| ||||||||||||||||||
| ||||||||||||||||||
All CFPs on WikiCFP | ||||||||||||||||||
| ||||||||||||||||||
Present CFP : 2011 | ||||||||||||||||||
This workshop will explore crucial issues concerning interoperable identity management technologies for the information society. With the growing spectrum of identity-enabled client devices – ranging from electronic ID cards, Smartphone’s, TV sets, Tablets, PCs all the way to server backend and cloud services – identity management plays a critical role for the overall security, privacy and success of the emerging paradigms. Identity management is an interdisciplinary endeavor for maintaining the integrity of identities through their life cycle in order to make the identities available to services in a secure and privacy protected manner. Digital identities play increasingly important roles as our society depends more and more on services provided over the Internet. For example, solid identity management practices are essential for implementing social welfare (e.g., healthcare and e-government), enabling secure service offering (e.g., cloud computing and SaaS), personalizing users’ experiences (e.g., e-commerce and entertainment), and connecting people over networks (e.g., social networking and mobile communications).
Comprehensive solutions to digital identity management, therefore, require addressing multiple challenges and striking the best balance between usability, security, and privacy. In addition, interoperability is crucial because an increasing number of identity solutions are being proposed, taking different approaches with different goals. Existing solutions are not necessarily interoperable or complementary – and sometimes overlap. Moreover, they may not integrate well with the legacy systems that constitute majority of the state of the art. It is important to lay foundations for a holistic understanding of problem areas and establish guidelines, methodologies and tools to achieve interoperability between different solutions to foster healthy progressive adoption by industries and users. Topics: The workshop seeks submissions from diverse communities, such as social networking, open source projects, standardization for governments, system & security administrators, software engineers, and corporate & academic researchers. Topics of interest include, but are not limited to: - Novel approaches to identity management - Privacy-enhancing technologies - Identity management for mobile and ubiquitous computing - Identity in cloud computing - Identity in social networks - Identity solutions for specific areas (e.g., healthcare, government, and education) - Identity theft prevention in face of malware and phishing - Applied cryptography for Identity Management - (Privacy-preserving) identity profiling and fraud detection - Identity discovery, life cycle and governance - Identity user experience - Attribute based authentication and access control - User-centric identity management - Ad-hoc, de-centralized and reputation-based identity - Biometric Identity - Experience reports on identity management practices The goal of this workshop is to share the latest findings, identify key challenges, inspire debates, and foster collaboration between industries and academia towards interoperable identity service infrastructures. | ||||||||||||||||||
|