posted by system || 6688 views || tracked by 12 users: [display]

SPRINGL 2010 : 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS


When Nov 2, 2010 - Nov 2, 2010
Where San Jose, CA, USA
Submission Deadline Aug 1, 2010
Notification Due Sep 1, 2010
Final Version Due Sep 7, 2010
Categories    GIS   security   privacy   LBS

Call For Papers

3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS,2010

Co-located with 18th ACM SIGSPATIAL International Conference on
Advances in Geographic Information Systems (ACM SIGSPATIAL GIS 2010)

November 2, 2010, San Jose, CA, USA



Our society is witnessing a dramatic increase in geospatial data infrastructures,
data products, and services, many of them playing a key role in decision making in
organizations. There are currently major national and international efforts in the
coordinated development, use, sharing, and dissemination of geospatial data in several
application contexts including homeland security, environmental crises, and natural and
industrial disasters. Geospatial infrastructures are being leveraged by companies to
provide a large variety of location-based services (LBS) able to tailor services to users.
However, despite the increase of publicly accessible geospatial information only little
attention is being paid on how to secure geospatial information systems (GIS) and LBS.
Privacy is also of increasing concern given the sensitivity of personally-identifiable
location information. This is despite major advancements that have been made in secure
computing infrastructures and the secure and privacy-preserving management of traditional
(relational) data in particular. Given these pressing needs for securing GIS and LBS as well
as assuring privacy, it is compelling to investigate security and privacy aspects as they
relate to the management of geospatial data and the development of both emerging LBS and
mission-critical geographic applications.

SPRINGL 2010 is the third workshop in the SPRINGL workshop series that aims
at bringing together researchers working on the foundations of the field and on
novel applications bridging spatio-temporal data management and security and privacy.


We encourage both researchers and practitioners to participate and
submit papers on topics including, but not limited to the following:

Access control for spatio-temporal databases
Access control for moving object databases
Administration of security and privacy policies
Anonymization techniques for LBS
Application of encryption techniques to LBS
Convergence of physical and logical security
Context-aware access control
Context-aware digital identity management
Context-aware location privacy
Digital rights management for geospatial data
High assurance integrity for geospatial data
Information hiding in geospatial data
Interdiciplinary approaches to location privacy and location-based security
Location and movement-aware security
Mobile identities
Obfuscation of sensitive geospatial information
Privacy ontology
Privacy-preserving analysis of spatio-temporal data
Security and privacy policies for geo-social networks
Secure localization
Secure outsourcing of geospatial data
Security and privacy for RFID systems
Security and privacy for streaming data
Security for spatial data infrastructures (SDI)
Service-based access control to geospatial data
Usability of security and privacy services for LBS
Usage control for LBS and mobile users


Paper submissions due: August 1, 2010
Notification to the authors: September 1, 2010
Camera ready papers due: September 7, 2010
ACM GIS 2010 Conference: November 2-5, 2010
SPRINGL'10 Workshop: November 2, 2010


General Chair:
Elisa Bertino, Purdue University, USA

Program Co-chairs:
Maria Luisa Damiani, University of Milan, Italy
Y?cel Saygin, Sabanci University, Istanbul, Turkey

Web Site Chair:
Mehmet Emrah Durulan, Sabanci University, Istanbul, Turkey


Walid Aref, Purdue University, USA
Patrick Capolsini, Universit? de la Polyn?sie Fran?aise
Reynold Cheng, University of Hong Kong, Hong Kong
Isabel Cruz, University of Illinois at Chicago, USA
Josep Domingo-Ferrer, Universitat Rovira i Virgili, Catalonia, Spain
Matt Duckham, University of Melbourne, Australia
Paul El Khoury, SAP Research, France
Bert-Jaap Koops, University of Tilburg, Netherlands
Michael Gertz, University of Heidelberg, Germany
Gabriel Ghinita, Purdue University, USA
James Joshi, University of Pittsburgh, USA
Fosca Giannotti, ISTI-CNR, Italy
Man Lung Yiu, Hong Kong Polytechnic University, Honk kong
Ling Liu, Georgia Institute of Technology, USA
Jorge Lobo, IBM, USA
Herv? Martin, University of Grenoble, France
Mohamed Mokbel, University of Minnesota, USA
Tiancheng Li, Purdue University, USA
Indrakshi Ray, Colorado State University, USA
Yannis Theodoridis, University of Piraeus, Greece
Vicen? Torra, IIIA-CSIC, Catalonia, Spain
Erik Wilde, UC Berkeley, USA
Jianliang Xu, Hong Kong Baptist University, Honk Kong
Yu Zheng, Microsoft Research Asia, R.P. China


Submitted papers must not substantially overlap with papers that have been published
or that are simultaneously submitted to a journal or a conference with proceedings.
Submitted papers can be of two types:
- Regular Research Papers: these papers should report original research results or
significant case studies. They should be at most 8 pages.
- Position Papers: these papers should report novel research directions or identify
challenging problems. They should be at most 5 pages.

Manuscripts (regular paper and position paper) should be submitted in PDF format and
formatted using the ACM camera-ready templates available at:
The type of the paper (i.e, regular or position paper) must be specified.
Papers must be electronically submitted at the following address:

Authors of accepted papers must guarantee that their paper will be presented at
the workshop. A special issue including the best regular papers will be organized
for publication in the Transactions on Data Privacy (

Related Resources

doors 2023   3rd Edge Computing Workshop
NordSec 2022   The 27th Nordic Conference on Secure IT Systems
EvoCompAISecurity&Privacy 2022   Evolutionary Computing for AI-Driven Security and Privacy: Advancing the state-of-the-art applications
SPIoT 2022   The 11th International Symposium on Security and Privacy on the Internet of Things
EICC 2023   European Interdisciplinary Cybersecurity Conference (EICC 2023)
ACNS 2023   21st International Conference on Applied Cryptography and Network Security
IEEE Journal of Selected Topics in Appli 2023   Security and Privacy-preserving Solutions on Remote Sensing Data of Smart Cities
SPACE 2022   12th International Conference on Security, Privacy and Applied Cryptographic Engineering (SPACE 2022)
ACM ICHMI 2023   ACM--2023 3rd International Conference on Human–Machine Interaction (ICHMI 2023)
ICHMI 2023   ACM--2023 3rd International Conference on Human–Machine Interaction (ICHMI 2023)