posted by user: ka_ti_bo || 5223 views || tracked by 6 users: [display]

DIM 2010 : Sixth ACM Workshop on Digital Identity Management


Conference Series : Digital Identity Management
When Oct 8, 2010 - Oct 8, 2010
Where Chicago, IL, USA
Submission Deadline Jul 6, 2010
Notification Due Aug 6, 2010
Final Version Due Aug 16, 2010
Categories    identity management

Call For Papers


Call for Papers

The Sixth ACM Workshop on Digital Identity Management

(October 8, 2010, Chicago, IL, USA. Collocated with ACM CCS2010)

The Digital Identity Management Workshop brings together academia and industry to explore all aspects of identity management. Identity management is an endeavor to make identities available to humans, services, and systems in a secure and privacy-protecting manner. Currently we are facing grand challenges, such as financial and ecological crises, which require global collaboration. Best exemplified in the cloud computing and smart grid movement, ICT-enabled infrastructures are playing a crucial role in facilitating global collaboration for economic and ecological advancement. Such infrastructures must incorporate identity management capabilities that allow individuals and organizations to identify and trust each other over networks in a scalable and reliable manner, while striking the best balance between usability, security, and privacy.

The workshop seeks submissions from diverse communities, such as open source projects, standardization fora, government organizations, security and privacy experts, software engineers, and corporate & academic researchers. Topics of interest include, but are not limited to:

* Identity management for cloud computing
* Identity management for critical infrastructure (e.g., smart grid)
* Identity assurance
* Identity governance
* Attribute aggregation
* Identity in service-oriented architecture (SOA)
* Anonymity and pseudonymity
* Accountability in identity management
* Identity management APIs
* Identity management in ubiquitous and mobile computing
* Reputation and incentive systems, and reputation management
* Privacy-enhanced identity management
* Identity solutions for specific areas (e.g., healthcare, government, education, and telecommunications)

* Identity-based access control
* Identity discovery
* Identity theft prevention
* User-centric identity management
* User experience models and integrity
* Standardization of IDM and policies thereof, standards harmonization
* Case studies and lessons from large scale deployment
* Vulnerabilities, threat analysis and risk assessment of IDM solutions (e.g., threat of malware affecting identity theft)
* Analysis of differences between requirements for consumer and enterprise IDM

The goal of this workshop is to share new findings and ideas, discover key issues, and seek opportunities for active collaboration between industry and academia.

Submission Instructions:

Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers should be at most 10 pages, using at least 10.5-point font and reasonable margins on A4 or US letter-size paper (8.5 inch x 11 inch). Committee members are not required to read the appendices, and so submissions should be intelligible without them. Each submission should start with the title, abstract, and names and contact information of authors. The introduction should give background and summarize the contributions of the paper at a level appropriate for a non-specialist reader. Authors of accepted papers must guarantee that their paper will be presented at the workshop.
Papers must be submitted in PDF format using the electronic submission page: and must be received by the deadline of June 28, 2010.

Important Dates:

* Paper submissions due : June 28, 2010
* Notification to the authors : August 6, 2010
* Camera ready papers due : August 16, 2010 (Firm deadline)
* DIM Workshop : October 8, 2010 (CCS Conference : October 4 - 10, 2010)


* Thomas Gros, IBM Research, Switzerland
* Kenji Takahashi, NTT, Japan

Program Committee:

* Gail-Joon Ahn, Arizona State University, USA
* Abhilasha Bhargav-Spantzel, Intel, USA
* Hu Bin, Huawei Technologies, USA
* Federica Paci, University of Trento, Italy
* Jan Camenisch, IBM Research, Switzerland
* Marco Casassa Mont, HP Labs, UK
* David Chadwick, University of Kent, UK
* Chihung Chi, Tsinghua University, China
* Hidehito Gomi, Yahoo! Japan Research, Japan
* Weili Han, Fudan University, China
* Seung-Hyun Kim, ETRI, Korea
* Brian LaMacchia, Microsoft, USA
* Hyung-Jin Lim, Financial Security Agency, Korea

* Howard Lipson, CERT, USA
* Paul Madsen, NTT, Canada
* Eve Maler, PayPal, USA
* Piotr Pacyna, AGH Univ. of Science and Technology, Poland
* Andreas Pfitzmann, Dresden Univ. of Technology, Germany
* Rakesh Radhakrishnan, Sun Microsystems, USA
* Amardeo Sarma, NEC Laboratories Europe, Germany
* Jorg Schwenk, Ruhr-University Bochum, Germany
* Diana Smetters, PARC, USA
* Anna C. Squicciarini, Pennsylvania State Univ., USA
* Tsuyoshi Takagi, Future University - Hakodate, Japan
* Peter Weik, Fraunhofer FOKUS, Germany

For further information: Write to or visit

Related Resources

ACM BIOTC 2024   ACM--2024 6th Blockchain and Internet of Things Conference (BIOTC 2024)
OID 2024   Open Identity Summit 2024
BIOTC 2024   ACM--2024 6th Blockchain and Internet of Things Conference (BIOTC 2024)
KDD 2024   30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining
ITMS 2023   International Scientific Conference on Information Technology and Management Science of Riga Technical University
SIGMETRICS / Performance 2024   2024 ACM SIGMETRICS / IFIP Performance
ECCWS 2024   23rd European Conference on Cyber Warfare and Security
IITUPC 2024   Immunotherapy and Information Technology: Unleashing the Power of Convergence
ISSTA 2024   The ACM SIGSOFT International Symposium on Software Testing and Analysis (Round 2)
MoStart 2024   International Conference on Digital Transformation in Education and Artificial Intelligence Applications