posted by organizer: rafael_accorsi || 3382 views || tracked by 4 users: [display]

SBP 2014 : Workshop on Security in Business Processes


When Sep 8, 2014 - Sep 8, 2014
Where Haifa, Israel
Submission Deadline Jun 8, 2014
Notification Due Jul 1, 2014
Final Version Due Jul 23, 2014
Categories    business process management   information security   auditing and control   enterprise architecture

Call For Papers

SBP'14: 3nd Workshop on Security in Business Processes

in conjunction with the

12th Int'l Conference on Business Process Management

Despite the growing demand for business processes that comply with
security policies, security and privacy incidents caused by erroneous
workflow specifications are regrettably common. This is, in part,
because business process management and security are seldom addressed
together, thereby hindering the development of trustworthy and
security-compliant business processes. The third edition of the Workshop
on Security in Business Processes (SBP'14) seeks to bring together
researchers and practitioners interested in the management and modelling
of secure business processes in process-aware information systems.

The goal of SBP'14 is to obtain a deeper understanding of a rapidly
maturing, yet still largely under-investigated field of business process
security, audit and control, including both thorough security
requirements formalization, secure process modelling, and mechanisms for
verification, monitoring and auditing. In particular, SBP'14 encourages
innovative methods for workflow security modelling, security audit and
control throughout the business process lifecycle: from design time
verification to online operational support and post-mortem analysis.

*Topic of interest*
Alignment Information flow control
Authorization Log formats
Accountability Meta-models for analysis
Audit reduction Operational decision support
Business provenance Privacy-aware process discovery
Case studies Requirements elicitation
Conformance checking Requirements formalization
Compliance checking Risk analysis and measurement
Continuous audit Runtime verification/monitoring
Cost-benefit analysis Security testing
Data-aware process mining Trace clustering
Formal reasoning Usage control
Fraud detection Workflow forensics
Economics of audit Workflow simulation
Experience reports

*Submission instructions*
Submitted manuscripts must be written in English and be no longer than
12 pages. They must be formatted using the LNBIP format and submitted as
a PDF document to the EasyChair website: (
conferences/?conf=sbp14). Submissions will be reviewed on the basis of
their originality, significance, technical soundness and clarity of
exposition. Each submission will be reviewed by at least three PC
members. Submitted manuscripts should not substantially overlap
manuscripts that have been published or that are simultaneously
submitted to a conference with proceedings or a journal.

*Important dates*
Paper submission: June 8, 2014
Paper notification: July 2, 2014
Camera-ready version: July 23, 2014
Workshop: September 8, 2014

PC Chairs
Rafael Accorsi (Freiburg U, DE)
Raimundas Matulevicius (Tartu U, EE)
Jason Crampton (Royal Holloway U, UK)

Honorary PC Chair
Wil van der Aalst (TU/E, NL)

Publicity Chair
Giovanni Livraga (Milan U, IT)

*Program committee*
Anne Baumgrass (HPI, DE)
Achim Brucker (SAP AG, DE)
Khaled Gaaloul (CRP Henri Tudor, LU)
Aditya Ghose (Wollongong U, AU)
Anat Goldat (Duisburg-Essen U, DE)
Hejiao Huang (Shenzhen Graduate School, CN)
Michael Huth (Imperial College, UK)
Fuyuki Ishikawa (NII Tokyo, JP)
Jan Jürjens (Dortmund TU, DE)
Dimka Karastoyanova (Stuttgart U, DE)
Günter Karjoth (Lucerne UT, CH)
Seok-Won Lee (Ajou U, KR)
Lin Liu (Tsinghua U, CN)
Heiko Ludwig (IBM Almaden, USA)
Nicolas Mayer (CRP Henri Tudor, LU)
Per H. Meland (SINTEF, NO)
Marko Montali (Bozen-Bolzano FU, IT)
Haralambos Mouratidis (East London U, UK)
Andreas Opdahl (Bergen U, NO)
Günther Pernul (Regensburg U, DE)
Silvio Ranise (FBK, IT)
Stefanie Rinderle-Ma (Vienna U, AT)
David G. Rosado (Castilla-La Mancha U, ES)
Shazia Sadiq (Queensland U, AU)
Guttorm Sindre (Norwegian Science and Technology U., NO)
Pnina Soffer (Haifa U, IS)
Mark Strembeck (Vienna WU, AT)
Arnon Sturm (Haifa U, IS)
Matthias Weidlich (Imperial College, UK)
Jan M. van der Werf (TU/E, NL)
Nicola Zannone (TU/E, NL)

Related Resources

S&P 2022   IEEE Symposium on Security and Privacy (Third deadline)
ICISSP 2022   8th International Conference on Information Systems Security and Privacy
CEVVE 2022   2022 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2022)
IJNSA 2021   International Journal of Network Security & Its Applications- ERA Listed
NISecurity 2022   2022 International Conference on Network and Information Security (NISecurity 2022)
CSW 2022   2022 International Workshop on Cyber Security (CSW 2022)
USENIX 2022   USENIX Security 2022 : 31st USENIX Security Symposium (Winter Deadline)
NLTM 2022   2nd International Conference on NLP & Text Mining
ASIACCS 2022   ACM Symposium on Information, Computer and Communications Security
AutonomousVehicles 2022   Special Issue - Autonomous Vehicles for Public Transportation Services