posted by user: paolo_mori || 2161 views || tracked by 2 users: [display]

TELERISE 2017 : Third Intl. Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity

FacebookTwitterLinkedInGoogle

Link: http://www.iit.cnr.it/telerise2017
 
When Sep 12, 2017 - Sep 12, 2017
Where Trento, Italy
Submission Deadline May 22, 2017
Notification Due May 31, 2017
Final Version Due Jun 12, 2017
Categories    security and privacy   legal aspects   data management   access control
 

Call For Papers

Scope: Information sharing is essential for today’s business and societal transactions. Nevertheless, such a sharing should
not violate the security and privacy requirements either dictated by Law to protect data subjects or by internal regulations,
which can be provided both at the organisation and at the individual level. An effectual, rapid, and unfailing electronic data
sharing among different parties, while protecting legitimate rights on these data, is a key issue with several shades. Among
them, how to translate the high-level law obligations, business constraints, and users’ requirements into system-level security
and privacy policies, and how to engineer efficient and practical technical solutions for policy definition and enforcement.
TELERISE aims at providing a forum for researchers and technicians from the legal and the IT disciplines, both in academia and industry, to foster an exchange of research results, experiences, and products in the area of privacy-preserving and secure data management, as well as, safety aspects in data management systems. The ultimate goal is to conceive new trends and ideas on designing, implementing, and evaluating solutions for safe, reliable, and compliant information sharing with an eye to the cross-relations between ICT and regulatory aspects of data management.


The list of relevant topics includes (may be not limited to):
-Model-based and experimental assessment of data protection
-Privacy in identity management and authentication
-Modelling and analysis languages for representation, visualization, specification of legal obligations
-Technical, legal, and user requirements for data protection
-User-friendly authoring tools to edit privacy and security policies
-Technical infrastructures for privacy and security policies management
-Technical infrastructures for supporting privacy and security policies evolution
-Privacy and security policies conflict analysis and resolution strategies
-Cross-relations between privacy-preserving technical solutions and legal regulations
-Privacy aware access and usage control
-Privacy and security policies enforcement mechanisms
-Privacy-preserving data allocation and storage
-Software systems compliance with applicable laws and regulations
-Heuristic for pattern identification in law text
-Qualitative and/or quantitative analyses of consumers awareness of technical solutions for data management

Welcome domains of application are (may be not limited to):
-Healthcare
-Telecommunications and Networks
-Cloud Computing and Web Services
-Mobile devices
-Video Surveillance
-Smart Grid, Smart Cities, and Smart Spaces
-Financial & Business organizations
-Public Administration
-Social Networks

Important dates:
Submission deadline: EXTENDED TO 22nd, May 2017
Notification of authors: 31st, May 2017
Camera-ready copy due: 12th, June, 2017

Submissions: Submitted papers must be written in English and must contain results that have not previously published nor
concurrently submitted to a journal or conference with published proceedings. Any partial overlap with any published or
concurrently submitted paper must be clearly indicated. Submissions, as pdf files, are limited to 12 pages. They must be
formatted according to Springer LNCS authors instructions.

Workshop Chairs
Ilaria Matteucci, IIT-CNR, Italy
Paolo Mori, IIT-CNR, Italy
Marinella Petrocchi, IIT-CNR, Italy

Programme Committee (To Be Confirmed)
-Benjamin Aziz, University of Portsmouth, UK
-Gianpiero Costantino, IIT-CNR, Italy
-Vittoria Cozza, University of Padova, Italy
-Francesco Di Cerbo SAP, France
-Ioanna Dionysiou, University of Nicosia, CY
-Carmen Fernandez Gago, University of Malaga, ES
-Sorren Hanvey, Lero - The Irish Software Research Centre, Limerick, Ireland
-Kuan Hon, Queen Mary University, UK
-Jens Jensen, STFC, UK
-Erisa Karafili, Imperial College London, UK
-Mirko Manea, HP Italia, IT
-Aaron Massey, Georgia Institute of Technology, US
-Kevin McGillivray, Dept. of Private Law, University of Oslo, Norway
-Andrea Saracino, IIT-CNR, Italy
-Daniele Sgandurra, Royal Holloway - University of London, UK
-Jatinder Singh, Computer Laboratory, University of Cambridge, UK
-Debora Stella, Bird & Bird, IT
-Slim Trabelsi SAP, France

Related Resources

DSIT 2024   7th International Conference on Data Science and Information Technology
CSIA 2024   15th International Conference on Communications Security & Information Assurance
SemTech4stld 2024   2nd Workshop at ESWC 2024 on Semantic Technologies and Deep Learning Models for Scientific, Technical and Legal Data
BCCA 2024   The Sixth International Conference on Blockchain Computing and Applications
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ICIIP 2024   2024 13th International Conference on Intelligent Information Processing (ICIIP 2024)
DSIT 2024   2024 7th International Conference on Data Science and Information Technology (DSIT 2024)
ICMIS--ESCI 2024   2024 2nd International Conference on Management Information System (ICMIS 2024)
AMLDS 2025   2025 International Conference on Advanced Machine Learning and Data Science
ACM ICCDE 2025   ACM--2025 11th International Conference on Computing and Data Engineering (ICCDE 2025)