| |||||||||||||||
ACMDIM 2013 : ACM Digital Identity Management Workshop 2013 | |||||||||||||||
Link: http://cccs.ncl.ac.uk/dim2013/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Call for Papers
=============== “Identity at the Crossroads” This workshop will explore crucial issues concerning interoperable identity management technologies for the information society. Identity management has seen a series of development in the recent years. Whereas identity management and federation standards have been solidified and adopted in practice, nations world-wide are investing in electronic identity systems as strong root identities for their citizens offering a promise for strong authentication. Privacy-enhancing identity systems have reached some technical maturity and may offer user authentication with minimal disclosure. At the same time, personal identifiable information and the user’s identity has become a commodity to drive the business of global corporations. Whereas such companies sought to bind the users’ accounts to their unique identity, there has been a reported unrest and anxiety of users because of their diminishing privacy protection. We see identity at the crossroads. One possibility is the unique identification and strong authentication road that may offer increased trust for e-commerce and increasing cloud services. Another is the road of attribute exchange and leveraging the user’s personal identifiable information that may benefit business and help users to have a consistent experience among many mobile compute platforms. Finally, there is the privacy-enhancing identity systems road that may offer additional protection for the user’s civil rights. Partially these different roads seem to contradict each other. Research can offer roads less taken that overcome these seeming contradictions and come up with next generation identity solutions. The workshop seeks submissions from diverse communities, such as social networking, open source projects, standardization fora, governments, system & security administrators, software engineers, and corporate & academic researchers. Topics of interest include, but are not limited to: Novel approaches to identity management Privacy-enhancing technologies Identity management for mobile and ubiquitous computing Identity in cloud computing Identity in social networks Identity solutions for specific areas (e.g., healthcare, government, and education) Identity theft prevention in face of malware and phishing Applied cryptography for Identity Management (Privacy-preserving) identity profiling and fraud detection Identity discovery, life cycle and governance Identity user experience Attribute based authentication and access control User-centric identity management Ad-hoc, de-centralized and reputation-based identity Biometric Identity Experience reports on identity management practices The goal of this workshop is to share the latest findings, identify key challenges, inspire debates, and foster collaboration between industries and academia towards interoperable identity service infrastructures. Paper Submission Process ======================== Submissions must be made by the deadline of Thursday, July 25, 2013 23:59 (UTC-11), through EasyChair (https://www.easychair.org/conferences/?conf=acmdim2013). Authors will be notified of reviews on August 15, 2013. Submitted papers must not substantially overlap with other papers that have been published or that are simultaneously submitted to a journal, conference or workshop. Simultaneous submission of the same work is not allowed. Authors of accepted papers must guarantee that their papers will be presented at the workshop. Accepted papers will be published by ACM Press in the workshop proceedings. Paper Format ============ Submissions must be at most 10 pages in double-column ACM format (http://www.acm.org/sigs/publications/sig-alternate.pdf) excluding the bibliography and well-marked appendices, and at most 12 pages overall. Submissions must be anonymized and avoid obvious self-references. Only PDF files will be accepted. Submissions not meeting these guidelines risk rejection without consideration of their merits. Important Dates =============== Submission: July 29, 2013 23:59 UTC-11 Notification: August 15, 2013 Camera-ready: August 30, 2013 (firm) Workshop: November 8, 2013 Programme Chairs ================ Thomas Groß, Newcastle University, United Kingdom Marit Hansen, ULD, Germany Publication Chair ================= Budi Arief, Newcastle University, United Kingdom Steering Committee ================== Elisa Bertino, Purdue University, USA Abhilasha Bhargav-Spanzel, Intel, USA Thomas Groß, Newcastle University, UK Kenji Takahashi, NTT Innovation Institute Inc., USA Programme Committee =================== Gail-Joon Ahn, Arizona State University, USA Elisa Bertino, Purdue University, USA Abhilasha Bhargav-Spantzel, Intel, USA Sonja Buchegger, KTH, Stockholm, Sweden Marco Casassa Mont, HP Labs, UK David Chadwick, University of Kent, UK Melissa Chase, Microsoft Research, US Chihung Chi, Tsinghua University, China Simone Fischer-Hübner, Karlstad University, Sweden Lothar Fritsch, Norwegian Computing Center, Norway Hidehito Gomi, Yahoo! Japan Research, Japan Thomas Groß, Newcastle University, UK Weili Han, Fudan University, China Marit Hansen, ULD, Germany Jaap-Henk Hoepman, Radboud University Nijmegen, Netherlands Seung-Hyun Kim, ETRI, Korea Howard Lipson, CERT, USA Maciej Machulak, Cloud Identity/Newcastle University, UK Eve Maler, Forrester Research, USA Siani Pearson, Hewlett-Packard Laboratories, UK Kai Rannenberg, Goethe University, Frankfurt, Germany Jörg Schwenk, Ruhr-University Bochum, Germany Kent Seamons, Brigham Young University, USA Jon A. Solworth, University of Illinois at Chicago, USA Sandra Steinbrecher, SAP Research, Germany Kenji Takahashi, NTT Innovation Institute Inc., USA Jozef Vyskoč, VaF, Slovakia Peter Weik, T-Systems, Germany |
|