posted by organizer: swohlge || 4266 views || tracked by 4 users: [display]

RISI 2015 : The 5th International Workshop on Resilience and IT-Risk in Social Infrastructures

FacebookTwitterLinkedInGoogle

Link: http://www.ares-conference.eu/conference/workshops/risi-2015/
 
When Aug 24, 2015 - Aug 28, 2015
Where Université Paul Sabatier, Toulouse, Fran
Submission Deadline May 18, 2015
Notification Due May 29, 2015
Final Version Due Jun 15, 2015
Categories    resilience   security   safety   privacy
 

Call For Papers

===================
Call for Papers
The Fifth International Workshop on Resilience and IT-Risk in Social Infrastructures
(RISI 2015)

To be held in conjunction with the 10th International Conference on Availability, Reliability and Security (ARES 2015 – http://www.ares-conference.eu).

August 24 – 28, 2015
Université Paul Sabatier
Toulouse, France
===================

Resilience gains importance for sustainable welfare of societies with respect to their acceptable adaption to interferences of all kind. In order to prepare for expected interferences and to response to unexpected, inevitable interferences in real-time, current initiatives in computer science and business & information systems engineering aim to analyze huge amount of data from public and private domains and to share derived information with adaptive information systems, e.g. social networks.

Realizing adequate and shared IT services implies availability of sufficient authentic, partly personal data from different origins, their aggregation, and secondary use. These services are "data-centric" by definition. One main challenge to be solved for achieving reliable data-centric services within acceptable risks is cross-domain processing of (personal) data in compliance to law, business rules, and social norms. Whereas many security solutions are well studied for models and their implementation for separated security domains, this is not the case for data-centric services and adaptive IT systems.

The aim of the RISI 2015 workshop is to discuss risk scenarios with data-centric services and approaches for improving "Resilience in Social Infrastructures" as well as the necessity to take non-technical aspects into consideration. We encourage academic researchers and industry experts to present and discuss novel ideas and ongoing work. Contributions addressing promising approaches to provide and manage resilient infrastructures with data-centric services are invited as research in progress and best practices.

===================
Topics of interest include, but are not limited to:
===================

Risk assessment and vulnerability analysis for data-centric services
* Economics of controls
* Risk measurements and controlling
* Identification of vulnerabilities
* Methods of Business Intelligence
* Management of data quality
* Risk scenarios

Policy and IT security management for data-centric services
* Authentication, authorization, and accounting
* Policy management for processing of personal data
* Policy enforcement vs. monitoring and their risks
* Anonymity/pseudonymity
* Legal implications of data-centric services and security mechanisms

Methods for resilience & best practices
* Privacy and security in participatory sensing
* Critical information infrastructure protection
* Human-centric resilience systems
* Measurements of resilience
* Case studies

===================
Important Dates
===================

Submission Deadline May 18, 2015 (EXTENDED)
Author Notification May 29, 2015
Proceedings Version June 15, 2015
Conference August 24 – 28, 2015

===================
Submission Guidelines
===================

The submission guidelines valid for the workshop are the same as for the ARES conference. They can be found at http://www.ares-conference.eu.

===================
Organizing Committee
===================

* Isao Echizen
National Institute of Informatics, Japan
iechizen@nii.ac.jp
* Stefan Sackmann
Martin-Luther University Halle-Wittenberg, Germany
stefan.sackmann@wiwi.uni-halle.de
* Sven Wohlgemuth
wohlgemuth@acm.org

===================
Program Committee (tbc)
===================

* Mathias Fischer, International Computer Science Institute, USA
* Koichiro Hayashi, Institute of Information Security Yokohama, Japan
* Ioannis Krontiris, Huawei Technologies, Germany
* Hiroshi Maruyama, Institute of Statistical Mathematics, Japan
* Leonardo Mostarda, University of Camerino, Italy
* Andreas Peter, University of Twente, Netherlands
* Heiko Roßnagel, Fraunhofer IAO, Germany
* Ryoichi Sasaki, Tokyo Denki University, Japan
* Christian Schaefer, Ericsson AB Research, Sweden
* Stephan Sigg, Georg-August University Göttingen, Germany
* Ali Sunyaev, University of Cologne, Germany
* Kazuo Takaragi, National Institute of Advanced Industrial Science and Technology, Japan
* Edgar Weippl, Secure Business Austria, Austria
* Rigo Wenning, W3C/ERCIM, France
* Hideki Yoshii, Softbank Telecom Corp., Japan
* Hiroshi Yoshiura, The University of Electro-Communications of Tokyo, Japan
* Christian Zimmermann, Albert-Ludwigs University Freiburg, Germany
* Alf Zugenmaier, University of Applied Sciences Munich, Germany

Related Resources

Smart-City-IoT-Security 2017   Special Issue on Security of IoT-enabled Infrastructures in Smart Cities
RAID 2017   20th International Symposium on Research in Attacks, Intrusions and Defenses
INSERT 2017   1st International Conference on Security, Privacy, and Trust (INSERT'17)
Future_Internet-SI 2017   Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
AJHSS 3-4 2017   Austrian Journal of Humanities and Social Sciences
SECURWARE 2017   The Eleventh International Conference on Emerging Security Information, Systems and Technologies
ICITA 2017   International Conference on Information Technology and Applications
ESORICS 2017   Twenty-second European Symposium on Research in Computer Security
S4CIP 2017   2nd International Workshop on Safety & Security aSSurance for Critical Infrastructures Protection
CSCESM 2017   The Fourth International Conference on Computer Science, Computer Engineering and Social Media