posted by user: paolo_mori || 780 views || tracked by 2 users: [display]

TELERISE 2017 : Third Intl. Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity

FacebookTwitterLinkedInGoogle

Link: http://www.iit.cnr.it/telerise2017
 
When Sep 12, 2017 - Sep 12, 2017
Where Trento, Italy
Submission Deadline May 22, 2017
Notification Due May 31, 2017
Final Version Due Jun 12, 2017
Categories    security and privacy   legal aspects   data management   access control
 

Call For Papers

Scope: Information sharing is essential for today’s business and societal transactions. Nevertheless, such a sharing should
not violate the security and privacy requirements either dictated by Law to protect data subjects or by internal regulations,
which can be provided both at the organisation and at the individual level. An effectual, rapid, and unfailing electronic data
sharing among different parties, while protecting legitimate rights on these data, is a key issue with several shades. Among
them, how to translate the high-level law obligations, business constraints, and users’ requirements into system-level security
and privacy policies, and how to engineer efficient and practical technical solutions for policy definition and enforcement.
TELERISE aims at providing a forum for researchers and technicians from the legal and the IT disciplines, both in academia and industry, to foster an exchange of research results, experiences, and products in the area of privacy-preserving and secure data management, as well as, safety aspects in data management systems. The ultimate goal is to conceive new trends and ideas on designing, implementing, and evaluating solutions for safe, reliable, and compliant information sharing with an eye to the cross-relations between ICT and regulatory aspects of data management.


The list of relevant topics includes (may be not limited to):
-Model-based and experimental assessment of data protection
-Privacy in identity management and authentication
-Modelling and analysis languages for representation, visualization, specification of legal obligations
-Technical, legal, and user requirements for data protection
-User-friendly authoring tools to edit privacy and security policies
-Technical infrastructures for privacy and security policies management
-Technical infrastructures for supporting privacy and security policies evolution
-Privacy and security policies conflict analysis and resolution strategies
-Cross-relations between privacy-preserving technical solutions and legal regulations
-Privacy aware access and usage control
-Privacy and security policies enforcement mechanisms
-Privacy-preserving data allocation and storage
-Software systems compliance with applicable laws and regulations
-Heuristic for pattern identification in law text
-Qualitative and/or quantitative analyses of consumers awareness of technical solutions for data management

Welcome domains of application are (may be not limited to):
-Healthcare
-Telecommunications and Networks
-Cloud Computing and Web Services
-Mobile devices
-Video Surveillance
-Smart Grid, Smart Cities, and Smart Spaces
-Financial & Business organizations
-Public Administration
-Social Networks

Important dates:
Submission deadline: EXTENDED TO 22nd, May 2017
Notification of authors: 31st, May 2017
Camera-ready copy due: 12th, June, 2017

Submissions: Submitted papers must be written in English and must contain results that have not previously published nor
concurrently submitted to a journal or conference with published proceedings. Any partial overlap with any published or
concurrently submitted paper must be clearly indicated. Submissions, as pdf files, are limited to 12 pages. They must be
formatted according to Springer LNCS authors instructions.

Workshop Chairs
Ilaria Matteucci, IIT-CNR, Italy
Paolo Mori, IIT-CNR, Italy
Marinella Petrocchi, IIT-CNR, Italy

Programme Committee (To Be Confirmed)
-Benjamin Aziz, University of Portsmouth, UK
-Gianpiero Costantino, IIT-CNR, Italy
-Vittoria Cozza, University of Padova, Italy
-Francesco Di Cerbo SAP, France
-Ioanna Dionysiou, University of Nicosia, CY
-Carmen Fernandez Gago, University of Malaga, ES
-Sorren Hanvey, Lero - The Irish Software Research Centre, Limerick, Ireland
-Kuan Hon, Queen Mary University, UK
-Jens Jensen, STFC, UK
-Erisa Karafili, Imperial College London, UK
-Mirko Manea, HP Italia, IT
-Aaron Massey, Georgia Institute of Technology, US
-Kevin McGillivray, Dept. of Private Law, University of Oslo, Norway
-Andrea Saracino, IIT-CNR, Italy
-Daniele Sgandurra, Royal Holloway - University of London, UK
-Jatinder Singh, Computer Laboratory, University of Cambridge, UK
-Debora Stella, Bird & Bird, IT
-Slim Trabelsi SAP, France

Related Resources

ADAH 2017   Advanced Data Analytics in Health
IEEE - ICBDA 2018   2018 IEEE 3rd International Conference on Big Data Analysis (ICBDA 2018)--IEEE Xplore and Ei Compendex
BDIOT - ACM 2017   ACM - 2017 International Conference on Big Data and Internet of Things (BDIOT2017)--Ei Compendex, Scopus and ISI
DISP 2018   Special Issue on Data Intelligence in Security and Privacy, Journal of Information Security and Applications
IJDKP 2017   International Journal of Data Mining & Knowledge Management Process
WICSPIT 2018   Workshop on Innovative CyberSecurity and Privacy for Internet of Things
SACMAT 2018   23rd ACM Symposium on Access Control Models and Technologies
OPTLJ 2017   Integrated Optics and Lightwave : An International Journal
MLDM 2018   14th International Conference on Machine Learning and Data Mining MLDM 2018
MDM 2018   IEEE International Conference on Mobile Data Management