posted by user: rafael_accorsi || 3597 views || tracked by 6 users: [display]

SBP 2013 : Workshop on Security in Business Processes

FacebookTwitterLinkedInGoogle

Link: http://www.inf.unibz.it/sbp13/
 
When Aug 26, 2013 - Aug 26, 2013
Where Beijing, China
Submission Deadline May 25, 2013
Notification Due Jun 1, 2013
Final Version Due Jul 23, 2013
Categories    business process management   information security   auditing and control   enterprise architecture
 

Call For Papers

================================================================
SBP'13: 2nd Workshop on Security in Business Processes
Site: (http://www.inf.unibz.it/sbp13/)
PDF: (http://bit.ly/SBP-Flyer)

in conjunction with the

11th Int'l Conference on Business Process Management
(http://bpm2013.tsinghua.edu.cn/)
================================================================

Following the successful events in 2012 (check out the journal report at
(http://bit.ly/X7qwCy)) and 2011, the 2nd Workshop on Security in
Business Processes (SBP'13) brings together researchers and
practitioners interested in security management of business process in
process-aware information systems.

SBP'13 encourages innovative methods for business process security audit
and control along the entire business process life-cycle: from design
time verification to online operational support and post-mortem
analysis. Furthermore, it welcomes contributions beyond the strictly
technical character, for instance those considering economic, legal and
standardization issues.

*Keynote*
Hejiao Huang (HIT Shenzhen Grad. School, China)

*TOPICS of INTEREST*
SBP13 addresses topics related to security/compliance audit and control and business processes, including:

- Alignment
- Authorization
- Accountability
- Audit reduction
- Business provenance
- Case studies
- Conformance checking
- Compliance checking
- Continuous audit
- Cost-benefit analysis
- Data-aware process mining
- Formal reasoning
- Fraud detection
- Economics of audit
- Experience reports
- Information flow control
- Log formats
- Meta-models for analysis
- Operational decision support
- Privacy-aware process discovery
- Requirements elicitation
- Requirements formalization
- Risk analysis and measurement
- Root-Cause Analysis
- Runtime verification/monitoring
- Security testing
- Trace clustering
- Usage control
- Business process forensics
- Business process simulation

*SUBMISSION INSTRUCTIONS*

Submitted manuscripts must be written in English and be no longer than 12 pages. They must be formatted using the LNCS format (http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0). Submissions will be reviewed by at least three PC members based on their originality, significance, technical soundness and clarity of exposition. The workshop papers will be published by Springer as a post-workshop proceedings volume in the series Lecture Notes in Business Information Processing (LNBIP). The submission website is at (https://www.easychair.org/conferences/?conf=sbpw13)

*IMPORTANT DATES*
Paper submission: May 25th, 2013
Paper notification: June 25th, 2013
Camera-ready version: July 23rd, 2013
Workshop: August 26th, 2013

*ORGANIZERS*
Wil van der Aalst, Eindhoven University of Technology, the Netherlands
Rafael Accorsi, University of Freiburg, Germany
Raimundas Matulevicius, University of Tartu, Estonia

*PROGRAM COMMITTEE*
Anne Baumgrass, HPI, Germany
Achim Brucker, SAP AG, Germany
Benoit Depaire, Hasselt University, Belgium
Jason Crampton, University of London, UK
Khaled Gaaloul, CRP Henri Tudor, Luxembourg
Aditya Ghose, University of Wollongong, Australia
Hejiao Huang, Shenzhen Graduate School, China
Michael Huth, Imperial College, UK
Fuyuki Ishikawa, National Institute of Informatics, Japan
Jan Jürjens, Technical University of Dortmund, Germany
Dimka Karastoyanova, University of Stuttgart, Germany
Günter Karjoth, IBM Research, China
Peter Karpati, Institute for Energy Technology, Norway
Seok-Won Lee, Ajou University, Korea
Lin Liu, Tsinghua University, China
Heiko Ludwig, IBM Almaden Research Center, USA
Nicolas Mayer, CRP Henri Tudor, Luxembourg
Per H. Meland, SINTEF, Norway
Marko Montali, Free University of Bozen-Bolzano, Italy
Haralambos Mouratidis, University of East London, UK
Andreas Opdahl, University of Bergen, Norway
Günther Pernul, University of Regensburg, Germany
Silvio Ranise, Fundazione Bruno Kessler, Italy
Stefanie Rinderle-Ma, University of Vienna, Austria
David G. Rosado, University of Castilla-La Mancha, Spain
Shazia Sadiq, University of Queensland, Australia
Guttorm Sindre, Norwegian University of Science and Technology, Norway
Mark Strembeck, Vienna University of Economics and Business, Austria
Jan M. van der Werf, Technical University of Eindhoven, the Netherlands
Nicola Zannone, Technical University of Eindhoven, the Netherlands

Related Resources

S&P 2022   IEEE Symposium on Security and Privacy (Third deadline)
ICISSP 2022   8th International Conference on Information Systems Security and Privacy
CEVVE 2022   2022 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2022)
IJNSA 2021   International Journal of Network Security & Its Applications- ERA Listed
NISecurity 2022   2022 International Conference on Network and Information Security (NISecurity 2022)
CSW 2022   2022 International Workshop on Cyber Security (CSW 2022)
NLTM 2022   2nd International Conference on NLP & Text Mining
USENIX 2022   USENIX Security 2022 : 31st USENIX Security Symposium (Winter Deadline)
ASIACCS 2022   ACM Symposium on Information, Computer and Communications Security
AutonomousVehicles 2022   Special Issue - Autonomous Vehicles for Public Transportation Services