posted by user: fritsch || 5053 views || tracked by 8 users: [display]

IFIP IDMAN 2010 : 2nd IFIP WG 11.6 Working Conference on Policies & Research in Identity Management (IDMAN’10)

FacebookTwitterLinkedInGoogle

Link: http://ifipidman2010.nr.no/
 
When Nov 18, 2010 - Nov 19, 2010
Where Oslo, Norway
Submission Deadline Apr 1, 2010
Notification Due Jun 1, 2010
Final Version Due Aug 15, 2010
Categories    identity   privacy   security   trust
 

Call For Papers

IFIP IDMAN 2010 - 2nd IFIP WG 11.6 Working Conference on Policies & Research in Identity Management (IDMAN’10)

in Cooperation with The Norwegian Computing Center

in Oslo / Norway, 18 – 19 November 2010

Conference scope

The world of the 21st century is, more than ever, global and impersonal. Criminal and terrorist threats, both physical and on the internet, increase by the day. The demand for better methods of identification is growing, not only in companies and organisations but also in the world at large.

Identity management is put under pressure, due to the growing number of frauds who want to hide their true identity. Identity management challenges the information security research community to focus on interdisciplinary and holistic approaches while retaining the benefits of previous research efforts.

As part of this tendency, surveillance and monitoring are more prominently present in society, both in the public and private domain. The original intention being to contribute to security and safety, surveillance and monitoring might, in some cases, have unintended or even contradictory effects. Besides, the omnipresence of surveillance and monitoring systems might be at daggers drawn with public and democratic liberties.

Subjects

Papers offering research contributions focusing on identity management in general and surveillance and monitoring in particular are solicited for submission to the 2nd IFIP WG-11.6 International Conference on Identity Management.

Papers may present theory, applications or practical experiences in the field of national identity management, from both a technical and a social perspective, including, but not necessarily limited to:
History
Law
Philosophical and ethical aspects
Economics
Impact of surveillance and monitoring in both the physical world and in cyberspace
Impact on society and politics
Impact on e-government and e-government applications
Consecutive developments in social tracking, -tracing and -sorting
Quality of identity management in general
Quality identity data, processes and applications
Security and identity management
User centered, usable and inclusive identity management
Attacks on identity management infrastructure and procedures Central storage of general and biometric identity data
Effectiveness of surveillance and monitoring in fighting terrorism, international crime and
human trafficking
Methods of identification and authentication
Models of identification procedures
Models of inclusive identification and authentication procedures
Government PKI
(Possible) role of pseudonymous and anonymous identity in identity management
Electronic Ids European and worldwide policies and cooperation in the field of identity management and
surveillance and monitoring
(Inter)national policies on unique identifiers /social security numbers / personalisation IDs
(Inter)national applications of biometrics
Vulnerabilities of electronic identification protocols
Federative identity management and de-perimetrization
Fraud, fraud detection, fraud resistence of technologies
Biometric verification, assurance, metrics and measurements
Fraud resistance of biometrics
Junction between (large scale) applications of identity management and surveillance and
monitoring
Data Protection
Privacy and Privacy Enhancing Technologies (PETs) in identity management
Privacy Intrusion Technologies (PITs) in identity management
Privacy side-effects and privacy risks assessment of identity management Intelligence and (inter)national threats
Impersonation, identity fraud, identity forge and identity theft
Tracing, monitoring and forensics
Instructions for paper submission

Submitted papers must be original, unpublished, and not submitted to another conference or journal for consideration of publication. Papers must be written in English; they should be at most 12 pages long in total. Accepted papers will be presented at the conference and published in the conference proceedings by the official IFIP publisher Springer Science and Business Media. At least one author of each accepted paper is required to register with the conference and present the paper. Papers must be submitted in electronic form through the web. Detailed instructions for electronic submission and author instructions will follow at the Submission page.
Important dates

Submission of papers: April 1, 2010

Notification to authors: June 1, 2010

Camera-ready copies: August 15, 2010
Conference General Chair

* Elisabeth de Leeuw, TopForce B.V., Rotterdam, The Netherlands

Programme Committee co-Chairs

* Simone Fischer-Hübner, Karlstad University, Sweden
* Lothar Fritsch, Norwegian Computing Center, NR, Norway
* Alina Stan, Capgemini, The Netherlands

Publication Chair

* John Borking, Borking Consultancy, The Netherlands

Program Committee

Claudio Agostino Ardagna, Università degli Studi di Milano, Italy
Bill Caelli, Information Security Institute, Queensland University of Technology, USA
Gurpeet Dhillon, School of Business, Virginia Commonwealth University, USA
Sara Foresti, Università degli Studi di Milano, Italy
Steven Furnell, Communications & Network Research University of Plymouth, UK
Dimitris Gritzalis, Department of Informatics, Athens University of Economics and Business, Greece
Stefanos Gritzalis, University of the Aegean, Greece
Marit Hansen, Independent Centre for Privacy Protection Schleswig-Holstein, Germany
Alejandro Hevia, Dept. of Computer Science, Facultad de Ciencias Fisicas y Matematicas, Universidad de Chile
Jaap-Henk Hoepman, Radboud Universiteit, Nijmegen, The Netherlands
Gus Hosein, Department of Management Information Systems and Innovation Group, London School of Economics, UK
Bart Jacobs, Radboud Universiteit, Nijmegen, The Netherlands
Lech Janczewki, Information Systems & Operations Management, University of Auckland, New Zealand
Ronald Leenes, Tilburg University, The Netherlands
Javier Lopez, Computer Science Department, University of Malaga, Spain
Ruud van Munster, TNO Defence, Security and Safety, Delft, The Netherlands
Aljosa Pasic, Atos Origin, Madrid, Spain
Kai Rannenberg, Goethe University, Frankfurt, Germany
Anne Karen Seip, Kredittilsynet, Oslo, Norway
Rama Subramaniam, Valiant Technologies, Chennai, India
Pedro Veiga, University of Lisbon, Portugal
Jozef Vyskoc, VaF, Rovinka, Slovak Republic

Related Resources

PoEM 2024   The 17th IFIP WG 8.1 Working Conference on the Practice of Enterprise Modeling (PoEM 2024)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
IFIPTM 2024   15th Annual Conference of the IFIP WG 11.11 Trust Management in Nottingham, UK
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
SIGMETRICS / Performance 2024   2024 ACM SIGMETRICS / IFIP Performance
MSEJ 2024   Advances in Materials Science and Engineering: An International Journal
I3E 2025   The 24th IFIP Conference e-Business, e-Services, and e-Society
MATHCS 2024   2nd International Conference on Mathematics, Computer Science & Engineering
IFIP WG 8.3 2024   IFIP WG 8.3 Conference 2024 Decision Systems and Analytics for the Common Good
ICISSP 2025   11th International Conference on Information Systems Security and Privacy