posted by user: rossnage || 6645 views || tracked by 4 users: [display]

OID 2016 : Open Identity Summit 2016


When Oct 13, 2016 - Oct 14, 2016
Where Rome, Italy
Submission Deadline May 8, 2016
Notification Due Jun 20, 2016
Final Version Due Jul 15, 2016
Categories    identity management   open source   privacy   security

Call For Papers

Open Identity Summit 2016
October 13th - 14th 2016, Rome, Italy
May 8th, 2016 deadline for electronic submissions via

The aim of Open Identity Summit 2016 is to link practical experiences and requirements with academic innovations. Focus areas will be Research and Applications in the area of Identity Management, Trust Services, Open Source, End-to-End Encryption and Cloud Computing.
Open standards and interfaces as well as open source technologies play a central role in the current identity management landscape as well as in emerging future scenarios in the area of electronic identification and trust services for electronic transactions according to the eIDAS regulation (2014/910/EC), trustworthy endto- end encryption and innovative applications in the area of e-health, e-government and cloud computing for example. While there are already plenty of successful applications in which those techniques are used to safeguard the authenticity, integrity and confidentiality, there are still many closely related areas which demand further research.
We invite stakeholder and technical experts from public administration, industry, science and academia to propose contributions to the program of the workshop. Submissions should be short papers (5-6 pages) or full papers (max. 12 pages) in English. Submitted papers will be reviewed by the program committee.
Accepted papers will be presented at the workshop and are planned to be published in the GI-Edition Lecture Notes in Informatics (LNI).

Topics of Interest
The topics of the workshop include but are not limited to:
Identity Management and Privacy
* Security and interoperability of identity management, credential technologies and electronic identity tokens.
* Security analysis and proofs for authentication protocols and federated identity management protocols based on SAML, OpenID, WS-* and OAuth for example.
* Privacy by Design, Privacy by Default, Privacy-Enhancing Technologies.
* Concepts for and practical experiences with components, systems, services, processes and applications for identity management and end-to-end encryption.
* Novel technologies for identity management and end-to-end encryption.
* Mobile aspects of identity management and alternative identity tokens.
* Standards, interoperability aspects and interoperable solutions for identity management and end-toend encryption.
* Secure, evident and sustainable identity management solutions for electronic processes, records management and IT-service-platforms.
* International, global and long term aspects of identity management.
* Legal and socio-economic aspects of privacy and identity management.
* Privacy, non-traceability, auditability and evidence within identity management systems.
Trust Services and Related Applications
* Legal and technical aspects related to the eIDAS regulatory framework (2014/910/EC).
* Economic aspects related to electronic identification and trust services in particular for electronic signatures, electronic seals, electronic time stamps, electronic registered delivery and website authentication.
* Standards, technologies and innovative solutions related to electronic identification and trust services in particular for electronic signatures, electronic seals, electronic time stamps, electronic registered delivery and website authentication.
* Aspects related to the certification and accreditation of trust services and related components.
* Concepts and solutions for the long-term preservation of evidence with respect to identification and authentication processes or the authenticity and integrity of electronic data.
Open Source
* Security, interoperability as well as legal and economic aspects of open source in the area of security and identity management.
* Concepts and practical experiences with open source components related to security, identity management and end-to-end-encryption.
* Integration of identity management solutions in existing open source libraries or frameworks.
* Open source tools for distributed specification, development, quality assurance and dissemination of project results.
* Aspects related to open source community development and federated social media.
* New open source projects and news from existing open source projects in the area of security, identity management, trust services, end-to-end encryption and cloud computing.

Conference Chair
- Maurizio Talamo (Fondazione INUIT),
- Heiko Ro├čnagel (Fraunhofer IAO),
- Detlef H├╝hnlein (ecsec GmbH),
- Christian Schunck (Fondazione INUIT),

Local Organisation
- Daniela Merella (Fondazione INUIT),

Program Committee
The program comittee is listed on:

Important Dates
Paper Submission Deadline: EXTENDED to May 8th

For further information please visit:

Related Resources

OID 2020   Open Identity Summit 2020
IEEE COINS 2020   Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Security | Embedded Systems | Circuit and Systems | WSN | 5G
ALLDATA 2020   The Sixth International Conference on Big Data, Small Data, Linked Data and Open Data
MoWiN 2020   9th International Conference on Mobile & Wireless Networks
FG 2020   IEEE FG 2020 Chalearn Looking at People Workshop and Challenge on Identity-preserved Human Detection (IPHD)
PST 2020   18th Annual International Conference on Privacy, Security, and Trust (PST2020)
React Summit 2020   React Summit Amsterdam Conference
NCWMC 2020   5th International Conference on Networks, Communications, Wireless and Mobile Computing
RaySummit 2020   Ray Summit 2020
CCCIOT 2020   International Conference on Cloud Computing and IOT (CCCIOT 2020)