posted by organizer: bian_yang || 2834 views || tracked by 4 users: [display]

SIMICE 2016 : The 2nd IEEE International Workshop on Secure Identity Management in the Cloud Environment (SIMICE 2016)


When Jun 10, 2016 - Jun 14, 2016
Where Atlanta, Georgia, USA
Submission Deadline Mar 18, 2016
Notification Due Mar 28, 2016
Final Version Due Apr 7, 2016
Categories    security   privacy preserving   identity management   cloud computing

Call For Papers

****************************************** Call for Papers: IEEE Workshop SIMICE-2016 adjunct to IEEE COMPSAC 2016 ******************************************

The 2nd IEEE International Workshop on Secure Identity Management in the Cloud Environment (SIMICE-2016)
adjunct to the 40th IEEE Computer Society International Conference on Computer, Software & Applications Conference (COMPSAC 2016), Atlanta, Georgia, USA - June 10-14, 2016

SIMICE Organizers

Bian Yang, Norwegian University of Science and Technology
Julien Bringer, Morpho, France
workshop organizers’ email:
workshop website:

Invited Talks and Papers to SIMICE 2016

1.Privacy-Preserved Data Mining in Cloud
Anna Monreale, the Computer Science Department of the University of Pisa, Italy.
Wendy Hui Wang, Stevens Institute of Technology, United States.

2.Introduction of Statistical Bias in the De-Identification of Large Data Sets
Olivia Angiuli and Jim Waldo, Harvard University, United States.

Important Dates

Deadline for paper submission: March 18th, 2016
Notification of acceptance: March 28th, 2016
Camera-ready due: April 7th, 2016

Goal of the Workshop

While identity management solutions are increasingly migrating to cloud, conventional identity management approaches are facing challenges in trust, security, privacy, computational efficiency, interoperability, and service reliability in the cloud environment. Security concerns are reportedly among the biggest inhibitors holding back the wider adoption of cloud computing. Secure identity management, required by emerging cloud services, is receiving increasing attention from both service providers' and end users' perspectives, in terms of protection of enterprise assets and customers’ privacy in the cloud, respectively. This workshop solicits contributions describing state-of-the-art methodology and technology innovations in the field of secure identity management in the cloud computing environment, encourages experience sharing (both positive and negative ones), and also welcomes disruptive work-in-progress ideas towards future concepts.

Theme of the Workshop

The workshop is dedicated to the security and privacy aspects of identity management (IDM) in the cloud. Two tracks namely “Concept design and enabling technologies” and “Applications and evaluations” are planned to attract both theoretical and empirical works from the IDM society and the cloud computing society.

Scope of the Workshop

Any submission whose content is relevant to the area of secure identity management in the cloud environment will be considered, but any submission whose subject matter is related to one of the following 2 tracks’ topics will be particularly welcome. Practically-oriented approaches will also be appreciated.

Track 1: Concept design and enabling technologies
- new concept design of IDM towards cloud
- identity authentication outsourcing as a service
- technologies for enhancing privacy and security of customer data and social media (biometrics, multi-factor authentication, mobile devices)
- data processing and analysis in a protected domain for personal data management
- service-oriented architecture for IDM in cloud

Track 2: Applications and evaluations
- cross-border IDM
- security and privacy enhanced IDM for eCommerce, eCitizen, and eHealth in cloud
- case study of security breaches of IDM in cloud
- privacy and security evaluation for services in cloud

Workshop Paper Submission

All accepted papers will be published in the electronic proceedings by the IEEE Computer Society. A camera ready paper will be limited to 6 pages (IEEE Proceedings style) with up to 2 additional pages (with charges for additional pages) printed on 10-12 point fonts. Authors must follow IEEE CS Press Proceedings Author Guidelines to prepare papers. At least one of the authors of an accepted paper is required to pay full registration fee and present the paper at the workshop in person, in order to enable indexing through INSPEC and EI, and inclusion in the IEEE digital library.

Program Committee

- Erik-Oliver Blass (Airbus Group Innovations, Germany)
- Julien Bringer (Morpho, France)
- Christoph Busch (CASED, Germany)
- Hervé Chabanne (Morpho and Télécom ParisTech, France)
- Martin Gilje Jaatun (SINTEF, Norway)
- Thomas Kemmerich (Norwegian Information Security Laboratory, Norway)
- Els Kindt (KU Leuven, Belgium)
- Qiong Li (Harbin Institute of Technology, China)
- Shantanu Rane (PARC, USA)
- Christian Rathgeb (CASED, Germany)
- Chik-How Tan (National University of Singapore, Singapore)
- Qiang Tang (Interdisciplinary Centre for Security, Reliability and Trust, Luxembourg)
- Per Thorsheim (God Praksis AS, Norway)
- Bian Yang (Norwegian Information Security Laboratory, Norway)
- Xuebing Zhou (Huawei European Research Center, Germany)


Related Resources

IEEE SIMICE 2017   SIMICE 2017: The 3rd IEEE International COMPSAC Workshop on Secure Identity Management in the Cloud Environment
ICCBDC - ACM 2017   International Conference on Cloud and Big Data Computing (ICCBDC 2017)--Ei Compendex and Scopus
SOCA 2017   The 10 th IEEE International Conference on Service Oriented Computing and Applications
ICISIP 2017   The 5th IIAE International Conference on Intelligent Systems and Image Processing 2017
IEEE - ICCC 2017   3rd IEEE International Conference on Computer and Communications
ICMSS - Ei 2018   ACM--2018 2nd International Conference on Management Engineering, Software Engineering and Service Sciences (ICMSS 2018)--Ei Compendex
DSHCM 2017   First Call for Papers - The 1st International Workshop on Data Science for Human Capital Management (collocated with IEEE ICDM'17)
IJCCSA 2017   International Journal on Cloud Computing: Services and Architecture
CFC-BD&IoT 2017   Call for Book Chapters:  Handbook of Research on Big Data Management and the Internet of Things for Improved Health Systems
ACSAC 2017   Annual Computer Security Applications Conference