posted by system || 1579 views || tracked by 4 users: [display]

BPS 2009 : 1st International Workshop on Business Processes Security

FacebookTwitterLinkedInGoogle


Conference Series : Business Processes Security
 
Link: http://www.securescm.org/BPS2009.php
 
When Aug 31, 2009 - Sep 4, 2009
Where Linz, Austria
Submission Deadline Feb 28, 2009
Notification Due May 1, 2009
Final Version Due May 31, 2009
Categories    security
 

Call For Papers

1st International Workshop on Business Processes Security
BPS '09


In conjunction with DEXA 2009

August 31- September 4, 2009

University of Linz, Austria

As business-process automation started to take hold in the early 1990s, organizations began to replace people with mainframe applications and EDI transfers to perform mundane tasks including data entry and processing. However, for crucial business processes such as wire transfers, customer database queries, supply chain management and purchase orders, organizations continued to use human intervention, believing that auditor supervision was required to ensure accurate money transfers and appropriate access controls to sensitive information.
Today, no division of labor exists between the tasks for which applications and people are responsible. Conversely, human auditors and applications work together in concert to manage business processes and the Web servers, databases, and middleware on which they depend. However, many of these applications, especially Web-based ones, are rife with vulnerabilities, ranging from SQL injection to cross-site scripting. Even the Service Oriented Architectures they run on are far more vulnerable than their predecessors—mainframes and leased-line transfers. As a result, although SOA-based applications help expedite business processes, they at the same time expose organizations to a considerable amount of security risk.
Ensuring the secure functioning of SOAs and, by extension, the business processes they support, has become crucial to an enterprise’s success and managing application vulnerabilities has thereby grown vastly in importance.
The workshop on Business Processes Security invites the submission of papers.
Researchers and practitioners are encouraged to submit papers on all aspects of security and privacy concerning business processes including management processes, operational processes and supporting processes.
Paper submissions can be either research papers, or industry reports. Submissions from companies, practitioners and vendors are encouraged.

Suggested Topics
BPS 2009 invites research submissions on all topics related to all aspects of security and privacy concerning business processes, but are not limited to those listed below:


* Secure computation paradigms for business processes
* SOA Security
* Business Process dependability
* Business process privacy and access control
* Controlled information sharing in business coalitions
* Secure computation paradigms for business processes



IMPORTANT DATES

* Submission of full papers: February 28, 2009
* Notification of acceptance: May 1, 2009
* Camera-ready copies due: May 31, 2009


Conference Chairpersons

* Ernesto Damiani, University of Milan, Italy
* Florian Kerschbaum, SAP, Germany
* Stefania Marrara, University of Milan, Italy


Program Committee

* Paolo Ceravolo, University of Milan, Italy
* Octavian Catrina, International University in Germany
* Stelvio Cimato, University of Milan, Italy
* Angelo Corallo, EBMS University of Lecce, Italy
* Fulvio Frati, University of Milan, Italy
* Cristiano Fugazza, University of Milan, Italy
* Gabriele Gianini, University of Milan, Italy
* Sebastiaan de Hoogh, Technische Universiteit Eindhoven, Netherlands
* Fernando Liesa, Zaragoza Logistics Center, Spain
* Richard Pibernik, European Business School International University, Germany
* Amitabh Saxena, International University in Germany
* Berry Schoemakers, Technische Universiteit Eindhoven, Netherlands
* Olga Scotti, University of Milan, Italy
* Davide Storelli, EBMS University of Lecce, Italy
* Lotz Volkmar, SAP AG, Germany
* Antonio Zilli, EBMS University of Lecce, Italy


Paper Submission Details

Authors are invited to submit original research contributions or experience reports in English.

* The submitted manuscript should closely reflect the final paper as it will appear in the Proceedings.
* Papers should not exceed 5 pages in IEEE format (http://www.computer.org/portal/site/cscps/index.jsp).
* Any submission that exceeds length limits or deviates from formatting requirements may be rejected without review.

For paper registration and electronic submission see DEXA website.
Submitted papers will be carefully evaluated based on originality, significance, technical soundness, and clarity of exposition. Authors are requested to submit their paper electronically before February 28, 2009.
Duplicate submissions are not allowed and will automatically be rejected without further review. A submission is considered to be a duplicate submission if, at any time during the time when the submission is under consideration, there is another paper with the following properties:

1. the main technical content of the paper substantially overlaps that of the submission to another conference, or
2. the paper is published or under consideration for publication in a refereed journal or proceedings (electronic or printed) that is generally available (e.g., not limited to conference attendees).

Authors do at with their submission automatically agree to the following terms:
"I understand that the paper being submitted must not overlap substantially with any other paper that I am a sole author or co-author of and that is currently submitted elsewhere. Furthermore, previously published papers with any overlap are cited prominently in this submission."
Questions about this policy or how it applies to your work should be directed to the conference chairs. For further inquiries, please contact the Conference Organisation Office ( gabriela@dexa.orgThis e-mail address is being protected from spambots, you need JavaScript enabled to view it ) or the workshop contact person Stefania Marrara ( marrara@dti.unimi.itThis e-mail address is being protected from spambots, you need JavaScript enabled to view it ).
All accepted conference papers will be published in IEEE DEXA'09 workshop proceedings.

Related Resources

TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
DSN 2018   The 48th IEEE/IFIP International Conference on Dependable Systems and Networks
EJEMS - 1 2018   The European Journal of Economics and Management Sciences
Future_Internet-SI 2017   Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
Cyber Security 2018   IEEE International Conference on Cyber Security and Protection of Digital Services
AI 2017   3rd International Conference on Artificial Intelligence and Applications
CLOUD 2018   The 11th International Conference on Cloud Computing
eCrime 2018   13th Symposium on Electronic Crime Research
Smart-City-IoT-Security 2017   Special Issue on Security of IoT-enabled Infrastructures in Smart Cities