posted by user: BudiArief || 6216 views || tracked by 5 users: [display]

ACMDIM 2013 : ACM Digital Identity Management Workshop 2013

FacebookTwitterLinkedInGoogle

Link: http://cccs.ncl.ac.uk/dim2013/
 
When Nov 8, 2013 - Nov 8, 2013
Where Berlin, Germany
Submission Deadline Jul 29, 2013
Notification Due Aug 15, 2013
Final Version Due Aug 30, 2013
Categories    security   privacy   identity   identity management
 

Call For Papers

Call for Papers
===============

“Identity at the Crossroads”

This workshop will explore crucial issues concerning interoperable identity management technologies for the information society.

Identity management has seen a series of development in the recent years. Whereas identity management and federation standards have been solidified and adopted in practice, nations world-wide are investing in electronic identity systems as strong root identities for their citizens offering a promise for strong authentication. Privacy-enhancing identity systems have reached some technical maturity and may offer user authentication with minimal disclosure. At the same time, personal identifiable information and the user’s identity has become a commodity to drive the business of global corporations. Whereas such companies sought to bind the users’ accounts to their unique identity, there has been a reported unrest and anxiety of users because of their diminishing privacy protection.

We see identity at the crossroads. One possibility is the unique identification and strong authentication road that may offer increased trust for e-commerce and increasing cloud services. Another is the road of attribute exchange and leveraging the user’s personal identifiable information that may benefit business and help users to have a consistent experience among many mobile compute platforms. Finally, there is the privacy-enhancing identity systems road that may offer additional protection for the user’s civil rights. Partially these different roads seem to contradict each other. Research can offer roads less taken that overcome these seeming contradictions and come up with next generation identity solutions.

The workshop seeks submissions from diverse communities, such as social networking, open source projects, standardization fora, governments, system & security administrators, software engineers, and corporate & academic researchers. Topics of interest include, but are not limited to:

Novel approaches to identity management
Privacy-enhancing technologies
Identity management for mobile and ubiquitous computing
Identity in cloud computing
Identity in social networks
Identity solutions for specific areas (e.g., healthcare, government, and education)
Identity theft prevention in face of malware and phishing
Applied cryptography for Identity Management
(Privacy-preserving) identity profiling and fraud detection
Identity discovery, life cycle and governance
Identity user experience
Attribute based authentication and access control
User-centric identity management
Ad-hoc, de-centralized and reputation-based identity
Biometric Identity
Experience reports on identity management practices

The goal of this workshop is to share the latest findings, identify key challenges, inspire debates, and foster collaboration between industries and academia towards interoperable identity service infrastructures.


Paper Submission Process
========================
Submissions must be made by the deadline of Thursday, July 25, 2013 23:59 (UTC-11), through EasyChair (https://www.easychair.org/conferences/?conf=acmdim2013). Authors will be notified of reviews on August 15, 2013.

Submitted papers must not substantially overlap with other papers that have been published or that are simultaneously submitted to a journal, conference or workshop. Simultaneous submission of the same work is not allowed. Authors of accepted papers must guarantee that their papers will be presented at the workshop.

Accepted papers will be published by ACM Press in the workshop proceedings.


Paper Format
============
Submissions must be at most 10 pages in double-column ACM format (http://www.acm.org/sigs/publications/sig-alternate.pdf) excluding the bibliography and well-marked appendices, and at most 12 pages overall. Submissions must be anonymized and avoid obvious self-references. Only PDF files will be accepted. Submissions not meeting these guidelines risk rejection without consideration of their merits.


Important Dates
===============
Submission: July 29, 2013 23:59 UTC-11
Notification: August 15, 2013
Camera-ready: August 30, 2013 (firm)
Workshop: November 8, 2013


Programme Chairs
================
Thomas Groß, Newcastle University, United Kingdom
Marit Hansen, ULD, Germany


Publication Chair
=================
Budi Arief, Newcastle University, United Kingdom


Steering Committee
==================
Elisa Bertino, Purdue University, USA
Abhilasha Bhargav-Spanzel, Intel, USA
Thomas Groß, Newcastle University, UK
Kenji Takahashi, NTT Innovation Institute Inc., USA


Programme Committee
===================
Gail-Joon Ahn, Arizona State University, USA
Elisa Bertino, Purdue University, USA
Abhilasha Bhargav-Spantzel, Intel, USA
Sonja Buchegger, KTH, Stockholm, Sweden
Marco Casassa Mont, HP Labs, UK
David Chadwick, University of Kent, UK
Melissa Chase, Microsoft Research, US
Chihung Chi, Tsinghua University, China
Simone Fischer-Hübner, Karlstad University, Sweden
Lothar Fritsch, Norwegian Computing Center, Norway
Hidehito Gomi, Yahoo! Japan Research, Japan
Thomas Groß, Newcastle University, UK
Weili Han, Fudan University, China
Marit Hansen, ULD, Germany
Jaap-Henk Hoepman, Radboud University Nijmegen, Netherlands
Seung-Hyun Kim, ETRI, Korea
Howard Lipson, CERT, USA
Maciej Machulak, Cloud Identity/Newcastle University, UK
Eve Maler, Forrester Research, USA
Siani Pearson, Hewlett-Packard Laboratories, UK
Kai Rannenberg, Goethe University, Frankfurt, Germany
Jörg Schwenk, Ruhr-University Bochum, Germany
Kent Seamons, Brigham Young University, USA
Jon A. Solworth, University of Illinois at Chicago, USA
Sandra Steinbrecher, SAP Research, Germany
Kenji Takahashi, NTT Innovation Institute Inc., USA
Jozef Vyskoč, VaF, Slovakia
Peter Weik, T-Systems, Germany

Related Resources

UCC 2024   The IEEE/ACM International Conference on Utility and Cloud Computing
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
MEDES 2024   The 16th International Conference on Management of Digital EcoSystems
CSW 2024   2024 3rd International Conference on Cyber Security
ACM ICIT 2024   ACM--2024 The 12th International Conference on Information Technology: IoT and Smart City (ICIT 2024)
JoL 2024   International Journal of Law
ACM ICISE 2024   ACM--2024 9th International Conference on Information Systems Engineering (ICISE 2024)
SI on ATD&IS III 2024   Special Issue on Advanced Technologies in Data and Information Security III, Applied Sciences, MDPI
ICCIP 2024   ACM--2024 10th International Conference on Communication and Information Processing (ICCIP 2024)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust