posted by user: ka_ti_bo || 2825 views || tracked by 6 users: [display]

DIM 2010 : Sixth ACM Workshop on Digital Identity Management


Conference Series : Digital Identity Management
When Oct 8, 2010 - Oct 8, 2010
Where Chicago, IL, USA
Submission Deadline Jul 6, 2010
Notification Due Aug 6, 2010
Final Version Due Aug 16, 2010
Categories    identity management

Call For Papers


Call for Papers

The Sixth ACM Workshop on Digital Identity Management

(October 8, 2010, Chicago, IL, USA. Collocated with ACM CCS2010)

The Digital Identity Management Workshop brings together academia and industry to explore all aspects of identity management. Identity management is an endeavor to make identities available to humans, services, and systems in a secure and privacy-protecting manner. Currently we are facing grand challenges, such as financial and ecological crises, which require global collaboration. Best exemplified in the cloud computing and smart grid movement, ICT-enabled infrastructures are playing a crucial role in facilitating global collaboration for economic and ecological advancement. Such infrastructures must incorporate identity management capabilities that allow individuals and organizations to identify and trust each other over networks in a scalable and reliable manner, while striking the best balance between usability, security, and privacy.

The workshop seeks submissions from diverse communities, such as open source projects, standardization fora, government organizations, security and privacy experts, software engineers, and corporate & academic researchers. Topics of interest include, but are not limited to:

* Identity management for cloud computing
* Identity management for critical infrastructure (e.g., smart grid)
* Identity assurance
* Identity governance
* Attribute aggregation
* Identity in service-oriented architecture (SOA)
* Anonymity and pseudonymity
* Accountability in identity management
* Identity management APIs
* Identity management in ubiquitous and mobile computing
* Reputation and incentive systems, and reputation management
* Privacy-enhanced identity management
* Identity solutions for specific areas (e.g., healthcare, government, education, and telecommunications)

* Identity-based access control
* Identity discovery
* Identity theft prevention
* User-centric identity management
* User experience models and integrity
* Standardization of IDM and policies thereof, standards harmonization
* Case studies and lessons from large scale deployment
* Vulnerabilities, threat analysis and risk assessment of IDM solutions (e.g., threat of malware affecting identity theft)
* Analysis of differences between requirements for consumer and enterprise IDM

The goal of this workshop is to share new findings and ideas, discover key issues, and seek opportunities for active collaboration between industry and academia.

Submission Instructions:

Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers should be at most 10 pages, using at least 10.5-point font and reasonable margins on A4 or US letter-size paper (8.5 inch x 11 inch). Committee members are not required to read the appendices, and so submissions should be intelligible without them. Each submission should start with the title, abstract, and names and contact information of authors. The introduction should give background and summarize the contributions of the paper at a level appropriate for a non-specialist reader. Authors of accepted papers must guarantee that their paper will be presented at the workshop.
Papers must be submitted in PDF format using the electronic submission page: and must be received by the deadline of June 28, 2010.

Important Dates:

* Paper submissions due : June 28, 2010
* Notification to the authors : August 6, 2010
* Camera ready papers due : August 16, 2010 (Firm deadline)
* DIM Workshop : October 8, 2010 (CCS Conference : October 4 - 10, 2010)


* Thomas Gros, IBM Research, Switzerland
* Kenji Takahashi, NTT, Japan

Program Committee:

* Gail-Joon Ahn, Arizona State University, USA
* Abhilasha Bhargav-Spantzel, Intel, USA
* Hu Bin, Huawei Technologies, USA
* Federica Paci, University of Trento, Italy
* Jan Camenisch, IBM Research, Switzerland
* Marco Casassa Mont, HP Labs, UK
* David Chadwick, University of Kent, UK
* Chihung Chi, Tsinghua University, China
* Hidehito Gomi, Yahoo! Japan Research, Japan
* Weili Han, Fudan University, China
* Seung-Hyun Kim, ETRI, Korea
* Brian LaMacchia, Microsoft, USA
* Hyung-Jin Lim, Financial Security Agency, Korea

* Howard Lipson, CERT, USA
* Paul Madsen, NTT, Canada
* Eve Maler, PayPal, USA
* Piotr Pacyna, AGH Univ. of Science and Technology, Poland
* Andreas Pfitzmann, Dresden Univ. of Technology, Germany
* Rakesh Radhakrishnan, Sun Microsystems, USA
* Amardeo Sarma, NEC Laboratories Europe, Germany
* Jorg Schwenk, Ruhr-University Bochum, Germany
* Diana Smetters, PARC, USA
* Anna C. Squicciarini, Pennsylvania State Univ., USA
* Tsuyoshi Takagi, Future University - Hakodate, Japan
* Peter Weik, Fraunhofer FOKUS, Germany

For further information: Write to or visit

Related Resources

JDIQ-CDMD 2019   Special issue of the ACM Journal of Data and Information Quality (ACM JDIQ) on Combating Digital Misinformation and Disinformation
SIGIR 2018   International ACM SIGIR Conference on Research and Development in Information Retrieval
DIM 2017   Extended: The Six IEEE International Workshop on Data Integration and Mining
ICS 2018   the 32nd ACM International Conference on Supercomputing
HPDC 2018   The 27th International ACM Symposium on High-Performance Parallel and Distributed Computing (HPDC'18)
ICEMI 2018   2018 3rd International Conference on Economics and Management Innovations
ICMR 2018   ACM International Conference on Multimedia Retrieval
PODC 2018   ACM Symposium on Principles of Distributed Computing