posted by organizer: rafael_accorsi || 1765 views || tracked by 4 users: [display]

SBP 2014 : Workshop on Security in Business Processes

FacebookTwitterLinkedInGoogle

Link: http://sbp14.cs.ut.ee
 
When Sep 8, 2014 - Sep 8, 2014
Where Haifa, Israel
Submission Deadline Jun 8, 2014
Notification Due Jul 1, 2014
Final Version Due Jul 23, 2014
Categories    business process management   information security   auditing and control   enterprise architecture
 

Call For Papers

================================================================
SBP'14: 3nd Workshop on Security in Business Processes

in conjunction with the

12th Int'l Conference on Business Process Management
(http://bpm2014.haifa.ac.il/)
================================================================

Despite the growing demand for business processes that comply with
security policies, security and privacy incidents caused by erroneous
workflow specifications are regrettably common. This is, in part,
because business process management and security are seldom addressed
together, thereby hindering the development of trustworthy and
security-compliant business processes. The third edition of the Workshop
on Security in Business Processes (SBP'14) seeks to bring together
researchers and practitioners interested in the management and modelling
of secure business processes in process-aware information systems.

The goal of SBP'14 is to obtain a deeper understanding of a rapidly
maturing, yet still largely under-investigated field of business process
security, audit and control, including both thorough security
requirements formalization, secure process modelling, and mechanisms for
verification, monitoring and auditing. In particular, SBP'14 encourages
innovative methods for workflow security modelling, security audit and
control throughout the business process lifecycle: from design time
verification to online operational support and post-mortem analysis.

*Topic of interest*
Alignment Information flow control
Authorization Log formats
Accountability Meta-models for analysis
Audit reduction Operational decision support
Business provenance Privacy-aware process discovery
Case studies Requirements elicitation
Conformance checking Requirements formalization
Compliance checking Risk analysis and measurement
Continuous audit Runtime verification/monitoring
Cost-benefit analysis Security testing
Data-aware process mining Trace clustering
Formal reasoning Usage control
Fraud detection Workflow forensics
Economics of audit Workflow simulation
Experience reports

*Submission instructions*
Submitted manuscripts must be written in English and be no longer than
12 pages. They must be formatted using the LNBIP format and submitted as
a PDF document to the EasyChair website: (https://www.easychair.org/
conferences/?conf=sbp14). Submissions will be reviewed on the basis of
their originality, significance, technical soundness and clarity of
exposition. Each submission will be reviewed by at least three PC
members. Submitted manuscripts should not substantially overlap
manuscripts that have been published or that are simultaneously
submitted to a conference with proceedings or a journal.

*Important dates*
Paper submission: June 8, 2014
Paper notification: July 2, 2014
Camera-ready version: July 23, 2014
Workshop: September 8, 2014

*Organizers*
PC Chairs
Rafael Accorsi (Freiburg U, DE)
Raimundas Matulevicius (Tartu U, EE)
Jason Crampton (Royal Holloway U, UK)

Honorary PC Chair
Wil van der Aalst (TU/E, NL)

Publicity Chair
Giovanni Livraga (Milan U, IT)

*Program committee*
Anne Baumgrass (HPI, DE)
Achim Brucker (SAP AG, DE)
Khaled Gaaloul (CRP Henri Tudor, LU)
Aditya Ghose (Wollongong U, AU)
Anat Goldat (Duisburg-Essen U, DE)
Hejiao Huang (Shenzhen Graduate School, CN)
Michael Huth (Imperial College, UK)
Fuyuki Ishikawa (NII Tokyo, JP)
Jan Jürjens (Dortmund TU, DE)
Dimka Karastoyanova (Stuttgart U, DE)
Günter Karjoth (Lucerne UT, CH)
Seok-Won Lee (Ajou U, KR)
Lin Liu (Tsinghua U, CN)
Heiko Ludwig (IBM Almaden, USA)
Nicolas Mayer (CRP Henri Tudor, LU)
Per H. Meland (SINTEF, NO)
Marko Montali (Bozen-Bolzano FU, IT)
Haralambos Mouratidis (East London U, UK)
Andreas Opdahl (Bergen U, NO)
Günther Pernul (Regensburg U, DE)
Silvio Ranise (FBK, IT)
Stefanie Rinderle-Ma (Vienna U, AT)
David G. Rosado (Castilla-La Mancha U, ES)
Shazia Sadiq (Queensland U, AU)
Guttorm Sindre (Norwegian Science and Technology U., NO)
Pnina Soffer (Haifa U, IS)
Mark Strembeck (Vienna WU, AT)
Arnon Sturm (Haifa U, IS)
Matthias Weidlich (Imperial College, UK)
Jan M. van der Werf (TU/E, NL)
Nicola Zannone (TU/E, NL)

Related Resources

EuropeanSeC 2017   2017 European Security Conference
TDSC-PSCE 2017   Special Issue on Paradigm Shifts in Cryptographic Engineering -- IEEE Transactions on Dependable and Secure Computing
SECURWARE 2017   The Eleventh International Conference on Emerging Security Information, Systems and Technologies
ACNS 2017   The 15th International Conference on Applied Cryptography and Network Security
INSERT 2017   1st International Conference on Security, Privacy, and Trust (INSERT'17)
DBSec 2017   31st Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy
Smart-City-IoT-Security 2017   Special Issue on Security of IoT-enabled Infrastructures in Smart Cities
SI: Security-BD-SmartCity 2017   Special Issue on Security and Privacy in Big Data-enabled Smart Cities: Opportunities and Challenges
SEPA 2017   9th International Symposium on Software Engineering Processes and Applications
SECRYPT 2017   14th International Conference on Security and Cryptography