CfP STM September 26-30, 2016, Heraklion, Crete, Greece

June 23, 2016

12th International Workshop on Security and Trust Management (STM) Heraklion, Crete, Greece - September 26-30, 2016. STM is a working group of ERCIM (European Research Consortium in Informatics and Mathematics). STM 2016 is the twelfth workshop in this series and will be held in Heraklion, Crete, Greece on September 30th, 2016, in conjunction with the 21st European Symposium On Research in Computer Security (ESORICS 2016 The workshop seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of security and trust in ICTs.

Important Dates

  • Paper Submission due:     *June 30, 2016*
  • Notification to authors:     *July 29, 2016*
  • Camera ready due:            *August 7, 2016*

Submission Instructions

Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. All submissions should be appropriately anonymized (i.e., papers should not contain author names or affiliations, or obvious citations). Submissions should be at most 16 pages, including the bibliography and well-marked appendices, and should follow the LNCS style (author instructions can be found here

Submissions are to be made to the submission web site at Only pdf files will be accepted. Submissions not meeting these guidelines risk  rejection without consideration of their merits. Papers must be received by the deadline. Authors of accepted papers must guarantee that their papers will be presented at the workshop. The proceedings will be published by Springer in the Lecture Notes in Computer Science (LNCS) series.

Topics of interest

     * Access control

     * Mobile security

     * Security and trust in the Internet of Things

     * Anonymity

     * Networked systems security

     * Security and trust in pervasive computing

     * Applied cryptography

     * Operating systems security

     * Security and trust in services

     * Authentication

     * Privacy

     * Security and trust in social networks

     * Complex systems security

     * Security and trust metrics

     * Social implications of security and trust

     * Data and application security

     * Security and trust policies

     * Trust assessment and negotiation

     * Data protection

     * Security and trust management architectures

     * Trust in mobile code

     * Data/system integrity

     * Security and trust for big data

     * Trust models

     * Digital right management

     * Security and trust in cloud environments

     * Trust management policies

     * Economics of security and privacy

     * Security and trust in content delivery networks

     * Trust and reputation systems

     * Formal methods for security and trust

     * Security and trust in crowdsourcing

     * Trusted platforms

     * Identity management

     * Security and trust in grid computing

     * Trustworthy systems and user devices

     * Legal and ethical issues


Program Chairs

     * Gilles Barthe,    IMDEA Software Institute, Spain

     * Evangelos Markatos,    FORTH, Greece


Publicity Chair

     * Panagiotis Papadopoulos,    FORTH, Greece