<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40"><head><meta http-equiv=Content-Type content="text/html; charset=iso-8859-1"><meta name=Generator content="Microsoft Word 15 (filtered medium)"><!--[if !mso]><style>v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0cm;
margin-bottom:.0001pt;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-fareast-language:EN-US;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:#0563C1;
text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-priority:99;
color:#954F72;
text-decoration:underline;}
p.msonormal0, li.msonormal0, div.msonormal0
{mso-style-name:msonormal;
mso-margin-top-alt:auto;
margin-right:0cm;
mso-margin-bottom-alt:auto;
margin-left:0cm;
font-size:11.0pt;
font-family:"Calibri",sans-serif;}
span.StileMessaggioDiPostaElettronica18
{mso-style-type:personal;
font-family:"Calibri",sans-serif;
color:windowtext;}
span.StileMessaggioDiPostaElettronica19
{mso-style-type:personal-reply;
font-family:"Calibri",sans-serif;
color:windowtext;}
.MsoChpDefault
{mso-style-type:export-only;
font-size:10.0pt;}
@page WordSection1
{size:612.0pt 792.0pt;
margin:70.85pt 2.0cm 2.0cm 2.0cm;}
div.WordSection1
{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]--></head><body lang=IT link="#0563C1" vlink="#954F72"><div class=WordSection1><p class=MsoNormal><span lang=EN-US>[Apologies if you receive multiple copies of this message]<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>==========================================================================<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>CALL FOR PAPERS<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>9th International Symposium on Secure Virtual Infrastructures --<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Cloud and Trusted Computing (C&TC 2019)<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>October 21-22, 2019 -- Rhodes, Greece, <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><a href="http://www.otmconferences.org">http://www.otmconferences.org</a><o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>==========================================================================<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>===========<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Description<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>===========<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>Current and future service-based software needs to remain focused towards the development and deployment of large and complex intelligent and networked information systems, required for internet-based and intranet-based systems in organizations, as well to move to IoT integration and big data analytics. Today, service-based software covers a very wide range of application domains as well as technologies and research issues. This has found realization through Cloud Computing, Big Data, and IoT. Vital element in such networked, virtualized, and sensor-based information systems are the notions of trust, security, privacy and risk management.<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Cloud and Trusted Computing (C&TC 2019) is the 9th International Symposium on Cloud Computing, Trusted Computing and Secure Virtual Infrastructures, organized as part of the OnTheMove Federated Conferences & Workshops. C&TC 2019 will be held in Rhodes, Greece.<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>The conference solicits submissions from both academia and industry presenting novel research in the context of Cloud Computing, Big Data, and IoT, presenting theoretical and practical approaches to cloud, big data, and IoT trust, security, privacy and risk management. The conference will provide a special focus on the intersection between cloud paradigm, big data analytics, and IoT integration, bringing together experts from the three communities to discuss on the vital issues of trust, security, privacy and risk management in Cloud Computing, shedding the light on novel issues and requirements in big data and IoT domains. Potential contributions could cover new approaches, methodologies, protocols, tools, or verification and validation techniques. We also welcome review papers that analyze critically the current status of trust, security, privacy and risk management in the Cloud, Big Data, and IoT. Papers from practitioners who encounter trust, security, privacy, and risk management problems, and seek understanding are finally welcome.<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>===========<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Topics<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>===========<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>Topics of interest are classified in four main themes and include, but are not limited to:<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>TRUST, SECURITY, PRIVACY AND RISK MANAGEMENT <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Assurance Techniques<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Access Control, Authorization, and Authentication<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Big data security and privacy<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Blockchain<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Cloud Computing with Autonomic and Trusted Environment<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Cooperative systems<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Cryptographic Algorithms and Protocols<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Cyber Attack, Crime and Cyber War<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- DRM, Watermarking Technology, IP Protection<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Emergency and Security Systems<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- End-to-end security over complex cloud supply chain<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Forensics<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Human Interaction with Trusted and Autonomic Computing Systems<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Identity and Trust Management<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- IoT security and privacy<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Multimedia Security Issues over Mobile and Wireless Clouds<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Network Security<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Networks of Trust, Clouds of Trust<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Privacy, Anonymity<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Privilege Management Infrastructure<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Reliable Computing and Trusted