEAKERS*
- Michael Huth (Imperial College, UK)
- Claire Vishik (Intel Corp., UK)
*TOPICS OF INTEREST*
- Access and usage control
- Accountability and audit
- Anonymity
- Applied cryptography
- Authentication
- Business process security and privacy
- Complex systems security
- Data and application security
- Data protection
- Data/system integrity
- Digital rights management
- Economics of security and privacy
- E-services
- Formal methods for security and trust
- Identity management
- Legal and ethical issues
- Networked systems security
- Operating systems security
- Privacy
- Trust assessment and negotiation
- Trust in mobile code
- Trust models
- Trust management policies
- Trust and reputation systems
- Trusted platforms
- Trustworthy systems and user devices
- Web services security
*PROGRAM CHAIRS*
Rafael Accorsi (University of Freiburg, Germany)
Silvio Ranise (Fundazione Bruno Kessler, Italy)
*PUBLICITY CHAIR*
Giovanni Livraga (Universita' degli Studi di Milano, Italy)
*PROGRAM COMMITTEE*
Benjamin Aziz, University of Portsmouth
Liqun Chen, Hewlett Packard Labs, U.K.
Mauro Conti, University of Padua
Jorge Cuellar, Siemens, Germany
Frederic Cuppens, TELECOM Bretagne
Nora Cuppens-Boulahia, Telecom Bretagne
Roberto Di Pietro, Universita di Roma Tre, Italy
Wenliang Du, Syracuse University
Isao Echizen, National Institute of Informatics
Carmen Fernandez-Gago, University of Malaga
Sara Foresti, Universita` degli Studi di Milano
Joaquin Garcia-Alfaro, Telecom SudParis
Xinyi Huang, Fujian Normal University, China
Meiko Jensen, Independent Centre for Privacy and Data Protection Schleswig-Holstein
Jan Jurjens, TU Dortmund & Fraunhofer ISST
Dimitris Karagiannis, University of Vienna
Florian Kerschbaum, SAP Research
Dogan Kesdogan, Universitat Regensburg
Felix Klaedtke, ETH Zurich
Adam J. Lee, University of Pittsburgh
Giovanni Livraga, Universita degli Studi di Milano
Javier Lopez, University of Malaga
Fabio Martinelli, IIT-CNR
Raimundas Matulevicius, University of Tartu
Catherine Meadows, NRL
Charles Morisset, Newcastle University
Indrakshi Ray, Colorado State University, USA
Pierangela Samarati, Universita` degli Studi di Milano
George Spanoudakis, City University London, U.K.
Mark Strembeck, Vienna University of Economics and BA, Institute of Information Systems, New Media Lab
Willy Susilo, University of Wollongong, Australia
Mahesh Tripunitara, The University of Waterloo
Michael Waidner, Fraunhofer SIT
Nicola Zannone, Eindhoven University of Technology
- Networked systems security
- Trustworthy systems and user devices
- Trusted platforms
- Trust models
- Trust management policies
- Trust in mobile code
- Trust assessment and negotiation
- Trust and reputation systems
- privacy
- Business process security and privacy
- Legal and ethical issues
- Identity management
- E-services
- Data/system integrity
- Data protection
- Data and application security
- Complex systems security
- 2013
- Workshop
- Applied Cryptography
- Economics of Security and Privacy
- Access Control
- Authentication
- Database and Storage Security
- Information Accountability and Usage Control
- Formal Methods and Theory of Security
- Digital Rights Management
- Pseudonymity, Anonymity and Untraceability
- Software and Application Security
- Operating Systems Security
- Systems Security