Sunday, June 30, 2019

[DMANET] [STM2019 Deadline Extended] CFP - 15th International Workshop on Security and Trust Management

The 15th International Workshop on Security and Trust Management (STM2019) <>
STM Workshop is co-located with ESORICS conference
26-27 September 2019
STM (Security and Trust Management)
<> is a working group of
ERCIM (European Research Consortium in Informatics and Mathematics). STM
2019 is the 15th workshop in this series and will be held in Luxembourg,
in conjunction with the 24th European Symposium on Research in Computer
Security (ESORICS 2019). The workshop seeks submissions from academia,
industry, and government presenting novel research on all theoretical
and practical aspects of security and trust in ICTs.

Example topics of interest are given below, but are not limited to:

* Access control
* Anonymity
* Applied cryptography
* Authentication
* Data and application security
* Data protection
* Data/system integrity
* Digital rights management
* Economics of security and privacy
* Formal methods for security and trust
* Identity management
* Legal and ethical issues
* Mobile security
* Networked systems security
* Operating systems security
* Privacy
* Security and trust metrics
* Security and trust policies
* Security and trust management architectures
* Security and trust for big data
* Security and trust in cloud environments
* Security and trust in content delivery networks
* Security and trust in crowdsourcing
* Security and trust in grid computing
* Security and trust in the Internet of Things
* Security and trust in pervasive computing
* Security and trust in services
* Security and trust in social networks
* Social implications of security and trust
* Trust assessment and negotiation
* Trust in mobile code
* Trust models
* Trust management policies
* Trust and reputation systems
* Trusted platforms
* Trustworthy systems and user devices


Submission Deadline: July 3, 2019
Notification of Acceptance: July 25, 2019
Camera-Ready: August 6, 2019
Conference: September 26-27, 2019

Mauro Conti, University of Padua, Italy
Sjouke Mauw, University of Luxembourg

Eleonora Losiouk, University of Padua, Italy

Joaquin Garcia-Alfaro, Institut Mines-Telecom, France

Aleksandr Pilgun, University of Luxembourg

Pierangela Samarati (chair STM working group), Università degli Studi di
Milano, Italy
Theo Dimitrakos, BT Research and Technology, UK
Javier Lopez, University of Malaga, Spain
Fabio Martinelli, Istituto di Informatica e Telematica, Italy
Sjouke Mauw, University of Luxembourg, Luxembourg
Stig F. Mjølsnes, Norwegian University of Science and Technology, Norway
Ulrich Ultes-Nitsche, University of Fribourg, Switzerland

All submissions should be appropriately anonymized (i.e., papers should
not contain author names or affiliations, or obvious citations).
Submissions should be at most 16 pages in the LNCS format, including the
bibliography and well-marked appendices.

All submissions must be written in English, and only PDF files will be
accepted (a Latex source file will be required for the final version of
accepted papers). The final version of an accepted paper must be in the
format required for publication in the LNCS series.

Submissions not meeting these guidelines risk rejection without
consideration of their merits.

Submissions are to be made to the submission web site at:

Papers must be received by the deadline of July 3, 2019 (11:59 p.m.
American Samoa time). Authors of accepted papers must guarantee that
their papers will be presented at the workshop. As in previous years,
the proceedings are planned to be published by Springer in the Lecture
Notes in Computer Science (LNCS) series.

A paper submitted to STM 2019 cannot be under review for any other
conference or journal during the time it is being considered for STM
2019. Furthermore, after you submit to STM 2019, you must await our
response before submitting elsewhere. If you submit your paper to
another conference or journal either before/after submission of the
paper to STM 2019, we will reject your paper without review and will
also notify the other conference/journal. This restriction applies to
identical as well as to substantially similar papers.

Best Regards,
Eleonora Losiouk, PhD,
Research/Postdoc Fellow,
University of Padua - Department of Mathematics,
SPRITZ - Security and Privacy Research Group

* Contributions to be spread via DMANET are submitted to
* Replies to a message carried on DMANET should NOT be
* addressed to DMANET but to the original sender. The
* original sender, however, is invited to prepare an
* update of the replies received and to communicate it
* via DMANET.