posted by user: wpetrae || 2272 views || tracked by 4 users: [display]

PSPAE 2011 : 3rd Workshop on Privacy and Security in PervasiveEnvironments

FacebookTwitterLinkedInGoogle

Link: http://www.petrae.org
 
When May 25, 2011 - May 27, 2011
Where Crete, Greece
Submission Deadline Mar 10, 2011
Notification Due Mar 20, 2011
Final Version Due Mar 25, 2011
 

Call For Papers

**************************************

Call for Papers - Workshop PSPAE 2011
**************************************
The 3rd Workshop on
"Privacy and Security in Pervasive Environments "

*** Proceedings published by ACM (electronic) **
(in conjunction with 4th International Conference on
PErvasiveTechnologies Related to Assistive Environments
(PETRA) 2011)
Crete, Greece


Workshop Theme and Goals
Pervasive computing pushes forward a vision where technology is integrated into everyday objects with the intent of facilitating the life of humans and making their interaction with the surrounding environment simpler. A critical element of pervasive and ambient intelligence environments is awareness: computing environments become aware of the activities of their users and a lot of their daily activities can be captured and recorded for future use. The users frequently ignore the amount of their personal data being collected and processed or shared wirelessly and how much their privacy may be invaded. An understanding of privacy in the domain of pervasive computing and learning to address privacy concerns is very critical. Ensuring the security and privacy of users' data is a critical prerequisite to creating public trust for pervasive environments. It is therefore, necessary for such environments to be designed, implemented and used in compliance with data subjects' fundamental rights while the adoption of specific safeguards is required. In addition, since misuse of collected data is easily enabled, preventive measures are needed. .

Privacy-Enhancing Technology (PET) concepts have been developed and applied while guidelines are found in the literature on how to deal with data so that the application of pervasive technology to become privacy-friendly. However, using privacy enabling and enhancing tools is not always easy. Pervasive computing environments are based on the use of wireless devices that have limited processing power, bandwidth, throughput, memory etc. These factors put a resource limitation on implementing resource demanding tools and protocols for privacy protection. Additionally, legal support for widespread use of PETs is missing and the introduction of additional legislation should be examined.





Topics of Interest

We are interested in original papers and case studies describing advances in all areas of assistive technologies for physical, occupational therapy and rehabilitation, including but not limited to:
Privacy, security and trust in the design of pervasive and ambient intelligence environments
Ethical issues of Ambient Intelligence
Ethical guidelines for the design of pervasive and ambient intelligence environments
User and/or usability/user experience studies related to the design of pervasive and ambient intelligence environments
Policies and practices for access, authentication, authorization and auditing in pervasive and ambient environments
Policies for information sharing in pervasive environments
User and context awareness in pervasive computing and ambient intelligent environments
Access Control enforcement, authentication and secure data access in pervasive environments
Encryption, cryptographic techniques to ensure privacy and security in pervasive environments
Case studies in respect to privacy and security in pervasive environments
Developing secure pervasive/ambient infrastructures
Important Dates
Paper Submission Deadline: March 10, 2011

Acceptance Notification: March 20, 2011

Workshop Chairs
Grammati Pantziou
Technological Educational Institution (T.E.I.) of Athens, Greece
Petros Belsis
T.E.I. of Athens, Greece
Tassos Dimitriou
A.I.T., Athens, Greece

Submission Information
Submissions should be in ACM style format and will be accepted as either full paper (8 pages) or short paper (4 pages). For Latex and MS Word templates please go to http://www.acm.org/sigs/publications/proceedings-templates Please refer also to the conference submission guidline latest announcements.



Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
CSF 2025   38th IEEE Computer Security Foundations Symposium - deadline 3
ICISPP--Ei 2025   2025 6th International Conference on Information Security and Privacy Protection (ICISPP 2025)
CGIP--EI 2025   2025 3rd International Conference on Computer Graphics and Image Processing (CGIP 2025)
FL-AsiaCCS 2025   International Workshop on Secure and Efficient Federated Learning In Conjunction with ACM AsiaCCS 2025
ICISPP 2025   2025 6th International Conference on Information Security and Privacy Protection (ICISPP 2025)
IWSPA 2025   IWSPA 2025 : The 11th ACM International Workshop on Security and Privacy Analytics
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 2
S&P 2025   The 45th IEEE Symposium on Security and Privacy