posted by user: paolo_mori || 1841 views || tracked by 2 users: [display]

TELERISE 2017 : Third Intl. Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity


When Sep 12, 2017 - Sep 12, 2017
Where Trento, Italy
Submission Deadline May 22, 2017
Notification Due May 31, 2017
Final Version Due Jun 12, 2017
Categories    security and privacy   legal aspects   data management   access control

Call For Papers

Scope: Information sharing is essential for today’s business and societal transactions. Nevertheless, such a sharing should
not violate the security and privacy requirements either dictated by Law to protect data subjects or by internal regulations,
which can be provided both at the organisation and at the individual level. An effectual, rapid, and unfailing electronic data
sharing among different parties, while protecting legitimate rights on these data, is a key issue with several shades. Among
them, how to translate the high-level law obligations, business constraints, and users’ requirements into system-level security
and privacy policies, and how to engineer efficient and practical technical solutions for policy definition and enforcement.
TELERISE aims at providing a forum for researchers and technicians from the legal and the IT disciplines, both in academia and industry, to foster an exchange of research results, experiences, and products in the area of privacy-preserving and secure data management, as well as, safety aspects in data management systems. The ultimate goal is to conceive new trends and ideas on designing, implementing, and evaluating solutions for safe, reliable, and compliant information sharing with an eye to the cross-relations between ICT and regulatory aspects of data management.

The list of relevant topics includes (may be not limited to):
-Model-based and experimental assessment of data protection
-Privacy in identity management and authentication
-Modelling and analysis languages for representation, visualization, specification of legal obligations
-Technical, legal, and user requirements for data protection
-User-friendly authoring tools to edit privacy and security policies
-Technical infrastructures for privacy and security policies management
-Technical infrastructures for supporting privacy and security policies evolution
-Privacy and security policies conflict analysis and resolution strategies
-Cross-relations between privacy-preserving technical solutions and legal regulations
-Privacy aware access and usage control
-Privacy and security policies enforcement mechanisms
-Privacy-preserving data allocation and storage
-Software systems compliance with applicable laws and regulations
-Heuristic for pattern identification in law text
-Qualitative and/or quantitative analyses of consumers awareness of technical solutions for data management

Welcome domains of application are (may be not limited to):
-Telecommunications and Networks
-Cloud Computing and Web Services
-Mobile devices
-Video Surveillance
-Smart Grid, Smart Cities, and Smart Spaces
-Financial & Business organizations
-Public Administration
-Social Networks

Important dates:
Submission deadline: EXTENDED TO 22nd, May 2017
Notification of authors: 31st, May 2017
Camera-ready copy due: 12th, June, 2017

Submissions: Submitted papers must be written in English and must contain results that have not previously published nor
concurrently submitted to a journal or conference with published proceedings. Any partial overlap with any published or
concurrently submitted paper must be clearly indicated. Submissions, as pdf files, are limited to 12 pages. They must be
formatted according to Springer LNCS authors instructions.

Workshop Chairs
Ilaria Matteucci, IIT-CNR, Italy
Paolo Mori, IIT-CNR, Italy
Marinella Petrocchi, IIT-CNR, Italy

Programme Committee (To Be Confirmed)
-Benjamin Aziz, University of Portsmouth, UK
-Gianpiero Costantino, IIT-CNR, Italy
-Vittoria Cozza, University of Padova, Italy
-Francesco Di Cerbo SAP, France
-Ioanna Dionysiou, University of Nicosia, CY
-Carmen Fernandez Gago, University of Malaga, ES
-Sorren Hanvey, Lero - The Irish Software Research Centre, Limerick, Ireland
-Kuan Hon, Queen Mary University, UK
-Jens Jensen, STFC, UK
-Erisa Karafili, Imperial College London, UK
-Mirko Manea, HP Italia, IT
-Aaron Massey, Georgia Institute of Technology, US
-Kevin McGillivray, Dept. of Private Law, University of Oslo, Norway
-Andrea Saracino, IIT-CNR, Italy
-Daniele Sgandurra, Royal Holloway - University of London, UK
-Jatinder Singh, Computer Laboratory, University of Cambridge, UK
-Debora Stella, Bird & Bird, IT
-Slim Trabelsi SAP, France

Related Resources

ICDIS 2022   The 4th International Conference on Data Intelligence and Security
IJOE 2022   International Journal on Organic Electronics
ICKE 2022   2022 8th International Conference on Knowledge Engineering (ICKE 2022)
CyCon 2022   14th International Conference on Cyber Conflict: Keep Moving!
Scopus-ICDPR 2022   The 6th International Conference on Data Processing and Robotics (ICDPR 2022)
USENIX ATC 2022   2022 USENIX Annual Technical Conference
EAI SecureComm 2022   18th EAI International Conference on Security and Privacy in Communication Networks
BDAI--IEEE, SCI, Ei, Scopus 2022   IEEE--2022 5th International Conference on Big Data and Artificial Intelligence (BDAI 2022)--SCI, EI Compendex, Scopus
S&P 2022   IEEE Symposium on Security and Privacy (Third deadline)