| |||||||||||||||
SIMICE 2015 : The 1st IEEE International Workshop on Secure Identity Management in the Cloud Environment | |||||||||||||||
Link: http://www.computer.org/web/compsac/simice | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
[Introduction]
While identity management solutions are increasingly migrating to cloud, conventional identity management approaches are facing challenges in trust, security, privacy, computational efficiency, interoperability and service reliability in the cloud environment. Security concerns are reportedly among the biggest inhibitors holding back the wider adoption of cloud computing. Secure identity management, required by emerging cloud services, is receiving increasing attention from both service providers' and end users' perspectives, in terms of protection of enterprise assets and customers' privacy in the cloud, respectively. This workshop solicits contributions describing state of the art methodology and technology innovations in the field of secure identity management in the cloud computing environment, encourages experience sharing (both positive and negative ones), and also welcomes disruptive work-in-progress ideas towards future concepts. SIMICE is dedicated to the security aspect of identity management (IDM) in the cloud. To facilitate the communication between the two domains - conventional cryptography and cloud computing - two trackes, namely "New cryptography and security mechanisms" and "Cloud computing technology innovation to secure IDM in the cloud" are planned to attrack works from the two domains; looking at the same thing from two different perspectives. A third track, "Cross-sectorial aspects of cloud identity management" is also planned to attract works addressing cross-domain challenges. Any submission whose content is relevant to the area of secure identity management in the cloud environment will be considered, but any submission whose subject matter is related to one of the three track topics will be particularly welcome. Practically-oriented approaches will also be appreciated. [Tracks] Track 1: New cryptography and security mechanisms for IDM in the cloud privacy-preserving and trusted identities as services cloud-based password managers privacy-preserving biometrics authentication for cloud-based services biometric data protection and management in the cloud date processing and analysis in a protected domain secure operations on encrypted data, e.g., via efficient homomorphic encryption and searchable encryption, for cloud services private database querying in the cloud environment digital rights management for media data for cloud storage and sharing privacy protection of outsourced personal data from mobile device and social network Track 2: Cloud computing technology innovation to secure IDM in the cloud data separation design in the cloud environment hybrid cloud architecture design for secure data management federated and distributed identity management in the cloud user-centric identity management in the cloud environment hybrid hardware (e.g., chip-based) / software security enhancement mechanism security-enhanced distributed computing framework design, e.g., MapReduce secure database architecture and services for IDM in the cloud environment identity management in a cyber-physical cloud applications of new computer and software technologies to IDM context Track 3: Cross-sectorial aspects of cloud identity management lessons and best practice learnt from different sectors culture, ethical, legal, and regulation factors discrepancy in the understanding of trust and privacy across different sectors survey of data security concerns and understandings from various sectors standardization [Paper Submission] Authors are invited to submit original, unpublished research papers as well as industrial practice papers. Simultaneous submissions to other publications and conferences are not permitted. The length of a camera ready paper will be limited to 6 pages (IEEE Proceedings style) with up to 2 additional pages (with charges for each additional page) printed on 10-12 point fonts. Authors must follow IEEE CS Press Proceedings Author Guidelines to prepare papers. At least one of the authors of each accepted paper is required to pay full registration fee and present the paper at the workshop in person. [Organizers] Bian Yang, Gjøvik University College, Norway Julien Bringer, Morpho, France [Advisor] Christoph Busch, Center for Advanced Security Research, Darmstadt, Germany [Program Committee] Erik-oliver Blass, Airbus Group Innovations, Germany Julien Bringer, Morpho, France Christoph Busch, CASED, Germany Hervé Chabanne, Morpho and Télécom ParisTech, France Martin Gilje Jaatun, SINTEF, Norway Qi Han, Harbin Institute of Technology, China Pei-Yun Hsueh, IBM T.J. Watson Research Center, United States Thomas Kemmerich, Norwegian Information Security Laboratory, Norway Els Kindt, KU Leuven, Belgium Mingyu Li, Chinese Academy of Sciences, China Qiong Li, Harbin Institute of Technology, China Zheming Lu, Zhejiang University, China Hao Luo, Zhejiang University, China Xiamu Niu, Harbin Institute of Technology, China Shantanu Rane, PARC, USA Christian Rathgeb, CASED, Germany Chik-How Tan, National University of Singapore, Singapore Qiang Tang, Interdisciplinary Centre for Security, Reliability and Trust, Luxembourg Per Thorsheim, God Praksis AS, Norway Bian Yang, Norwegian Information Security Laboratory, Norway Jiantao Zhou, University of Macao, Macao Xuebing Zhou, Huawei European Research Center, Germany |
|