posted by organizer: swohlge || 5926 views || tracked by 4 users: [display]

RISI 2015 : The 5th International Workshop on Resilience and IT-Risk in Social Infrastructures

FacebookTwitterLinkedInGoogle

Link: http://www.ares-conference.eu/conference/workshops/risi-2015/
 
When Aug 24, 2015 - Aug 28, 2015
Where Université Paul Sabatier, Toulouse, Fran
Submission Deadline May 18, 2015
Notification Due May 29, 2015
Final Version Due Jun 15, 2015
Categories    resilience   security   safety   privacy
 

Call For Papers

===================
Call for Papers
The Fifth International Workshop on Resilience and IT-Risk in Social Infrastructures
(RISI 2015)

To be held in conjunction with the 10th International Conference on Availability, Reliability and Security (ARES 2015 – http://www.ares-conference.eu).

August 24 – 28, 2015
Université Paul Sabatier
Toulouse, France
===================

Resilience gains importance for sustainable welfare of societies with respect to their acceptable adaption to interferences of all kind. In order to prepare for expected interferences and to response to unexpected, inevitable interferences in real-time, current initiatives in computer science and business & information systems engineering aim to analyze huge amount of data from public and private domains and to share derived information with adaptive information systems, e.g. social networks.

Realizing adequate and shared IT services implies availability of sufficient authentic, partly personal data from different origins, their aggregation, and secondary use. These services are "data-centric" by definition. One main challenge to be solved for achieving reliable data-centric services within acceptable risks is cross-domain processing of (personal) data in compliance to law, business rules, and social norms. Whereas many security solutions are well studied for models and their implementation for separated security domains, this is not the case for data-centric services and adaptive IT systems.

The aim of the RISI 2015 workshop is to discuss risk scenarios with data-centric services and approaches for improving "Resilience in Social Infrastructures" as well as the necessity to take non-technical aspects into consideration. We encourage academic researchers and industry experts to present and discuss novel ideas and ongoing work. Contributions addressing promising approaches to provide and manage resilient infrastructures with data-centric services are invited as research in progress and best practices.

===================
Topics of interest include, but are not limited to:
===================

Risk assessment and vulnerability analysis for data-centric services
* Economics of controls
* Risk measurements and controlling
* Identification of vulnerabilities
* Methods of Business Intelligence
* Management of data quality
* Risk scenarios

Policy and IT security management for data-centric services
* Authentication, authorization, and accounting
* Policy management for processing of personal data
* Policy enforcement vs. monitoring and their risks
* Anonymity/pseudonymity
* Legal implications of data-centric services and security mechanisms

Methods for resilience & best practices
* Privacy and security in participatory sensing
* Critical information infrastructure protection
* Human-centric resilience systems
* Measurements of resilience
* Case studies

===================
Important Dates
===================

Submission Deadline May 18, 2015 (EXTENDED)
Author Notification May 29, 2015
Proceedings Version June 15, 2015
Conference August 24 – 28, 2015

===================
Submission Guidelines
===================

The submission guidelines valid for the workshop are the same as for the ARES conference. They can be found at http://www.ares-conference.eu.

===================
Organizing Committee
===================

* Isao Echizen
National Institute of Informatics, Japan
iechizen@nii.ac.jp
* Stefan Sackmann
Martin-Luther University Halle-Wittenberg, Germany
stefan.sackmann@wiwi.uni-halle.de
* Sven Wohlgemuth
wohlgemuth@acm.org

===================
Program Committee (tbc)
===================

* Mathias Fischer, International Computer Science Institute, USA
* Koichiro Hayashi, Institute of Information Security Yokohama, Japan
* Ioannis Krontiris, Huawei Technologies, Germany
* Hiroshi Maruyama, Institute of Statistical Mathematics, Japan
* Leonardo Mostarda, University of Camerino, Italy
* Andreas Peter, University of Twente, Netherlands
* Heiko Roßnagel, Fraunhofer IAO, Germany
* Ryoichi Sasaki, Tokyo Denki University, Japan
* Christian Schaefer, Ericsson AB Research, Sweden
* Stephan Sigg, Georg-August University Göttingen, Germany
* Ali Sunyaev, University of Cologne, Germany
* Kazuo Takaragi, National Institute of Advanced Industrial Science and Technology, Japan
* Edgar Weippl, Secure Business Austria, Austria
* Rigo Wenning, W3C/ERCIM, France
* Hideki Yoshii, Softbank Telecom Corp., Japan
* Hiroshi Yoshiura, The University of Electro-Communications of Tokyo, Japan
* Christian Zimmermann, Albert-Ludwigs University Freiburg, Germany
* Alf Zugenmaier, University of Applied Sciences Munich, Germany

Related Resources

IOCRCI 2024   2nd Workshop on Impact of IT/OT Convergence on the Resilience of Critical Infrastructures
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
IOCRCI 2024   2nd Workshop on Impact of IT/OT Convergence on the Resilience of Critical Infrastructures
IEEE CSR 2024   2024 IEEE International Conference on Cyber Security and Resilience
CSW 2024   2024 3rd International Conference on Cyber Security
JoL 2024   International Journal of Law
Social Sustainability 2025   Twenty-first International Conference on Environmental, Cultural, Economic & Social Sustainability
SI on ATD&IS III 2024   Special Issue on Advanced Technologies in Data and Information Security III, Applied Sciences, MDPI
SMM4H 2024   The 9th Social Media Mining for Health Research and Applications Workshop and Shared Tasks — Large Language Models (LLMs) and Generalizability for Social Media NLP
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust