STC 2006 START Conference Manager    

The First ACM Workshop on Scalable Trusted Computing

STC 2006

Submission Page

To revise a previous submission, please type in its passcode below, and press the ENTER button.


If you lost the passcode for your submission, please click HERE.

Use the fields below to make your submission. Follow the instructions, and then use the 'Submit' button at the bottom of the form.

Title of Submission:  

List of Authors:

Please enter the complete list of authors for your submission, in the order in which they will appear on the abstract. You can add as many author slots as you want, to accommodate the total number of authors for your submission.

First name(s) Last name Email Institution

More Authors      Fewer Authors

Contact Information:

First name*
Last name*
       Affiliation Dept/Lab 
Mail Code 
Street Address 
Zip/Postal Code*

Submission Category:

Please enter the category under which the submission should be reviewed.

Submission Type:  


Type (or cut-and-paste) a short ASCII abstract for your submission. It should not include the author/title information, which was already entered above. You must enter plain ASCII text only, and you may not exceed 300 words.


Submit Paper:

Your submission must be in one of the following document formats:

  • Adobe PDF (pdf)
  • Postscript (ps)

The file's name should have the proper MIME extent associated with its document type. For example, a pdf file could have a name such as "mypaper.pdf". If desired, the file may also be compressed in any standard format, with MIME extent corresponding to the compression type (eg., pdf.gz for a gzipped pdf file, etc.).

Find the file containing your submission: 


Please use the list of topics below to characterize your submission. Check all categories that seem appropriate.

models for trusted computing
principles of trusted computing
modeling of computing environments, threats, attacks and countermeasures
limitations, alternatives and tradeoffs regarding trusted computing
trust in authentications, users and computing services
hardware based trusted computing
software based trusted computing
pros and cons of hardware based approach
remote attestation of trusted devices
censorship-freeness in trusted computing
cryptographic support in trusted computing
case study in trusted computing
applications of trusted computing
intrusion resilience in trusted computing
access control for trusted computing
trust of computing systems
principles for handling scales

START Conference Manager (V2.54.5)