posted by organizer: swohlge || 5142 views || tracked by 4 users: [display]

RISI 2015 : The 5th International Workshop on Resilience and IT-Risk in Social Infrastructures

FacebookTwitterLinkedInGoogle

Link: http://www.ares-conference.eu/conference/workshops/risi-2015/
 
When Aug 24, 2015 - Aug 28, 2015
Where Université Paul Sabatier, Toulouse, Fran
Submission Deadline May 18, 2015
Notification Due May 29, 2015
Final Version Due Jun 15, 2015
Categories    resilience   security   safety   privacy
 

Call For Papers

===================
Call for Papers
The Fifth International Workshop on Resilience and IT-Risk in Social Infrastructures
(RISI 2015)

To be held in conjunction with the 10th International Conference on Availability, Reliability and Security (ARES 2015 – http://www.ares-conference.eu).

August 24 – 28, 2015
Université Paul Sabatier
Toulouse, France
===================

Resilience gains importance for sustainable welfare of societies with respect to their acceptable adaption to interferences of all kind. In order to prepare for expected interferences and to response to unexpected, inevitable interferences in real-time, current initiatives in computer science and business & information systems engineering aim to analyze huge amount of data from public and private domains and to share derived information with adaptive information systems, e.g. social networks.

Realizing adequate and shared IT services implies availability of sufficient authentic, partly personal data from different origins, their aggregation, and secondary use. These services are "data-centric" by definition. One main challenge to be solved for achieving reliable data-centric services within acceptable risks is cross-domain processing of (personal) data in compliance to law, business rules, and social norms. Whereas many security solutions are well studied for models and their implementation for separated security domains, this is not the case for data-centric services and adaptive IT systems.

The aim of the RISI 2015 workshop is to discuss risk scenarios with data-centric services and approaches for improving "Resilience in Social Infrastructures" as well as the necessity to take non-technical aspects into consideration. We encourage academic researchers and industry experts to present and discuss novel ideas and ongoing work. Contributions addressing promising approaches to provide and manage resilient infrastructures with data-centric services are invited as research in progress and best practices.

===================
Topics of interest include, but are not limited to:
===================

Risk assessment and vulnerability analysis for data-centric services
* Economics of controls
* Risk measurements and controlling
* Identification of vulnerabilities
* Methods of Business Intelligence
* Management of data quality
* Risk scenarios

Policy and IT security management for data-centric services
* Authentication, authorization, and accounting
* Policy management for processing of personal data
* Policy enforcement vs. monitoring and their risks
* Anonymity/pseudonymity
* Legal implications of data-centric services and security mechanisms

Methods for resilience & best practices
* Privacy and security in participatory sensing
* Critical information infrastructure protection
* Human-centric resilience systems
* Measurements of resilience
* Case studies

===================
Important Dates
===================

Submission Deadline May 18, 2015 (EXTENDED)
Author Notification May 29, 2015
Proceedings Version June 15, 2015
Conference August 24 – 28, 2015

===================
Submission Guidelines
===================

The submission guidelines valid for the workshop are the same as for the ARES conference. They can be found at http://www.ares-conference.eu.

===================
Organizing Committee
===================

* Isao Echizen
National Institute of Informatics, Japan
iechizen@nii.ac.jp
* Stefan Sackmann
Martin-Luther University Halle-Wittenberg, Germany
stefan.sackmann@wiwi.uni-halle.de
* Sven Wohlgemuth
wohlgemuth@acm.org

===================
Program Committee (tbc)
===================

* Mathias Fischer, International Computer Science Institute, USA
* Koichiro Hayashi, Institute of Information Security Yokohama, Japan
* Ioannis Krontiris, Huawei Technologies, Germany
* Hiroshi Maruyama, Institute of Statistical Mathematics, Japan
* Leonardo Mostarda, University of Camerino, Italy
* Andreas Peter, University of Twente, Netherlands
* Heiko Roßnagel, Fraunhofer IAO, Germany
* Ryoichi Sasaki, Tokyo Denki University, Japan
* Christian Schaefer, Ericsson AB Research, Sweden
* Stephan Sigg, Georg-August University Göttingen, Germany
* Ali Sunyaev, University of Cologne, Germany
* Kazuo Takaragi, National Institute of Advanced Industrial Science and Technology, Japan
* Edgar Weippl, Secure Business Austria, Austria
* Rigo Wenning, W3C/ERCIM, France
* Hideki Yoshii, Softbank Telecom Corp., Japan
* Hiroshi Yoshiura, The University of Electro-Communications of Tokyo, Japan
* Christian Zimmermann, Albert-Ludwigs University Freiburg, Germany
* Alf Zugenmaier, University of Applied Sciences Munich, Germany

Related Resources

ECCWS 2020   19th European Conference on Cyber Warfare and Security
SP 2020   IEEE Symposium on Security and Privacy
ICSD 2020   8th International Conference on Sustainable Development,9 - 10 September ICSD 2020
SPTM 2020   8th International Conference of Security, Privacy and Trust Management
Reshaping the Nation 2019   Reshaping the Nation: Collective Identities and Post-War Violence in Europe 1944–48
ASIACCS 2020   ACM ASIACCS 2020 : The 15th ACM ASIA Conference on Computer and Communications Security
SDAI 2020   EAI International Conference on Social Data and Artificial Intelligence
IEEE Euro S&P 2020   5th IEEE European Symposium on Security and Privacy
KEAS 2020   3rd International Conference on Knowledge Economy, Artificial Intelligence & Social Sciences KEAS-May-2020
ICSS 2019   5th International Conference on Software Security