posted by user: rafael_accorsi || 3730 views || tracked by 6 users: [display]

SBP 2013 : Workshop on Security in Business Processes

FacebookTwitterLinkedInGoogle

Link: http://www.inf.unibz.it/sbp13/
 
When Aug 26, 2013 - Aug 26, 2013
Where Beijing, China
Submission Deadline May 25, 2013
Notification Due Jun 1, 2013
Final Version Due Jul 23, 2013
Categories    business process management   information security   auditing and control   enterprise architecture
 

Call For Papers

================================================================
SBP'13: 2nd Workshop on Security in Business Processes
Site: (http://www.inf.unibz.it/sbp13/)
PDF: (http://bit.ly/SBP-Flyer)

in conjunction with the

11th Int'l Conference on Business Process Management
(http://bpm2013.tsinghua.edu.cn/)
================================================================

Following the successful events in 2012 (check out the journal report at
(http://bit.ly/X7qwCy)) and 2011, the 2nd Workshop on Security in
Business Processes (SBP'13) brings together researchers and
practitioners interested in security management of business process in
process-aware information systems.

SBP'13 encourages innovative methods for business process security audit
and control along the entire business process life-cycle: from design
time verification to online operational support and post-mortem
analysis. Furthermore, it welcomes contributions beyond the strictly
technical character, for instance those considering economic, legal and
standardization issues.

*Keynote*
Hejiao Huang (HIT Shenzhen Grad. School, China)

*TOPICS of INTEREST*
SBP13 addresses topics related to security/compliance audit and control and business processes, including:

- Alignment
- Authorization
- Accountability
- Audit reduction
- Business provenance
- Case studies
- Conformance checking
- Compliance checking
- Continuous audit
- Cost-benefit analysis
- Data-aware process mining
- Formal reasoning
- Fraud detection
- Economics of audit
- Experience reports
- Information flow control
- Log formats
- Meta-models for analysis
- Operational decision support
- Privacy-aware process discovery
- Requirements elicitation
- Requirements formalization
- Risk analysis and measurement
- Root-Cause Analysis
- Runtime verification/monitoring
- Security testing
- Trace clustering
- Usage control
- Business process forensics
- Business process simulation

*SUBMISSION INSTRUCTIONS*

Submitted manuscripts must be written in English and be no longer than 12 pages. They must be formatted using the LNCS format (http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0). Submissions will be reviewed by at least three PC members based on their originality, significance, technical soundness and clarity of exposition. The workshop papers will be published by Springer as a post-workshop proceedings volume in the series Lecture Notes in Business Information Processing (LNBIP). The submission website is at (https://www.easychair.org/conferences/?conf=sbpw13)

*IMPORTANT DATES*
Paper submission: May 25th, 2013
Paper notification: June 25th, 2013
Camera-ready version: July 23rd, 2013
Workshop: August 26th, 2013

*ORGANIZERS*
Wil van der Aalst, Eindhoven University of Technology, the Netherlands
Rafael Accorsi, University of Freiburg, Germany
Raimundas Matulevicius, University of Tartu, Estonia

*PROGRAM COMMITTEE*
Anne Baumgrass, HPI, Germany
Achim Brucker, SAP AG, Germany
Benoit Depaire, Hasselt University, Belgium
Jason Crampton, University of London, UK
Khaled Gaaloul, CRP Henri Tudor, Luxembourg
Aditya Ghose, University of Wollongong, Australia
Hejiao Huang, Shenzhen Graduate School, China
Michael Huth, Imperial College, UK
Fuyuki Ishikawa, National Institute of Informatics, Japan
Jan Jürjens, Technical University of Dortmund, Germany
Dimka Karastoyanova, University of Stuttgart, Germany
Günter Karjoth, IBM Research, China
Peter Karpati, Institute for Energy Technology, Norway
Seok-Won Lee, Ajou University, Korea
Lin Liu, Tsinghua University, China
Heiko Ludwig, IBM Almaden Research Center, USA
Nicolas Mayer, CRP Henri Tudor, Luxembourg
Per H. Meland, SINTEF, Norway
Marko Montali, Free University of Bozen-Bolzano, Italy
Haralambos Mouratidis, University of East London, UK
Andreas Opdahl, University of Bergen, Norway
Günther Pernul, University of Regensburg, Germany
Silvio Ranise, Fundazione Bruno Kessler, Italy
Stefanie Rinderle-Ma, University of Vienna, Austria
David G. Rosado, University of Castilla-La Mancha, Spain
Shazia Sadiq, University of Queensland, Australia
Guttorm Sindre, Norwegian University of Science and Technology, Norway
Mark Strembeck, Vienna University of Economics and Business, Austria
Jan M. van der Werf, Technical University of Eindhoven, the Netherlands
Nicola Zannone, Technical University of Eindhoven, the Netherlands

Related Resources

DT4BP 2022   1st International Workshop on Digital Twins for Business Processes
IJPLA 2022   International Journal of Programming Languages and Applications
CEVVE 2022   2022 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2022)
NISecurity 2022   2022 International Conference on Network and Information Security (NISecurity 2022)
No Hat 2022   Computer Security Conference
BIOM 2022   2nd International Conference on Big Data, IoT and Machine Learning
MDA AI&PR 2023   18th International Conference on Mass Data Analysis of Images and Signals with Applications in Medicine, r/g/b Biotechnology, Food Industries and Dietetics, Biometry and Security,
CLBD 2022   3rd International Conference on Cloud and Big Data
EvoCompAISecurity&Privacy 2022   Evolutionary Computing for AI-Driven Security and Privacy: Advancing the state-of-the-art applications
JMC 2022   JOURNAL OF MATHEMATICAL CRYPTOLOGY