posted by user: rafael_accorsi || 3984 views || tracked by 6 users: [display]

SBP 2013 : Workshop on Security in Business Processes

FacebookTwitterLinkedInGoogle

Link: http://www.inf.unibz.it/sbp13/
 
When Aug 26, 2013 - Aug 26, 2013
Where Beijing, China
Submission Deadline May 25, 2013
Notification Due Jun 1, 2013
Final Version Due Jul 23, 2013
Categories    business process management   information security   auditing and control   enterprise architecture
 

Call For Papers

================================================================
SBP'13: 2nd Workshop on Security in Business Processes
Site: (http://www.inf.unibz.it/sbp13/)
PDF: (http://bit.ly/SBP-Flyer)

in conjunction with the

11th Int'l Conference on Business Process Management
(http://bpm2013.tsinghua.edu.cn/)
================================================================

Following the successful events in 2012 (check out the journal report at
(http://bit.ly/X7qwCy)) and 2011, the 2nd Workshop on Security in
Business Processes (SBP'13) brings together researchers and
practitioners interested in security management of business process in
process-aware information systems.

SBP'13 encourages innovative methods for business process security audit
and control along the entire business process life-cycle: from design
time verification to online operational support and post-mortem
analysis. Furthermore, it welcomes contributions beyond the strictly
technical character, for instance those considering economic, legal and
standardization issues.

*Keynote*
Hejiao Huang (HIT Shenzhen Grad. School, China)

*TOPICS of INTEREST*
SBP13 addresses topics related to security/compliance audit and control and business processes, including:

- Alignment
- Authorization
- Accountability
- Audit reduction
- Business provenance
- Case studies
- Conformance checking
- Compliance checking
- Continuous audit
- Cost-benefit analysis
- Data-aware process mining
- Formal reasoning
- Fraud detection
- Economics of audit
- Experience reports
- Information flow control
- Log formats
- Meta-models for analysis
- Operational decision support
- Privacy-aware process discovery
- Requirements elicitation
- Requirements formalization
- Risk analysis and measurement
- Root-Cause Analysis
- Runtime verification/monitoring
- Security testing
- Trace clustering
- Usage control
- Business process forensics
- Business process simulation

*SUBMISSION INSTRUCTIONS*

Submitted manuscripts must be written in English and be no longer than 12 pages. They must be formatted using the LNCS format (http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0). Submissions will be reviewed by at least three PC members based on their originality, significance, technical soundness and clarity of exposition. The workshop papers will be published by Springer as a post-workshop proceedings volume in the series Lecture Notes in Business Information Processing (LNBIP). The submission website is at (https://www.easychair.org/conferences/?conf=sbpw13)

*IMPORTANT DATES*
Paper submission: May 25th, 2013
Paper notification: June 25th, 2013
Camera-ready version: July 23rd, 2013
Workshop: August 26th, 2013

*ORGANIZERS*
Wil van der Aalst, Eindhoven University of Technology, the Netherlands
Rafael Accorsi, University of Freiburg, Germany
Raimundas Matulevicius, University of Tartu, Estonia

*PROGRAM COMMITTEE*
Anne Baumgrass, HPI, Germany
Achim Brucker, SAP AG, Germany
Benoit Depaire, Hasselt University, Belgium
Jason Crampton, University of London, UK
Khaled Gaaloul, CRP Henri Tudor, Luxembourg
Aditya Ghose, University of Wollongong, Australia
Hejiao Huang, Shenzhen Graduate School, China
Michael Huth, Imperial College, UK
Fuyuki Ishikawa, National Institute of Informatics, Japan
Jan Jürjens, Technical University of Dortmund, Germany
Dimka Karastoyanova, University of Stuttgart, Germany
Günter Karjoth, IBM Research, China
Peter Karpati, Institute for Energy Technology, Norway
Seok-Won Lee, Ajou University, Korea
Lin Liu, Tsinghua University, China
Heiko Ludwig, IBM Almaden Research Center, USA
Nicolas Mayer, CRP Henri Tudor, Luxembourg
Per H. Meland, SINTEF, Norway
Marko Montali, Free University of Bozen-Bolzano, Italy
Haralambos Mouratidis, University of East London, UK
Andreas Opdahl, University of Bergen, Norway
Günther Pernul, University of Regensburg, Germany
Silvio Ranise, Fundazione Bruno Kessler, Italy
Stefanie Rinderle-Ma, University of Vienna, Austria
David G. Rosado, University of Castilla-La Mancha, Spain
Shazia Sadiq, University of Queensland, Australia
Guttorm Sindre, Norwegian University of Science and Technology, Norway
Mark Strembeck, Vienna University of Economics and Business, Austria
Jan M. van der Werf, Technical University of Eindhoven, the Netherlands
Nicola Zannone, Technical University of Eindhoven, the Netherlands

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
IWIP 2024   2024 4th International Workshop on Image Processing (IWIP 2024)
ACM AICCC 2024   ACM--2024 7th Artificial Intelligence and Cloud Computing Conference (AICCC 2024)
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
ICISS 2024   The 20th International Conference on Information Systems Security (ICISS-2024)
ACM-Ei/Scopus-ITCC 2024   2024 4th International Conference on Information Technology and Cloud Computing (ITCC 2024)-EI Compendex
BPMDS 2024   Business Process Modeling, Development, and Support
ICISDM 2024   2024 8th International Conference on Information System and Data Mining (ICISDM 2024)
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 2
S&P 2025   The 45th IEEE Symposium on Security and Privacy