| |||||||||||||||
IFIP IDMAN 2013 : 3rd IFIP WG 11.6 Working Conference on Policies & Research in Identity Management | |||||||||||||||
Link: http://www.idman2013.com/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Call for Papers
IFIP IDMAN 2013 - 3rd IFIP WG 11.6 Working Conference on Policies & Research in Identity Management London, UK, 8th-9th April 2013 www.idman2013.com Background Building on the success of IDMAN 2007 and 2010 (which were held in Rotterdam and Oslo, respectively), this conference focuses on the theory, technologies and applications of identity management. IFIP IDMAN 2013, the 3rd IFIP WG 11.6 Working Conference on Policies & Research in Identity Management, will take place between the 8th and 10th of April 2013 at Royal Holloway, University of London, UK. Conference scope The world of the 21st century is, more than ever, global and impersonal. As a result of increasing cyber fraud and cyber terrorism, the demand for better technical methods of identification is growing, not only in companies and organisations but also in the world at large. Moreover, in our society digital identities increasingly play a role in the provision of eGovernment and eCommerce services. For practical reasons, Identity Management Systems are needed that are usable and interoperable. At the same time, individuals increasingly leave trails of personal data when using the Internet, which allows them to be profiled and which may be stored for many years to come. Technical trends such as Cloud Computing and pervasive computing make personal data processing non-transparent, and make it increasingly difficult for users to control their personal spheres. As part of this tendency, surveillance and monitoring are increasingly present in society, both in the public and private domains. Whilst the original intention is to contribute to security and safety, surveillance and monitoring might, in some cases, have unintended or even contradictory effects. Moreover, the omnipresence of surveillance and monitoring systems might directly conflict with public and democratic liberties. These developments raise substantial new challenges for privacy and identity management at the technical, social, ethical, regulatory, and legal levels. Identity management challenges the information security research community to focus on interdisciplinary and holistic approaches, while retaining the benefits of previous research efforts. Topics for papers Papers offering research contributions to the area of identity management are solicited for submission to the 3rd IFIP WG-11.6 IDMAN conference. Papers may present theory, applications or practical experience in the field of identity management, from a technical, legal or socio-economic perspective, including, but not necessarily limited to: o Novel identity management technologies and approaches o Interoperable identity management solutions o Privacy-enhancing technologies o Identity management for mobile and ubiquitous computing o Identity management solutions for eHealth, eGovernmeant and eCommerce o Privacy and Identity (Management) in and for cloud computing o Privacy and Identity in social networks o Risk analysis techniques for privacy risk and privacy impact assessment o Privacy management of identity management o Identity theft prevention o Attribute based authentication and access control o User-centric identity management o Legal, socio-economic, philosophical and ethical aspects o Impact on society and politics o Related developments in social tracking, tracing and sorting o Quality of identity data, processes and applications o User centered, usable and inclusive identity management o Attacks on identity management infrastructures o Methods of identification and authentication o Identification and authentication procedures o Applications of anonymous credentials o (Privacy-preserving) identity profiling and fraud detection o Government PKIs o (Possible) role of pseudonymous and anonymous identity in identity management o Electronic IDs: European and worldwide policies and cooperation in the field of identity management o Surveillance and monitoring o (Inter)national policies on unique identifiers /social security numbers / personalisation IDs o Vulnerabilities in electronic identification protocols o Federative identity management and de-perimeterisation o Biometric verification o (Inter)national applications of biometrics o Impersonation, identity fraud, identity forge and identity theft o Tracing, monitoring and forensics o Proliferation/omnipresence of identification o Threats to democracy and political control Instructions for paper submission Submitted papers must be original, unpublished, and not submitted to another conference or journal for consideration for publication. Papers must be written in English; they should be at most 14 pages long in total. Accepted papers will be presented at the conference and published in the conference proceedings by the official IFIP publisher: Springer Science and Business Media. At least one author of each accepted paper is required to register with the conference and present the paper. Papers must be submitted in electronic form through the web. Papers must be submitted using the EasyChair conference management system at: https://www.easychair.org/conferences/?conf=ifipidman13 Please send any enquiries to: webmaster@idman2013.com Important dates Deadline for submissions: Friday 26 October 2012 Notifications to authors: Friday 14 December 2012 Camera-ready due: Friday 18 January 2013 Opening of conference: Monday 8 April 2013 Conference organisation General Chair Chris Mitchell, Royal Holloway, University of London, UK Programme Committee Chairs Simone Fischer-Hübner, Karlstad University, Sweden Elisabeth de Leeuw, Netherlands Organising Committee Chairs Haitham Al-Sinani, Royal Holloway, University of London, UK Marcelo Carlomagno Carlos, Royal Holloway, University of London, UK Program Committee Rose-Mharie Åhlfeldt, Skövde University, Sweden Haitham Al-Sinani, Royal Holloway, University of London, UK Claudio Ardagna, Università degli Studi di Milano, Italy Alessandro Armando, FBK, Italy Bharat Bhargava, Purdue University, USA Sonja Buchegger, Royal Institute of Technology, Sweden David Chadwick, University of Kent, UK Sara Foresti, Università degli Studi di Milano, Italy Lothar Fritsch, Norwegian Computing Center, Norway Steven Furnell, University of Plymouth, UK Stefanos Gritzalis, University of the Aegean, Greece Marit Hansen, Independent Centre for Privacy Protection Schleswig-Holstein, Germany Hans Hedbom, Karlstad University, Sweden Alejandro Hevia, Universidad de Chile, Chile Jaap-Henk Hoepman, TNO and Radboud University Nijmegen, the Netherlands Bart Jacobs, Radboud Universiteit, Netherlands Lech Janczewski, University of Auckland, New Zealand Ronald Leenes, Tilburg University, Netherlands Javier Lopez, University of Malaga, Spain Andreas Pashalidis, Katholieke Universiteit Leuven, Belgium Aljosa Pasic, Atos Origin, Spain Siani Pearson, Hewlett-Packard Laboratories, UK Guenther Pernul, Regensburg University, Germany Kai Rannenberg, Goethe University, Frankfurt, Germany Anne Karen Seip, Kredittilsynet, Norway Einar Snekkenes, Gjövik University College, Norway Rama Subramaniam, Valiant Technologies, India Pedro Veiga, University of Lisbon, Portugal Jozef Vyskoc, VaF, Slovakia |
|