TrustBus 2022

The 19th International Conference on Trust, Privacy and Security in Digital Business 

email: dexa@iiwas.org
Papers submission: https://easychair.org/conferences/?conf=trustbus2022


  IMPORTANT DATES  

  • Paper submission: March 7th, 2022
  • Notification of acceptance: May 10th, 2022
  • Camera-ready copies due: June 1st, 2022 

PUBLICATION
All accepted conference papers will be published in a volume of "Lecture Notes in Computer Science" (LNCS) by Springer. All published papers will be indexed appropriately in all major indexes. 

SCOPE
New computing paradigms, such as cloud computing, big data and the Internet of Things open new horizons to businesses by making possible the provision of high quality services all over the world. All these developments ultimately aim at improving our quality of life, at making it easier to generate wealth, and at ensuring that businesses remain competitive in the global marketplace.
These developments have been made possible in a remarkably short time span, by virtue of the fact that information and communication technologies move fast; sometimes they move too fast for society and for governments. This explains why such rapid technological evolutions cannot be problem-free. In the domain of digital businesses, concerns are raised regarding the lack of trust in electronic procedures and the extent to which information security and user privacy can be ensured. 
In answer to these concerns, the 19th International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2022) will provide an international forum for researchers and practitioners to exchange information regarding advancements in the state of the art and practice of trust and privacy in digital business. 
TrustBus 2022 will bring together researchers from different disciplines, developers, and users all interested in the critical success factors of digital business systems. We are interested in papers, work-in-progress reports, and industrial experiences describing advances in all areas of digital business applications related to trust and privacy,  including, but not limited to:
  • Anonymity and pseudonymity 
  • Common practices, legal and regulatory issues in digital business 
  • Delivery technologies and scheduling protocols 
  • Economics of information systems security and privacy 
  • Enterprise management and consumer protection 
  • Intellectual property and digital rights management 
  • Languages for description of services and contracts 
  • Models for access control and authentication 
  • Cryptographic building-blocks for e-business applications 
  • Business architectures and underlying infrastructures 
  • Design of business models with security requirements 
  • Electronic cash, wallets and pay-per-view systems 
  • Security, privacy and trust in e-services 
  • Cloud computing security and privacy 
  • Identity management, identity theft and trust management 
  • Information audit and trust 
  • Trust and reputation in digital business environments 
  • Security and privacy in cyber physical systems 
  • Methodologies for privacy by design and by default 
  • Methodologies for privacy impact assessment 
  • Privacy and Security Patterns 
  • Security and privacy governance and management 
  • Intrusion detection and information filtering 
  • Online transaction processing 
  • PKI & PMI 
  • Security of P2P transactions and scenarios 
  • Security, privacy and trust in real-time Internet e-Services 
  • Reliability and security of content and data 
  • Reputation in services provision 
  • Secure process integration and management 
  • Reliable auction, e-procurement and negotiation technology 
  • Transactional Models 
  • Security, privacy and trust in mobile commerce environments 
  • Usability of security and privacy technologies and services 
  • Security and privacy models for pervasive information systems 
  • Shopping, trading, and contract management tools 
  • Security and privacy policies 
  • Multi-factor authentication schemes 
  • Accountability, Transparency and Intervenability 
  • Security and privacy in big data processing 
  • Security and privacy of mobile applications

SUBMISSION GUIDELINES
Authors are invited to electronically submit original papers not previously published nor submitted in parallel for publication to any other conference, workshop or journal. 
Papers should be limited to 12 pages (plus appendices not exceeding 3 pages).
Formatting guidelines: http://www.dexa.org/formatting_guidelines
Online Papers Submission: https://easychair.org/conferences/?conf=trustbus2022

REVIEW PROCESS
Submitted papers will be carefully evaluated based on originality, significance, technical soundness, and clarity of exposition.

COMMITTEE
Program Committee Co-Chairs

  • Steven Furnell, University of Nottingham, UK
  • Sokratis Katsikas, Norwegian University of Science and Technology, Norway

​​​​​​​Program Committee Members 

  • Cheng-Kang Chu, Huawei Singapore, Singapore
  • Nathan Clarke, University of Plymouth, USA
  • Frédéric Cuppens, Polytechnique Montreal, Canada
  • Sabrina De Capitani di Vimercati, Universita' degli Studi di Milano, Italy
  • Vasiliki Diamantopoulou, University of the Aegean, Greece
  • Josep Domingo-Ferrer, Universitat Rovira i Virgili, Spain
  • Eduardo B. Fernandez, Florida Atlantic University, USA
  • Jose-Luis Ferrer-Gomila, University of the Balearic Islands, Spain
  • Simone Fischer-Hübner, Karlstad University, Sweden
  • Sara Foresti, DI - Universita` degli Studi di Milano, Italy
  • Dimitris Geneiatakis, University of the Aegean, Greece
  • Dimitris Gritzalis, Athens University of Economics & Business, Greece
  • Stefanos Gritzalis, University of Piraeus, Greece
  • Marit Hansen, Unabhängiges Landeszentrum für Datenschutz Schleswig-Holstein, Germany
  • Pallavi Kaliyar, Norwegian University of Science and Technology, Norway
  • Christos Kalloniatis, University of the Aegean, Greece
  • Georgios Kambourakis, University of the Aegean, Greece
  • Farzaneh Karegar, Karlstad University, Sweden
  • Maria Karyda, University of the Aegean, Greece
  • Dogan Kesdogan, Universität Regensburg, Germany
  • Spyros Kokolakis, University of the Aegean, Greece
  • Stephan Krenn, AIT Austrian Institute of Technology GmbH, Austria
  • Costas Lambrinoudakis, University of Piraeus, Greece
  • Antonio Lioy, Politecnico di Torino, Italy
  • Javier Lopez, University of Málaga, Spain
  • Fabio Martinelli, Institute of Informatics and Telematics/CNR, Italy
  • David Megias, Open University of Catalonia, Spain
  • Martin Olivier, University of Pretoria, South Africa
  • Rolf Oppliger, eSECURITY Technologies, Switzerland
  • Pankaj Pandey, Norwegian University of Science and Technology, Norway
  • Maria Papadaki, University of Derby, UK
  • Andreas Pashalidis, BSI, Germany
  • Ahmed Patel, National University of Malaysia, Malaysia
  • Günther Pernul, Universität Regensburg, Germany
  • Nikolaos Pitropakis, Edinburgh Napier University, UK
  • Joachim Posegga, University of Passau, Germany
  • Ruben Rios, University of Malaga, Spain
  • Panagiotis Rizomiliotis, Harokopio University of Athens, Greece
  • Carsten Rudolph, Monash University, Australia
  • Pierangela Samarati, Universita' degli Studi di Milano, Italy
  • Ingrid Schaumüller-Bichl, Information Security, Austria
  • Stephanie Teufel, University of Fribourg, iimt, Switzerland
  • A Min Tjoa, Vienna University of Technology, Austria
  • Aggeliki Tsohou, Ionian University, Greece
  • Edgar Weippl, University of Vienna, Austria
  • Christos Xenakis, University of Piraeus, Greece

For more information contact (dexa@iiwas.org)