IBM Japan
Skip to main content
 
     Home  |  Products & services  |  Support & downloads  |  My account
 Select a country
 IBM Research home
Tokyo Research Lab
Workshop Home
 ·Call For Papers
 ·Submission
 ·Registration
 ·Accepted Papers
 ·Program
 ·Location
About 1st WATC
 
 
 


IBM Research

The Second Workshop on Advances in Trusted Computing (WATC '06 Fall)

November 30 - December 1, 2006
Ivy Hall Aogaku Kaikan, Tokyo, Japan
Sponsored by the Japanese Ministry of Economy, Trade and Industry (METI)


CALL FOR PAPERS (pdf version is here)

The Second Workshop on Advances in Trusted Computing (WATC), at Tokyo, Japan, sponsored by the Ministry of Economy, Trade and Industry, Japan (METI) under contract, New-generation Information Security R&D Program, will be devoted to the dissemination and further development of the boundary areas between trusted computing and information security. This is the second installment of an informal workshop series that started in March 2006. The workshop aims to bring together researchers and practitioners from various areas working on trusted computing and to be instrumental in shaping the identity of the Trusted Computing community. The workshop is open to all interested people.

Conference Scope

Modern computer systems in large-scale, decentralized, and heterogeneous environments are now facing the diverse threats such as from viruses and other malware. Security research seeks to make computers safer and less vulnerable to those IT threats, and thus more dependable. The goal of Trusted Computing is to allow computers and servers to offer improved computer security relative to that what is currently available.

The workshop solicits technical papers offering research contributions spanning from foundations, theory and tools of trusted computing to up-to-date issues. Papers may present theory, applications, or practical experiences on topics including, but not limited to:

  • models and principles for trusted computing
  • formal models and verification
  • software- or hardware-based approaches
  • cryptographic approaches
  • remote attestation of trusted devices
  • standardization in trusted computing groups
  • issues in trusted platform modules
  • property-based and semantic attestation
  • theory and practice for trusted virtual domains
  • privacy and legal issues
  • applications and case studies
  • compliance and conformance
  • trust evaluations of computing systems
  • scalability
  • applications and use cases
  • system and platform architectures
  • access control and information flow control
  • communications
  • virtualization and trusted computing
  • trusted client architectures
  • integrity-evaluating architectures
  • integrity management infrastructures

Program Chair

Hideki Imai
Professor, Department of Electric, Electronic and Communication Engineering
Faculty of Science and Engineering, Chuo University,
Director of Research Center for Information Security (RCIS)
National Institute of Advanced Industrial Science and Technology (AIST)

Program Committee

Selim Aissi (Intel, US)
Ran Canetti (IBM Research, US)
Chris I Dalton (HP UK Lab / OpenTC, UK)
Jun Furukawa (NEC, Japan)
Michael Franz (University of California, Irvine, US)
Goichiro Hanaoka (RCIS/AIST, Japan)
Angelos D. Keromytis (Columbia University, US)
Hiroaki Kikuchi (Tokai University, Japan)
Seigo Kotani (Fujitsu, Japan)
Michiharu Kudo (IBM Research, Japan)
Wenbo Mao (HP China Lab, China)
Tsutomu Matsumoto (Yokohama National University, Japan)
Ronald Perez (IBM Research, US)
Ahmad-Reza Sadeghi (Ruhr University Bochum / OpenTC, Germany)
Kouichi Sakurai (Kyushu University, Japan)
Matthias Schunter (IBM Research, Switzerland / OpenTC, Germany)
Sean W. Smith (Dartmouth University, US)
Koutarou Suzuki (NTT, Japan)
Toshihiro Tabata (Okayama University, Japan)
Satoru Tezuka (Hitachi, Japan)
Leendert Van Doorn (CMU/IBM Research, US)
Moti Yung (Columbia University, US)

Organizing Committee

Michiharu Kudo, Sachiko Yoshihama, Yuji Watanabe (IBM Research, Japan)
Goichiro Hanaoka (RCIS, AIST, Japan)

Instructions for Paper Submissions

Submissions must not substantially duplicate work that any of the authors has published elsewhere. Accepted papers require the attendance of at least one author. The workshop proceedings will be available at the workshop and via its website. The post-workshop proceedings which includes the full version of the selected papers presented in this workshop is being planed. The length of a submission as a regular technical paper should be at most 12 pages, excluding bibliography and appendices. Short papers for work-in-progress, case studies, or position papers should be up to 6 pages. Any reasonable format will be allowed, but the final camera-ready version of the paper should be at most 15 pages. The submission should begin with the type of paper (regular or short), the title, the author list, a short abstract, and a list of keywords. The introduction should summarize the contributions of the paper at a level appropriate for a non-specialist reader. Committee members are not required to read the appendices; and the paper should be intelligible without them. Papers must be submitted electronically by August 20, 2006. Notification of acceptance or rejection will be sent to authors by September 30, 2006. Submissions should preferably be in PDF format, viewable with Adobe Acrobat reader. Submissions should be sent as an attachment by email to workshop secretariat. Please visit the submission page for further instructions. If you have any questions about submissions, please contact the workshop secretariat (workshop secretariat)

Important Dates

Submission due:August 20, 2006  August 13, 2006
Notification of acceptance:September 30, 2006
Camera ready version due:October 31, 2006
WATC workshop:November 30 to December 1, 2006


For more information, contact the secretariat at workshop secretariat
  
 
  About IBM  |  Privacy  |  Terms of use  |  Contact