posted by organizer: BianYang || 5422 views || tracked by 3 users: [display]

SIMICE 2015 : The 1st IEEE International Workshop on Secure Identity Management in the Cloud Environment


When Jul 1, 2015 - Jul 5, 2015
Where Taichung, Taiwan
Submission Deadline Apr 2, 2015
Notification Due Apr 21, 2015
Final Version Due Apr 30, 2015
Categories    identity management   cloud   security   biometrics

Call For Papers

While identity management solutions are increasingly migrating to cloud, conventional identity management approaches are facing challenges in trust, security, privacy, computational efficiency, interoperability and service reliability in the cloud environment. Security concerns are reportedly among the biggest inhibitors holding back the wider adoption of cloud computing. Secure identity management, required by emerging cloud services, is receiving increasing attention from both service providers' and end users' perspectives, in terms of protection of enterprise assets and customers' privacy in the cloud, respectively. This workshop solicits contributions describing state of the art methodology and technology innovations in the field of secure identity management in the cloud computing environment, encourages experience sharing (both positive and negative ones), and also welcomes disruptive work-in-progress ideas towards future concepts.

SIMICE is dedicated to the security aspect of identity management (IDM) in the cloud. To facilitate the communication between the two domains - conventional cryptography and cloud computing - two trackes, namely "New cryptography and security mechanisms" and "Cloud computing technology innovation to secure IDM in the cloud" are planned to attrack works from the two domains; looking at the same thing from two different perspectives. A third track, "Cross-sectorial aspects of cloud identity management" is also planned to attract works addressing cross-domain challenges.

Any submission whose content is relevant to the area of secure identity management in the cloud environment will be considered, but any submission whose subject matter is related to one of the three track topics will be particularly welcome. Practically-oriented approaches will also be appreciated.

Track 1: New cryptography and security mechanisms for IDM in the cloud

privacy-preserving and trusted identities as services
cloud-based password managers
privacy-preserving biometrics authentication for cloud-based services
biometric data protection and management in the cloud
date processing and analysis in a protected domain
secure operations on encrypted data, e.g., via efficient homomorphic encryption and searchable encryption, for cloud services
private database querying in the cloud environment
digital rights management for media data for cloud storage and sharing
privacy protection of outsourced personal data from mobile device and social network

Track 2: Cloud computing technology innovation to secure IDM in the cloud
data separation design in the cloud environment
hybrid cloud architecture design for secure data management
federated and distributed identity management in the cloud
user-centric identity management in the cloud environment
hybrid hardware (e.g., chip-based) / software security enhancement mechanism
security-enhanced distributed computing framework design, e.g., MapReduce
secure database architecture and services for IDM in the cloud environment
identity management in a cyber-physical cloud
applications of new computer and software technologies to IDM context

Track 3: Cross-sectorial aspects of cloud identity management
lessons and best practice learnt from different sectors
culture, ethical, legal, and regulation factors
discrepancy in the understanding of trust and privacy across different sectors
survey of data security concerns and understandings from various sectors

[Paper Submission]
Authors are invited to submit original, unpublished research papers as well as industrial practice papers. Simultaneous submissions to other publications and conferences are not permitted.

The length of a camera ready paper will be limited to 6 pages (IEEE Proceedings style) with up to 2 additional pages (with charges for each additional page) printed on 10-12 point fonts.

Authors must follow IEEE CS Press Proceedings Author Guidelines to prepare papers. At least one of the authors of each accepted paper is required to pay full registration fee and present the paper at the workshop in person.

Bian Yang, Gjøvik University College, Norway
Julien Bringer, Morpho, France

Christoph Busch, Center for Advanced Security Research, Darmstadt, Germany

[Program Committee]
Erik-oliver Blass, Airbus Group Innovations, Germany
Julien Bringer, Morpho, France
Christoph Busch, CASED, Germany
Hervé Chabanne, Morpho and Télécom ParisTech, France
Martin Gilje Jaatun, SINTEF, Norway
Qi Han, Harbin Institute of Technology, China
Pei-Yun Hsueh, IBM T.J. Watson Research Center, United States
Thomas Kemmerich, Norwegian Information Security Laboratory, Norway
Els Kindt, KU Leuven, Belgium
Mingyu Li, Chinese Academy of Sciences, China
Qiong Li, Harbin Institute of Technology, China
Zheming Lu, Zhejiang University, China
Hao Luo, Zhejiang University, China
Xiamu Niu, Harbin Institute of Technology, China
Shantanu Rane, PARC, USA
Christian Rathgeb, CASED, Germany
Chik-How Tan, National University of Singapore, Singapore
Qiang Tang, Interdisciplinary Centre for Security, Reliability and Trust, Luxembourg
Per Thorsheim, God Praksis AS, Norway
Bian Yang, Norwegian Information Security Laboratory, Norway
Jiantao Zhou, University of Macao, Macao
Xuebing Zhou, Huawei European Research Center, Germany

Related Resources

ICIEM 2016   International Conference on Integrated Environmental Management for Sustainable Development
CCGRID 2017   17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing
CIKM 2017   The 26th 2017 ACM Conference on Information and Knowledge Management
AsiaCCS 2017   Call for paper: ACM Asia Conference on Computer and Communications Security
SIMICE 2016   The 2nd IEEE International Workshop on Secure Identity Management in the Cloud Environment (SIMICE 2016)
IEEE TDSC Journal SI 2016   IEEE TDSC Special Issue on Data-Driven Dependability and Security
IROS 2017   IEEE/RSJ International Conference on Intelligent Robots and Systems
TDSC-PSCE 2017   Special Issue on Paradigm Shifts in Cryptographic Engineering -- IEEE Transactions on Dependable and Secure Computing
ICISSP 2017   3rd International Conference on Information Systems Security and Privacy
ICCT-IEEE 2017   17th IEEE International Conference on Communication Technology(ICCT 2017)