Computing<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Risk evaluation and Management<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Security, Dependability and Autonomic Issues in Ubiquitous Computing<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Security Models and Quantifications<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Self-protection and Intrusion-detection in Security<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Trust Evaluation and Prediction in Service-Oriented Environments<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Trust, Security, Privacy and Confidentiality<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Trust in big data analytics<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Trust in IoT environments<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Trusted Cloud-Edges computations<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Trusted Computing in virtualized environments<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Trusted Execution Environments<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Trusted P2P, Web Service, SoA, SaaS, EaaS, PaaS, XaaS<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Virus Detections and Anti-virus Techniques/Software<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>DATA MANAGEMENT<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Algorithms and Computations on Encrypted Data<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Big Data, Frameworks and Systems for Parallel and Distributed Computing<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Big Data Processing and Analytics<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Big Data Preparation<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Big Data Representation<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Big Data Visualization- Database as a Service, Multi-tenancy, Data management and analytics as a service<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Data Provenance<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Data Integrity<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Data Science and Scalable Machine Learning<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Elasticity and Scalability for Cloud Data Management Systems<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Encryption Systems for IoT Data<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- High Availability and Reliability<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Interoperability between Clouds- New Protocols, Interfaces and Data Models for Cloud Databases<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Resource and Workload Management in Cloud Databases<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Sensor-Based Data Collection, Management, and Security<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Service Level Agreements and Contracts<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Transactional Models for Cloud Databases, Consistency and Replication<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Threats and countermeasures<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Virtualization and Cloud databases, Storage Structures and Indexing<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>INFRASTRUCTURES AND ARCHITECTURES<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Autonomic Computing Theory, Models, Architectures and Communications<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Big Data Infrastructures<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Cloud Resource provisioning with QoS Guarantees<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Cloud Operation and Resource Management<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Cloud Performance Modeling and Benchmarks<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Datacenter Architecture and Management<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Formal methods and Tools for Cloud computing<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Infrastructures for Social Computing and Networking<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- IoT Infrastructures<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- NoSQL Databases<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Software Architectures and Design for Trusted Emerging Systems<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Virtualized Computing Infrastructures<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>APPLICATIONS<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Big Data Applications and Case Studies<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Cloud Business Applications and Case Studies<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Clouds and Social Media, Network and Link Analysis<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Data Intensive Applications<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- IoT Applications and Case Studies<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Large Scale Cloud Applications, Reality Mining<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Mobile Cloud Services<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- New Parallel / Concurrent Programming Models for Cloud Computing<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Pervasive / Ubiquitous Computing in the Cloud<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Reliability, Fault Tolerance, Quality-of-Service<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Service Level Agreements and Performance Measurement<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Service-Oriented Architectures, RESTful Services in Cloud Environments<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>===============<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Important Dates<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>===============<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>Conference Paper Submission Deadline: July 15, 2019<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Acceptance Notification: Aug 13, 2019<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Camera Ready Due: Aug 30, 2019<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Author Registration Due: Aug 30, 2019<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>================<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Paper Submission<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>================<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>FULL PAPERS<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Regular paper submissions to Cloud and Trusted Computing 2019 (C&TC 2019) must present