| |||||||||||||||
SIMICE 2016 : The 2nd IEEE International Workshop on Secure Identity Management in the Cloud Environment (SIMICE 2016) | |||||||||||||||
Link: http://staging.computer.org/web/compsac2016/simice | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
****************************************** Call for Papers: IEEE Workshop SIMICE-2016 adjunct to IEEE COMPSAC 2016 ******************************************
The 2nd IEEE International Workshop on Secure Identity Management in the Cloud Environment (SIMICE-2016) adjunct to the 40th IEEE Computer Society International Conference on Computer, Software & Applications Conference (COMPSAC 2016), Atlanta, Georgia, USA - June 10-14, 2016 --------------------- SIMICE Organizers --------------------- Bian Yang, Norwegian University of Science and Technology Julien Bringer, Morpho, France workshop organizers’ email: simice@compsac.info workshop website: http://staging.computer.org/web/compsac2016/simice --------------------------------------- Invited Talks and Papers to SIMICE 2016 --------------------------------------- 1.Privacy-Preserved Data Mining in Cloud Anna Monreale, the Computer Science Department of the University of Pisa, Italy. Wendy Hui Wang, Stevens Institute of Technology, United States. 2.Introduction of Statistical Bias in the De-Identification of Large Data Sets Olivia Angiuli and Jim Waldo, Harvard University, United States. --------------------- Important Dates --------------------- Deadline for paper submission: March 18th, 2016 Notification of acceptance: March 28th, 2016 Camera-ready due: April 7th, 2016 --------------------- Goal of the Workshop --------------------- While identity management solutions are increasingly migrating to cloud, conventional identity management approaches are facing challenges in trust, security, privacy, computational efficiency, interoperability, and service reliability in the cloud environment. Security concerns are reportedly among the biggest inhibitors holding back the wider adoption of cloud computing. Secure identity management, required by emerging cloud services, is receiving increasing attention from both service providers' and end users' perspectives, in terms of protection of enterprise assets and customers’ privacy in the cloud, respectively. This workshop solicits contributions describing state-of-the-art methodology and technology innovations in the field of secure identity management in the cloud computing environment, encourages experience sharing (both positive and negative ones), and also welcomes disruptive work-in-progress ideas towards future concepts. --------------------- Theme of the Workshop --------------------- The workshop is dedicated to the security and privacy aspects of identity management (IDM) in the cloud. Two tracks namely “Concept design and enabling technologies” and “Applications and evaluations” are planned to attract both theoretical and empirical works from the IDM society and the cloud computing society. --------------------- Scope of the Workshop --------------------- Any submission whose content is relevant to the area of secure identity management in the cloud environment will be considered, but any submission whose subject matter is related to one of the following 2 tracks’ topics will be particularly welcome. Practically-oriented approaches will also be appreciated. Track 1: Concept design and enabling technologies - new concept design of IDM towards cloud - identity authentication outsourcing as a service - technologies for enhancing privacy and security of customer data and social media (biometrics, multi-factor authentication, mobile devices) - data processing and analysis in a protected domain for personal data management - service-oriented architecture for IDM in cloud Track 2: Applications and evaluations - cross-border IDM - security and privacy enhanced IDM for eCommerce, eCitizen, and eHealth in cloud - case study of security breaches of IDM in cloud - privacy and security evaluation for services in cloud ------------------------- Workshop Paper Submission ------------------------- All accepted papers will be published in the electronic proceedings by the IEEE Computer Society. A camera ready paper will be limited to 6 pages (IEEE Proceedings style) with up to 2 additional pages (with charges for additional pages) printed on 10-12 point fonts. Authors must follow IEEE CS Press Proceedings Author Guidelines to prepare papers. At least one of the authors of an accepted paper is required to pay full registration fee and present the paper at the workshop in person, in order to enable indexing through INSPEC and EI, and inclusion in the IEEE digital library. ----------------- Program Committee ----------------- - Erik-Oliver Blass (Airbus Group Innovations, Germany) - Julien Bringer (Morpho, France) - Christoph Busch (CASED, Germany) - Hervé Chabanne (Morpho and Télécom ParisTech, France) - Martin Gilje Jaatun (SINTEF, Norway) - Thomas Kemmerich (Norwegian Information Security Laboratory, Norway) - Els Kindt (KU Leuven, Belgium) - Qiong Li (Harbin Institute of Technology, China) - Shantanu Rane (PARC, USA) - Christian Rathgeb (CASED, Germany) - Chik-How Tan (National University of Singapore, Singapore) - Qiang Tang (Interdisciplinary Centre for Security, Reliability and Trust, Luxembourg) - Per Thorsheim (God Praksis AS, Norway) - Bian Yang (Norwegian Information Security Laboratory, Norway) - Xuebing Zhou (Huawei European Research Center, Germany) ****************************************************************************************************************************** |
|