16th International Conference on Trust, Privacy and Security in Digital Business - TrustBus 2019

Linz, Austria
August 26 - 29, 2019


New computing paradigms, such as cloud computing, big data and the Internet of Things open new horizons to businesses by making possible the provision of high quality services all over the world. All these developments ultimately aim at improving our quality of life, at making it easier to generate wealth, and at ensuring that businesses remain competitive in the global marketplace. 

These developments have been made possible in a remarkably short time span, by virtue of the fact that information and communication technologies move fast; sometimes they move too fast for society and for governments. This explains why such rapid technological evolutions cannot be problem-free. In the domain of digital businesses, concerns are raised regarding the lack of trust in electronic procedures and the extent to which information security and user privacy can be ensured. 
In answer to these concerns, the 16th International Conference on Trust, Privacy and Security in Digital Business (TrustBus’19) will provide an international forum for researchers and practitioners to exchange information regarding advancements in the state of the art and practice of trust and privacy in digital business. 

TrustBus’19 will bring together researchers from different disciplines, developers, and users all interested in the critical success factors of digital business systems. We are interested in papers, work-in-progress reports, and industrial experiences describing advances in all areas of digital business applications related to trust and privacy,  including, but not limited to:

➢    Anonymity and pseudonymity 
➢    Common practices, legal and regulatory issues in digital business 
➢    Delivery technologies and scheduling protocols 
➢    Economics of information systems security and privacy 
➢    Enterprise management and consumer protection 
➢    Intellectual property and digital rights management 
➢    Languages for description of services and contracts 
➢    Models for access control and authentication 
➢    Cryptographic building-blocks for e-business applications 
➢    Business architectures and underlying infrastructures 
➢    Design of business models with security requirements 
➢    Electronic cash, wallets and pay-per-view systems 
➢    Security, privacy and trust in e-services 
➢    Cloud computing security and privacy 
➢    Identity management, identity theft and trust management 
➢    Information audit and trust 
➢    Trust and reputation in digital business environments 
➢    Security and privacy in cyber physical systems 
➢    Methodologies for privacy by design and by default 
➢    Methodologies for privacy impact assessment 
➢    Privacy and Security Patterns 
➢    Security and privacy governance and management 
➢    Intrusion detection and information filtering 
➢    Online transaction processing 
➢    PKI & PMI 
➢    Security of P2P transactions and scenarios 
➢    Security, privacy and trust in real-time Internet e-Services 
➢    Reliability and security of content and data 
➢    Reputation in services provision 
➢    Secure process integration and management 
➢    Reliable auction, e-procurement and negotiation technology 
➢    Transactional Models 
➢    Security, privacy and trust in mobile commerce environments 
➢    Usability of security and privacy technologies and services 
➢    Security and privacy models for pervasive information systems 
➢    Shopping, trading, and contract management tools 
➢    Security and privacy policies 
➢    Multi-factor authentication schemes 
➢    Accountability, Transparency and Intervenability 
➢    Security and privacy in big data processing 
➢    Security and privacy of mobile applications     


Authors are invited to submit original papers not previously published nor submitted in parallel for publication to any other conference, workshop or journal. Papers should be limited to 15 pages of 11pt type including title page, figures and bibliography. To submit a paper to TrustBus’2018 please use the DEXA Conf Driver Conference Management System (https://confdriver.ifs.tuwien.ac.at/dexa2019/). 

Accepted papers will be included in the Conference proceedings, to be published by Springer in their LNCS series. Camera-ready versions of the papers should not exceed 15 pages and must comply with the “Authors Instructions” that can be found at: http://www.springer.de/comp/lncs/authors.html  

Important dates: 

  • Submission deadline: March 18, 2019  
  • Notification to authors: May 23, 2019
  • Camera-ready version: June 13, 2019

General Chair:

  • Sokratis K. Katsikas, Norwegian University of Science and Technology, Norway & Open University of Cyprus, Cyprus

Program Committee co-Chairs:

  • Stefanos Gritzalis, University of the Aegean, Greece
  • Edgar R. Weippl, SBA Research, Austria

Program Committee Members (TBC):

  • George Aggelinos, University of Piraeus (Greece) 
  • Esma Aimeur, University of Montreal (Canada) 
  • Nieto Ana, University of Malaga (Spain) 
  • Rudolph Carsten, Monash University (Australia) 
  • David Chadwick, University of Kent (UK) 
  • Cheng-Kang Chu, Huawei International (Singapore) 
  • Nathan Clarke, University of Plymouth (UK) 
  • Frederic Cuppens, ENST Bretagne (France) 
  • José María de Fuentes,University Carlos III of Madrid (Spain)
  • Josep Domingo-Ferrer, Universitat Rovira i Virgili (Spain) 
  • Prokopios Drogkaris, University of the Aegean (Greece) 
  • Eduardo B. Fernandez, Florida Atlantic University (US)
  • Simone Fischer-Huebner, Karlstad University (Sweden)
  • Sara Foresti, Universita' degli Studi di Milano (Italy) 
  • Juergen Fuss, University of Applied Science in Hagenberg (Austria) 
  • Dimitris Geneiatakis, Aristotle University of Thessaloniki (Greece) 
  • Dimitris Gritzalis, Athens Univ. of Economics and Business (Greece) 
  • Stefanos Gritzalis, University of the Aegean (Greece) 
  • Marit Hansen, Unabhaengiges Landeszentrum fuer Datenschutz Schleswig-Holstein (Germany) 
  • Ferrer Josep L., University Islas Baleares (Spain) 
  • Christos Kalloniatis, University of the Aegean (Greece)
  • Maria Karyda, University of the Aegean (Greece) 
  • Vasilios Katos, Bournemouth University (UK) 
  • Sokratis Katsikas, University of Piraeus (Greece) 
  • Spyros Kokolakis, University of the Aegean (Greece) 
  • Stewart Kowalski, Norwegian University of Science and Technology (Norway) 
  • Costas Lambrinoudakis, University of Piraeus (Greece)
  • Martucci Leonardo, Karlstad University (Sweden) 
  • Javier Lopez, University of Malaga (Spain)
  • Stephen Marsh, University of Ontario, Institute of Technology (Canada)
  • Fabio Martinelli, National Research Council - C.N.R (Italy) 
  • Vashek Matyas, Masaryk University (Czech Republic) 
  • David Megias, Open University of Catalonia (Spain) 
  • Markowitch Olivier, Universite Libre de Bruxelles (Belgium) 
  • Martin S. Olivier, University of Pretoria (South Africa) 
  • Rolf Oppliger, eSECURITY Technologies (Switzerland) 
  • Maria Papadaki, University of Plymouth (UK) 
  • Andreas Pashalidis, BSI (Germany) 
  • Joachim Posegga, Inst. of IT-Security and Security Law, Passau (Germany) 
  • Panagiotis Rizomiliotis, University of the Aegean (Greece) 
  • Rios Ruben, University of Malaga (Spain) 
  • De Capitani di Vimer Sabrina, University of Milan (Italy) 
  • Pierangela Samarati, University of Milan (Italy) 
  • Miguel Soriano, Universitat Politecnica de Catalunya (Spain) 
  • Krenn Stephan, AIT Austrian Institute of Technology GmbH (Austria) 
  • Stephanie Teufel, University of Fribourg (Switzerland) 
  • Aggeliki Tsochou, Ionian University (Greece) 
  • Edgar Weippl, SBA (Austria) 
  • Christos Xenakis, University of Piraeus (Greece)