posted by organizer: BianYang || 8586 views || tracked by 3 users: [display]

SIMICE 2015 : The 1st IEEE International Workshop on Secure Identity Management in the Cloud Environment

FacebookTwitterLinkedInGoogle

Link: http://www.computer.org/web/compsac/simice
 
When Jul 1, 2015 - Jul 5, 2015
Where Taichung, Taiwan
Submission Deadline Apr 2, 2015
Notification Due Apr 21, 2015
Final Version Due Apr 30, 2015
Categories    identity management   cloud   security   biometrics
 

Call For Papers

[Introduction]
While identity management solutions are increasingly migrating to cloud, conventional identity management approaches are facing challenges in trust, security, privacy, computational efficiency, interoperability and service reliability in the cloud environment. Security concerns are reportedly among the biggest inhibitors holding back the wider adoption of cloud computing. Secure identity management, required by emerging cloud services, is receiving increasing attention from both service providers' and end users' perspectives, in terms of protection of enterprise assets and customers' privacy in the cloud, respectively. This workshop solicits contributions describing state of the art methodology and technology innovations in the field of secure identity management in the cloud computing environment, encourages experience sharing (both positive and negative ones), and also welcomes disruptive work-in-progress ideas towards future concepts.

SIMICE is dedicated to the security aspect of identity management (IDM) in the cloud. To facilitate the communication between the two domains - conventional cryptography and cloud computing - two trackes, namely "New cryptography and security mechanisms" and "Cloud computing technology innovation to secure IDM in the cloud" are planned to attrack works from the two domains; looking at the same thing from two different perspectives. A third track, "Cross-sectorial aspects of cloud identity management" is also planned to attract works addressing cross-domain challenges.

Any submission whose content is relevant to the area of secure identity management in the cloud environment will be considered, but any submission whose subject matter is related to one of the three track topics will be particularly welcome. Practically-oriented approaches will also be appreciated.

[Tracks]
Track 1: New cryptography and security mechanisms for IDM in the cloud

privacy-preserving and trusted identities as services
cloud-based password managers
privacy-preserving biometrics authentication for cloud-based services
biometric data protection and management in the cloud
date processing and analysis in a protected domain
secure operations on encrypted data, e.g., via efficient homomorphic encryption and searchable encryption, for cloud services
private database querying in the cloud environment
digital rights management for media data for cloud storage and sharing
privacy protection of outsourced personal data from mobile device and social network

Track 2: Cloud computing technology innovation to secure IDM in the cloud
data separation design in the cloud environment
hybrid cloud architecture design for secure data management
federated and distributed identity management in the cloud
user-centric identity management in the cloud environment
hybrid hardware (e.g., chip-based) / software security enhancement mechanism
security-enhanced distributed computing framework design, e.g., MapReduce
secure database architecture and services for IDM in the cloud environment
identity management in a cyber-physical cloud
applications of new computer and software technologies to IDM context

Track 3: Cross-sectorial aspects of cloud identity management
lessons and best practice learnt from different sectors
culture, ethical, legal, and regulation factors
discrepancy in the understanding of trust and privacy across different sectors
survey of data security concerns and understandings from various sectors
standardization

[Paper Submission]
Authors are invited to submit original, unpublished research papers as well as industrial practice papers. Simultaneous submissions to other publications and conferences are not permitted.

The length of a camera ready paper will be limited to 6 pages (IEEE Proceedings style) with up to 2 additional pages (with charges for each additional page) printed on 10-12 point fonts.

Authors must follow IEEE CS Press Proceedings Author Guidelines to prepare papers. At least one of the authors of each accepted paper is required to pay full registration fee and present the paper at the workshop in person.

[Organizers]
Bian Yang, Gjøvik University College, Norway
Julien Bringer, Morpho, France

[Advisor]
Christoph Busch, Center for Advanced Security Research, Darmstadt, Germany

[Program Committee]
Erik-oliver Blass, Airbus Group Innovations, Germany
Julien Bringer, Morpho, France
Christoph Busch, CASED, Germany
Hervé Chabanne, Morpho and Télécom ParisTech, France
Martin Gilje Jaatun, SINTEF, Norway
Qi Han, Harbin Institute of Technology, China
Pei-Yun Hsueh, IBM T.J. Watson Research Center, United States
Thomas Kemmerich, Norwegian Information Security Laboratory, Norway
Els Kindt, KU Leuven, Belgium
Mingyu Li, Chinese Academy of Sciences, China
Qiong Li, Harbin Institute of Technology, China
Zheming Lu, Zhejiang University, China
Hao Luo, Zhejiang University, China
Xiamu Niu, Harbin Institute of Technology, China
Shantanu Rane, PARC, USA
Christian Rathgeb, CASED, Germany
Chik-How Tan, National University of Singapore, Singapore
Qiang Tang, Interdisciplinary Centre for Security, Reliability and Trust, Luxembourg
Per Thorsheim, God Praksis AS, Norway
Bian Yang, Norwegian Information Security Laboratory, Norway
Jiantao Zhou, University of Macao, Macao
Xuebing Zhou, Huawei European Research Center, Germany

Related Resources

IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
IEEE-Ei/Scopus-CNIOT 2025   2025 IEEE 6th International Conference on Computing, Networks and Internet of Things (CNIOT 2025) -EI Compendex
MSEJ 2024   Advances in Materials Science and Engineering: An International Journal
ICIME 2025   2025 13th International Conference on Information Management and Engineering (ICIME 2025)
CCGrid 2025   The 25th IEEE international Symposium on Cluster, Cloud and Internet Computing
BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
IJCSITY 2024   International Journal of Computational Science and Information Technology
GenAI and LVMs for Biometrics 2025   IEEE Transactions on Biometrics, Behavior, and Identity Science (T-BIOM) Special Issue on Generative AI and Large Vision-Language Models for Biometrics
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2