posted by organizer: rafael_accorsi || 3700 views || tracked by 4 users: [display]

SBP 2014 : Workshop on Security in Business Processes


When Sep 8, 2014 - Sep 8, 2014
Where Haifa, Israel
Submission Deadline Jun 8, 2014
Notification Due Jul 1, 2014
Final Version Due Jul 23, 2014
Categories    business process management   information security   auditing and control   enterprise architecture

Call For Papers

SBP'14: 3nd Workshop on Security in Business Processes

in conjunction with the

12th Int'l Conference on Business Process Management

Despite the growing demand for business processes that comply with
security policies, security and privacy incidents caused by erroneous
workflow specifications are regrettably common. This is, in part,
because business process management and security are seldom addressed
together, thereby hindering the development of trustworthy and
security-compliant business processes. The third edition of the Workshop
on Security in Business Processes (SBP'14) seeks to bring together
researchers and practitioners interested in the management and modelling
of secure business processes in process-aware information systems.

The goal of SBP'14 is to obtain a deeper understanding of a rapidly
maturing, yet still largely under-investigated field of business process
security, audit and control, including both thorough security
requirements formalization, secure process modelling, and mechanisms for
verification, monitoring and auditing. In particular, SBP'14 encourages
innovative methods for workflow security modelling, security audit and
control throughout the business process lifecycle: from design time
verification to online operational support and post-mortem analysis.

*Topic of interest*
Alignment Information flow control
Authorization Log formats
Accountability Meta-models for analysis
Audit reduction Operational decision support
Business provenance Privacy-aware process discovery
Case studies Requirements elicitation
Conformance checking Requirements formalization
Compliance checking Risk analysis and measurement
Continuous audit Runtime verification/monitoring
Cost-benefit analysis Security testing
Data-aware process mining Trace clustering
Formal reasoning Usage control
Fraud detection Workflow forensics
Economics of audit Workflow simulation
Experience reports

*Submission instructions*
Submitted manuscripts must be written in English and be no longer than
12 pages. They must be formatted using the LNBIP format and submitted as
a PDF document to the EasyChair website: (
conferences/?conf=sbp14). Submissions will be reviewed on the basis of
their originality, significance, technical soundness and clarity of
exposition. Each submission will be reviewed by at least three PC
members. Submitted manuscripts should not substantially overlap
manuscripts that have been published or that are simultaneously
submitted to a conference with proceedings or a journal.

*Important dates*
Paper submission: June 8, 2014
Paper notification: July 2, 2014
Camera-ready version: July 23, 2014
Workshop: September 8, 2014

PC Chairs
Rafael Accorsi (Freiburg U, DE)
Raimundas Matulevicius (Tartu U, EE)
Jason Crampton (Royal Holloway U, UK)

Honorary PC Chair
Wil van der Aalst (TU/E, NL)

Publicity Chair
Giovanni Livraga (Milan U, IT)

*Program committee*
Anne Baumgrass (HPI, DE)
Achim Brucker (SAP AG, DE)
Khaled Gaaloul (CRP Henri Tudor, LU)
Aditya Ghose (Wollongong U, AU)
Anat Goldat (Duisburg-Essen U, DE)
Hejiao Huang (Shenzhen Graduate School, CN)
Michael Huth (Imperial College, UK)
Fuyuki Ishikawa (NII Tokyo, JP)
Jan Jürjens (Dortmund TU, DE)
Dimka Karastoyanova (Stuttgart U, DE)
Günter Karjoth (Lucerne UT, CH)
Seok-Won Lee (Ajou U, KR)
Lin Liu (Tsinghua U, CN)
Heiko Ludwig (IBM Almaden, USA)
Nicolas Mayer (CRP Henri Tudor, LU)
Per H. Meland (SINTEF, NO)
Marko Montali (Bozen-Bolzano FU, IT)
Haralambos Mouratidis (East London U, UK)
Andreas Opdahl (Bergen U, NO)
Günther Pernul (Regensburg U, DE)
Silvio Ranise (FBK, IT)
Stefanie Rinderle-Ma (Vienna U, AT)
David G. Rosado (Castilla-La Mancha U, ES)
Shazia Sadiq (Queensland U, AU)
Guttorm Sindre (Norwegian Science and Technology U., NO)
Pnina Soffer (Haifa U, IS)
Mark Strembeck (Vienna WU, AT)
Arnon Sturm (Haifa U, IS)
Matthias Weidlich (Imperial College, UK)
Jan M. van der Werf (TU/E, NL)
Nicola Zannone (TU/E, NL)

Related Resources

NISecurity 2022   2022 International Conference on Network and Information Security (NISecurity 2022)
CSW 2022   2022 International Workshop on Cyber Security (CSW 2022)
CyberHunt 2022   IEEE BigData Workshop on Cyber Threat Intelligence and Hunting
IEEE CCNC STP-CPS 2023   5th International Workshop on Security Trust Privacy for Cyber-Physical Systems (STP-CPS'23) with IEEE CCNC 2023, 8-11 January, Las Vegas, NV, USA
IJITMC 2022   The International Journal of Information Technology, Modeling and Computing
SI on ATD&IS II 2023   Special Issue on Advanced Technologies in Data and Information Security II, Applied Sciences, MDPI
ACM-ISIR 2022   2022 3rd International Conference on Information Security and Information Retrieval (ISIR 2022)
EvoCompAISecurity&Privacy 2022   Evolutionary Computing for AI-Driven Security and Privacy: Advancing the state-of-the-art applications
EPEAI 2023   AI in Business and Economics - The Economic Perspective on Artificial Intelligence
DRIJ 2022   Dental Research: An International Journal