| |||||||||||||||
SPRINGL 2010 : 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS | |||||||||||||||
Link: http://springl2010.modap.org | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
***************************************************************
3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS,2010 (SPRINGL'10), http://springl2010.modap.org Co-located with 18th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems (ACM SIGSPATIAL GIS 2010) http://acmgis2010.cs.ucsb.edu/ November 2, 2010, San Jose, CA, USA *************************************************************** CALL FOR RESEARCH PAPERS Our society is witnessing a dramatic increase in geospatial data infrastructures, data products, and services, many of them playing a key role in decision making in organizations. There are currently major national and international efforts in the coordinated development, use, sharing, and dissemination of geospatial data in several application contexts including homeland security, environmental crises, and natural and industrial disasters. Geospatial infrastructures are being leveraged by companies to provide a large variety of location-based services (LBS) able to tailor services to users. However, despite the increase of publicly accessible geospatial information only little attention is being paid on how to secure geospatial information systems (GIS) and LBS. Privacy is also of increasing concern given the sensitivity of personally-identifiable location information. This is despite major advancements that have been made in secure computing infrastructures and the secure and privacy-preserving management of traditional (relational) data in particular. Given these pressing needs for securing GIS and LBS as well as assuring privacy, it is compelling to investigate security and privacy aspects as they relate to the management of geospatial data and the development of both emerging LBS and mission-critical geographic applications. SPRINGL 2010 is the third workshop in the SPRINGL workshop series that aims at bringing together researchers working on the foundations of the field and on novel applications bridging spatio-temporal data management and security and privacy. TOPICS We encourage both researchers and practitioners to participate and submit papers on topics including, but not limited to the following: Access control for spatio-temporal databases Access control for moving object databases Administration of security and privacy policies Anonymization techniques for LBS Application of encryption techniques to LBS Convergence of physical and logical security Context-aware access control Context-aware digital identity management Context-aware location privacy Digital rights management for geospatial data High assurance integrity for geospatial data Information hiding in geospatial data Interdiciplinary approaches to location privacy and location-based security Location and movement-aware security Mobile identities Obfuscation of sensitive geospatial information Privacy ontology Privacy-preserving analysis of spatio-temporal data Security and privacy policies for geo-social networks Secure localization Secure outsourcing of geospatial data Security and privacy for RFID systems Security and privacy for streaming data Security for spatial data infrastructures (SDI) Service-based access control to geospatial data Usability of security and privacy services for LBS Usage control for LBS and mobile users IMPORTANT DATES Paper submissions due: August 1, 2010 Notification to the authors: September 1, 2010 Camera ready papers due: September 7, 2010 ACM GIS 2010 Conference: November 2-5, 2010 SPRINGL'10 Workshop: November 2, 2010 WORKSHOP ORGANIZATION General Chair: Elisa Bertino, Purdue University, USA Program Co-chairs: Maria Luisa Damiani, University of Milan, Italy Y?cel Saygin, Sabanci University, Istanbul, Turkey Web Site Chair: Mehmet Emrah Durulan, Sabanci University, Istanbul, Turkey PROGRAM COMMITTEE Walid Aref, Purdue University, USA Patrick Capolsini, Universit? de la Polyn?sie Fran?aise Reynold Cheng, University of Hong Kong, Hong Kong Isabel Cruz, University of Illinois at Chicago, USA Josep Domingo-Ferrer, Universitat Rovira i Virgili, Catalonia, Spain Matt Duckham, University of Melbourne, Australia Paul El Khoury, SAP Research, France Bert-Jaap Koops, University of Tilburg, Netherlands Michael Gertz, University of Heidelberg, Germany Gabriel Ghinita, Purdue University, USA James Joshi, University of Pittsburgh, USA Fosca Giannotti, ISTI-CNR, Italy Man Lung Yiu, Hong Kong Polytechnic University, Honk kong Ling Liu, Georgia Institute of Technology, USA Jorge Lobo, IBM, USA Herv? Martin, University of Grenoble, France Mohamed Mokbel, University of Minnesota, USA Tiancheng Li, Purdue University, USA Indrakshi Ray, Colorado State University, USA Yannis Theodoridis, University of Piraeus, Greece Vicen? Torra, IIIA-CSIC, Catalonia, Spain Erik Wilde, UC Berkeley, USA Jianliang Xu, Hong Kong Baptist University, Honk Kong Yu Zheng, Microsoft Research Asia, R.P. China SUBMISSION INSTRUCTIONS Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Submitted papers can be of two types: - Regular Research Papers: these papers should report original research results or significant case studies. They should be at most 8 pages. - Position Papers: these papers should report novel research directions or identify challenging problems. They should be at most 5 pages. Manuscripts (regular paper and position paper) should be submitted in PDF format and formatted using the ACM camera-ready templates available at: http://www.acm.org/sigs/pubs/proceed/template.html. The type of the paper (i.e, regular or position paper) must be specified. Papers must be electronically submitted at the following address: http://www.easychair.org/conferences/?conf=springl2010. Authors of accepted papers must guarantee that their paper will be presented at the workshop. A special issue including the best regular papers will be organized for publication in the Transactions on Data Privacy (http://www.tdp.cat/). |
|