posted by user: BudiArief || 5259 views || tracked by 5 users: [display]

ACMDIM 2013 : ACM Digital Identity Management Workshop 2013

FacebookTwitterLinkedInGoogle

Link: http://cccs.ncl.ac.uk/dim2013/
 
When Nov 8, 2013 - Nov 8, 2013
Where Berlin, Germany
Submission Deadline Jul 29, 2013
Notification Due Aug 15, 2013
Final Version Due Aug 30, 2013
Categories    security   privacy   identity   identity management
 

Call For Papers

Call for Papers
===============

“Identity at the Crossroads”

This workshop will explore crucial issues concerning interoperable identity management technologies for the information society.

Identity management has seen a series of development in the recent years. Whereas identity management and federation standards have been solidified and adopted in practice, nations world-wide are investing in electronic identity systems as strong root identities for their citizens offering a promise for strong authentication. Privacy-enhancing identity systems have reached some technical maturity and may offer user authentication with minimal disclosure. At the same time, personal identifiable information and the user’s identity has become a commodity to drive the business of global corporations. Whereas such companies sought to bind the users’ accounts to their unique identity, there has been a reported unrest and anxiety of users because of their diminishing privacy protection.

We see identity at the crossroads. One possibility is the unique identification and strong authentication road that may offer increased trust for e-commerce and increasing cloud services. Another is the road of attribute exchange and leveraging the user’s personal identifiable information that may benefit business and help users to have a consistent experience among many mobile compute platforms. Finally, there is the privacy-enhancing identity systems road that may offer additional protection for the user’s civil rights. Partially these different roads seem to contradict each other. Research can offer roads less taken that overcome these seeming contradictions and come up with next generation identity solutions.

The workshop seeks submissions from diverse communities, such as social networking, open source projects, standardization fora, governments, system & security administrators, software engineers, and corporate & academic researchers. Topics of interest include, but are not limited to:

Novel approaches to identity management
Privacy-enhancing technologies
Identity management for mobile and ubiquitous computing
Identity in cloud computing
Identity in social networks
Identity solutions for specific areas (e.g., healthcare, government, and education)
Identity theft prevention in face of malware and phishing
Applied cryptography for Identity Management
(Privacy-preserving) identity profiling and fraud detection
Identity discovery, life cycle and governance
Identity user experience
Attribute based authentication and access control
User-centric identity management
Ad-hoc, de-centralized and reputation-based identity
Biometric Identity
Experience reports on identity management practices

The goal of this workshop is to share the latest findings, identify key challenges, inspire debates, and foster collaboration between industries and academia towards interoperable identity service infrastructures.


Paper Submission Process
========================
Submissions must be made by the deadline of Thursday, July 25, 2013 23:59 (UTC-11), through EasyChair (https://www.easychair.org/conferences/?conf=acmdim2013). Authors will be notified of reviews on August 15, 2013.

Submitted papers must not substantially overlap with other papers that have been published or that are simultaneously submitted to a journal, conference or workshop. Simultaneous submission of the same work is not allowed. Authors of accepted papers must guarantee that their papers will be presented at the workshop.

Accepted papers will be published by ACM Press in the workshop proceedings.


Paper Format
============
Submissions must be at most 10 pages in double-column ACM format (http://www.acm.org/sigs/publications/sig-alternate.pdf) excluding the bibliography and well-marked appendices, and at most 12 pages overall. Submissions must be anonymized and avoid obvious self-references. Only PDF files will be accepted. Submissions not meeting these guidelines risk rejection without consideration of their merits.


Important Dates
===============
Submission: July 29, 2013 23:59 UTC-11
Notification: August 15, 2013
Camera-ready: August 30, 2013 (firm)
Workshop: November 8, 2013


Programme Chairs
================
Thomas Groß, Newcastle University, United Kingdom
Marit Hansen, ULD, Germany


Publication Chair
=================
Budi Arief, Newcastle University, United Kingdom


Steering Committee
==================
Elisa Bertino, Purdue University, USA
Abhilasha Bhargav-Spanzel, Intel, USA
Thomas Groß, Newcastle University, UK
Kenji Takahashi, NTT Innovation Institute Inc., USA


Programme Committee
===================
Gail-Joon Ahn, Arizona State University, USA
Elisa Bertino, Purdue University, USA
Abhilasha Bhargav-Spantzel, Intel, USA
Sonja Buchegger, KTH, Stockholm, Sweden
Marco Casassa Mont, HP Labs, UK
David Chadwick, University of Kent, UK
Melissa Chase, Microsoft Research, US
Chihung Chi, Tsinghua University, China
Simone Fischer-Hübner, Karlstad University, Sweden
Lothar Fritsch, Norwegian Computing Center, Norway
Hidehito Gomi, Yahoo! Japan Research, Japan
Thomas Groß, Newcastle University, UK
Weili Han, Fudan University, China
Marit Hansen, ULD, Germany
Jaap-Henk Hoepman, Radboud University Nijmegen, Netherlands
Seung-Hyun Kim, ETRI, Korea
Howard Lipson, CERT, USA
Maciej Machulak, Cloud Identity/Newcastle University, UK
Eve Maler, Forrester Research, USA
Siani Pearson, Hewlett-Packard Laboratories, UK
Kai Rannenberg, Goethe University, Frankfurt, Germany
Jörg Schwenk, Ruhr-University Bochum, Germany
Kent Seamons, Brigham Young University, USA
Jon A. Solworth, University of Illinois at Chicago, USA
Sandra Steinbrecher, SAP Research, Germany
Kenji Takahashi, NTT Innovation Institute Inc., USA
Jozef Vyskoč, VaF, Slovakia
Peter Weik, T-Systems, Germany

Related Resources

IMMS--ACM, Ei, Scopus 2020   ACM--2020 3rd International Conference on Information Management and Management Science (IMMS 2020)--Ei Compendex, Scopus
SP 2020   IEEE Symposium on Security and Privacy
ACM--IMMS--Ei, Scopus 2020   ACM--2020 3rd International Conference on Information Management and Management Science (IMMS 2020)--Ei Compendex, Scopus
ASIACCS 2020   ACM ASIACCS 2020 : The 15th ACM ASIA Conference on Computer and Communications Security
ACM--NLPIR--Ei Compendex and Scopus 2020   ACM--2020 4th International Conference on Natural Language Processing and Information Retrieval (NLPIR 2020)--Scopus, Ei Compendex
IEEE Euro S&P 2020   5th IEEE European Symposium on Security and Privacy
UMAP 2020   ACM International Conference on User Modeling, Adaptation and Personalization
IEEE COINS 2020   Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Security | Embedded Systems | Circuit and Systems | WSN | 5G
BIOTC--ACM, Ei and Scopus 2020   ACM--2020 2nd Blockchain and Internet of Things Conference (BIOTC 2020)--Ei Compendex, Scopus
ECCWS 2020   19th European Conference on Cyber Warfare and Security