| |||||||||||||
PSPAE 2011 : 3rd Workshop on Privacy and Security in PervasiveEnvironments | |||||||||||||
Link: http://www.petrae.org | |||||||||||||
| |||||||||||||
Call For Papers | |||||||||||||
**************************************
Call for Papers - Workshop PSPAE 2011 ************************************** The 3rd Workshop on "Privacy and Security in Pervasive Environments " *** Proceedings published by ACM (electronic) ** (in conjunction with 4th International Conference on PErvasiveTechnologies Related to Assistive Environments (PETRA) 2011) Crete, Greece Workshop Theme and Goals Pervasive computing pushes forward a vision where technology is integrated into everyday objects with the intent of facilitating the life of humans and making their interaction with the surrounding environment simpler. A critical element of pervasive and ambient intelligence environments is awareness: computing environments become aware of the activities of their users and a lot of their daily activities can be captured and recorded for future use. The users frequently ignore the amount of their personal data being collected and processed or shared wirelessly and how much their privacy may be invaded. An understanding of privacy in the domain of pervasive computing and learning to address privacy concerns is very critical. Ensuring the security and privacy of users' data is a critical prerequisite to creating public trust for pervasive environments. It is therefore, necessary for such environments to be designed, implemented and used in compliance with data subjects' fundamental rights while the adoption of specific safeguards is required. In addition, since misuse of collected data is easily enabled, preventive measures are needed. . Privacy-Enhancing Technology (PET) concepts have been developed and applied while guidelines are found in the literature on how to deal with data so that the application of pervasive technology to become privacy-friendly. However, using privacy enabling and enhancing tools is not always easy. Pervasive computing environments are based on the use of wireless devices that have limited processing power, bandwidth, throughput, memory etc. These factors put a resource limitation on implementing resource demanding tools and protocols for privacy protection. Additionally, legal support for widespread use of PETs is missing and the introduction of additional legislation should be examined. Topics of Interest We are interested in original papers and case studies describing advances in all areas of assistive technologies for physical, occupational therapy and rehabilitation, including but not limited to: Privacy, security and trust in the design of pervasive and ambient intelligence environments Ethical issues of Ambient Intelligence Ethical guidelines for the design of pervasive and ambient intelligence environments User and/or usability/user experience studies related to the design of pervasive and ambient intelligence environments Policies and practices for access, authentication, authorization and auditing in pervasive and ambient environments Policies for information sharing in pervasive environments User and context awareness in pervasive computing and ambient intelligent environments Access Control enforcement, authentication and secure data access in pervasive environments Encryption, cryptographic techniques to ensure privacy and security in pervasive environments Case studies in respect to privacy and security in pervasive environments Developing secure pervasive/ambient infrastructures Important Dates Paper Submission Deadline: March 10, 2011 Acceptance Notification: March 20, 2011 Workshop Chairs Grammati Pantziou Technological Educational Institution (T.E.I.) of Athens, Greece Petros Belsis T.E.I. of Athens, Greece Tassos Dimitriou A.I.T., Athens, Greece Submission Information Submissions should be in ACM style format and will be accepted as either full paper (8 pages) or short paper (4 pages). For Latex and MS Word templates please go to http://www.acm.org/sigs/publications/proceedings-templates Please refer also to the conference submission guidline latest announcements. |
|