| |||||||||||||||
SPRINGL 2009 : 2nd ACM International Workshop on Security and Privacy in GIS and LBS | |||||||||||||||
Link: http://www.cs.purdue.edu/homes/daic/springl09 | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
***************************************************************
SPRINGL'09 - 2nd ACM International Workshop on Security and Privacy in GIS and LBS Co-located with 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems (ACM GIS 2009) November 3, 2009, Seattle, WA, USA http://www.cs.purdue.edu/homes/daic/springl09 *************************************************************** CALL FOR RESEARCH PAPERS Our society is witnessing a dramatic increase in geospatial data infrastructures, data products, and services, many of them playing a key role in decision making in organizations. There are currently major national and international efforts in the coordinated development, use, sharing, and dissemination of geospatial data in several application contexts including homeland security, environmental crises, and natural and industrial disasters. Geospatial infrastructures are being leveraged by companies to provide a large variety of location-based services (LBS) able to tailor services to users. However, despite the increase of publicly accessible geospatial information only little attention is being paid on how to secure geospatial information systems (GIS) and LBS. Privacy is also of increasing concern given the sensitivity of personally-identifiable location information. This is despite major advancements that have been made in secure computing infrastructures and the secure and privacy-preserving management of traditional (relational) data in particular. Given these pressing needs for securing GIS and LBS as well as assuring privacy, it is compelling to investigate security and privacy aspects as they relate to the management of geospatial data and the development of both emerging LBS and mission-critical geographic applications. SPRINGL 2009 is the second workshop in the SPRINGL workshop series that aims at bringing together researchers working on the foundations of the field and on novel applications bridging spatio-temporal data management and security and privacy. TOPICS: We encourage both researchers and practitioners to participate and submit papers on topics including, but not limited to the following: Access control for spatio-temporal databases Access control for moving object databases Administration of security and privacy policies Anonymization techniques for LBS Application of encryption techniques to LBS Convergence of physical and logical security Context-aware access control Context-aware digital identity management Context-aware location privacy Digital rights management for geospatial data High assurance integrity for geospatial data Information hiding in geospatial data Location and movement-aware security Mobile identities Obfuscation of sensitive geospatial information Privacy ontology Privacy-preserving analysis of spatio-temporal data Security and privacy policies for geo-social networks Secure localization Secure outsourcing of geospatial data Security and privacy for RFID systems Security and privacy for streaming data Security for spatial data infrastructures (SDI) Service-based access control to geospatial data Usability of security and privacy services for LBS Usage control for LBS and mobile users IMPORTANT DATES: Paper submissions due: July 13, 2009 Notification to the authors: September 14, 2009 Camera ready papers due: September 28, 2009 ACM GIS 2009 Conference: November 4-6, 2009 SPRINGL Workshop: November 3, 2009 WORKSHOP ORGANIZATION: General Chair: Elisa Bertino, Purdue University, USA Program Co-chairs: Maria Luisa Damiani, University of Milan, Italy Y?cel Saygin, Sabanci University, Istanbul, Turkey Web Site Chair: Chenyun Dai, Purdue University, USA Proceedings Editor: Ashish Kamra, Purdue University, USA PROGRAM COMMITTEE: Gail-Joon Ahn, Arizona State University, USA Walid G. Aref, Purdue University, USA Rafae Bhatti, Oracle, USA Patrick Capolsini, Universit? de la Polyn?sie Fran?aise Reynold Cheng, University of Hong Kong, Hong Kong Isabelle Cruz, University of Illinois at Chicago, USA Josep Domingo-Ferrer, Universitat Rovira i Virgili, Catalonia, Spain Panos Kalnis, KAUST, Saudi Arabia Paul El Khoury, SAP Research, France Michael Gertz, University of Heidelberg, Germany Gabriel Ghinita, Purdue University, USA James Joshi, University of Pittsburgh, USA Fosca Giannotti, ISTI-CNR, Italy Dan Lin, Missouri University of Science and Technology, USA Ling Liu, Georgia Institute of Technology, USA Jorge Lobo, IBM, USA Herv? Martin, University of Grenoble, France Mohamed Mokbel, University of Minnesota, USA Cyrus Shahabi, University of Southern California, USA Bhavani Thuraisngham, University of Texas at Dallas, USA Kenji Takahashi, NTT, Japan Tiancheng Li, Purdue University, USA Vicen? Torra, IIIA-CSIC, Catalonia, Spain SUBMISSION INSTRUCTIONS: Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Submitted papers can be of two types: - Regular Research Papers: these papers should report original research results or significant case studies. They should be at most 10 pages. - Position Papers: these papers should report novel research directions or identify challenging problems. They should be at most 5 pages. Each submission should start with: the title, abstract, and names, contact information of authors, type of the submission (research paper or position paper). Papers should use at least 11-point font and reasonable margins on A4 or US letter-size paper (8.5 inch x 11 inch). Papers must be electronically submitted in PDF format at the following address:http://www.easychair.org/conferences/?conf=springl09. Authors of accepted papers must guarantee that their paper will be presented at the workshop. The workshop proceedings will also be part of the ACM Digital Library. A special issue including the best workshop papers will be organized for publication in the Transactions on Data Privacy (http://www.tdp.cat/). |
|