original, highly innovative, prospective and forward-looking research in one or more of the themes given above. Full papers must break new ground, present new insight, deliver a significant research contribution and provide validated support for its results and conclusions. Successful submissions typically represent a major advance for the fields of cloud computing, big data, and IoT referencing and relating the contribution to existing research work, giving a comprehensive, detailed and understandable explanation of a system, study, theory or methodology, and support the findings with a compelling evaluation and/or validation. Each paper must be submitted as a single PDF file in Springer Lecture Notes in Computer Science format (no longer than 18 pages in length). Accepted regular papers will be included in the conference main proceedings and presented in the paper sessions. Submissions to C&TC 2019 must not be under review by any other conference or publication at any time during the C&TC review cycle, and must not be previously published or accepted for publication elsewhere.<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>NOTES (SHORT PAPERS)<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Short papers (not longer than 8 pages in length) must report new results and provide support for the results, as a novel and valuable contribution to the field – just like full papers. Short papers are intended for succinct work that is nonetheless in a mature state ready for inclusion in archival proceedings. Short papers will be held to the same standard of scientific quality as full papers, albeit for a shorter presentation, and must still state how they fit with respect to related work, and provide a compelling explanation and validation. Short papers must be submitted as single PDF file in Springer Lecture Notes in Computer Science format. Accepted short papers will be published in the conference main proceedings and will be presented in the paper sessions of the conference.<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>Paper submission site: <a href="https://easychair.org/conferences/?conf=otm2019">https://easychair.org/conferences/?conf=otm2019</a><o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>PAPER FORMATTING AND PRESENTING<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>The paper and notes submission site giving all the relevant submission details is located at: <a href="http://www.otmconferences.org/index.php/paper-submission/authors-kit">http://www.otmconferences.org/index.php/paper-submission/authors-kit</a>. Failure to comply with the formatting instructions for submitted papers or notes will lead to the outright rejection of the paper without review. Failure to commit to presentation at the conference automatically excludes a paper from the proceedings.<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal>===============<o:p></o:p></p><p class=MsoNormal>Program Chairs<o:p></o:p></p><p class=MsoNormal>===============<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>- Claudio Agostino Ardagna, Universita' degli Studi di Milano, Italy<o:p></o:p></p><p class=MsoNormal>- Ernesto Damiani, Universita' degli Studi di Milano, Italy<o:p></o:p></p><p class=MsoNormal><span lang=EN-US>- Athanasios Vasilakos, Lulea University of Technology, Sweden<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal>=================<o:p></o:p></p><p class=MsoNormal>Program Committee <o:p></o:p></p><p class=MsoNormal>=================<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>- Marco Anisetti, Universita' degli Studi di Milano, Italy<o:p></o:p></p><p class=MsoNormal>- Rasool Asal, British Telecommunications, UK <o:p></o:p></p><p class=MsoNormal>- Valerio Bellandi, Universita' degli Studi di Milano, Italy<o:p></o:p></p><p class=MsoNormal>- Adrian Belmonte, ENISA, Greece<o:p></o:p></p><p class=MsoNormal>- Michele Bezzi, SAP, France<o:p></o:p></p><p class=MsoNormal><span lang=EN-US>- Ashok Kumar Das, International Institute of Information Technology, India<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Scharam Dustdar, Technical University of Vienna, Austria<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Nabil El Ioini, Free University of Bozen, Italy<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Stefanos Gritzalis, University of the Aegean, Greece<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Meiko Jensen, Unabhängiges Landeszentrum für Datenschutz Schleswig-Holstein, Kiel, Germany<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- George Karabatis, University of Maryland, USA<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Patrick Hung, University of Ontario, Canada<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Miguel Vargas Martin, University of Ontario, Canada<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Weizhi Meng, Technical University of Denmark, Denmark<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Antonio Munoz, University of Malaga, Spain<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Evangelos Rekleitis, ENISA, Greece<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Stefan Schulte, Technical University of Vienna, Austria<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Julian Schuette, Fraunhofer, Germany<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Jun Shen, University of Wollongong, Australia<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Christos XENAKIS, University of Piraeus, Greece<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Jingwei Yang, California State University, USA<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Chia-Mu Yu, National Chung Hsing University, Taiwan<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Shangguang Wang, Beijing University of Posts and Telecommunications, China<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>===============<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Publicity Chair <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>===============<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>- Nabil El Ioini, Free University of Bozen, Italy<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>More information available at <a href="http://otmconferences.org">http://otmconferences.org</a><o:p></o:p></span></p><p class=MsoNormal><span style='mso-fareast-language:IT'><br><img border=0 width=420 height=97 style='width:4.375in;height:1.0125in' id="_x0000_i1025" src="cid:image001.jpg@01D52620.D6986C20" alt="MailScanner Signature Unimi"><br>Il tuo 5 x mille progetti <br>Sostieni la ricerca, investi sul futuro dei giovani <br><br>Universita` degli Studi di Milano - codice fiscale 80012650158 <o:p></o:p></span></p></div></body></html>