With the emergence of new information and communication technologies, smart devices combined with communication infrastructures such as Internet and mobile networks need to provide reliable services.
For this purpose, many application domains with high social and business impact such as personal healthcare, intelligent transportation, home automation, mobile payment, surveillance, may use mobile devices that rely on trust environment. This trust environment may be provided or based on many hardware platforms (such as SIM cards, secure elements for NFC, TPM (Trusted Platform Module)) or TEE (Trusted Execution Environment). Even if these trust platforms are extremely constrained in terms of energy, computational power and memory, they are designed to solve major constraints of security, safety, reliability, efficiency and quality of service.
The most important challenges are: i) the definition of architectures, protocols and algorithms to design trust systems while involving mobile devices and/or cloud computing, and ii) the development and the management of platforms and services that are open, secure, and interoperable to interconnect mobile devices.

The aim of this workshop is to bring together practitioners and researchers from both academia and industry in order to have a forum for discussion and technical presentations on the recent advances in theory, application and implementation of trusted platforms for mobile and/or cloud computing: technologies, protocols, algorithms, applications and services, standardisation initiatives and user experience.
The topics of interest target trusted platforms for either mobile computing or cloud computing. They include the following:


All submissions must be original work not under review at any other workshop, conference, or journal.
The workshop will accept papers describing completed work as well as work-in-progress. Authors are invited to submit Full Papers (up to 8 pages) or Short Papers (up to 4 pages) including figures, tables, and references. Papers should be written according to the IEEE Computer Society format: http://www.computer.org/portal/web/cscps/formatting. Please anonymize your submission: do not put the author(s) names or affiliation(s) at the start of the paper. The review is double-blind.
The submission deadline is January 05th, 2014. The PDF file of your paper must be submitted on line using the following link: https://www.easychair.org/conferences/?conf=tpmcc2014.
For any question, send an email to tpmcc2014@easychair.org.


How to Use TEE to Create a Trusted Platform on a Mobile Device?
John Mersh GlobalPlatform (invited speaker)

How to Use a Secure Element to Secure Access to the Cloud?
John Mersh GlobalPlatform (invited speaker)

Trusted Execution Environments: A Look Under the Hood
Ghada Arfaoui, Saïd Gharout, and Jacques Traoré

Cloudlets Authentication in NFC-based Mobile Computing
Samia Bouzefrane, Amira F. Benkara Mostefa, Fatiha Houacine, and Hervé Cagnon

Mobile Authentication Secure Against Man-in-the-Middle Attacks
Kemal Bicakci, Devrim Unal, Nadir Ascioglu, and Oktay Adalier

SecBus, a Software/Hardware Architecture for Securing External Memories
Jérémie Brunel, Salaheddine Ouaarab, Renaud Pacalet and Guillaume Duc

Explaining the Role of Trust in Cloud Service Acquisition
Joseph K. Adjei

A Secure Cloud Computing Architecture Design
Abir Khaldi, Kamel Karoui, Nada Tanabène, and Henda Ben Ghzala

Analysis of the Impact of Cloud Computing Technology to E-government Performance Evaluation
Hongxia Zhang

Speaker: John Mersh

GlobalPlatform Member Representative

John Mersh Mr. Mersh is a Security Architect within the Architecture and Technology Division at ARM. His focus has been on TrustZone technology and trusted execution environments (TEEs).
Prior to joining ARM, Mr. Mersh worked on hardware security modules at Thales and in mobile security at TTPCom. During this time, he contributed to the Bluetooth specification and the development of the OMTP security standards for mobile devices.
Mr. Mersh is the Editor of the Mobile Platforms Specification within the Trusted Computing Group in addition to contributing to the GlobalPlatform TEE Specifications Working Group.