posted by user: paolo_mori || 6537 views || tracked by 6 users: [display]

TELERISE 2015 : 1st International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity

FacebookTwitterLinkedInGoogle

Link: http://www.iit.cnr.it/telerise2015/
 
When May 18, 2015 - May 18, 2015
Where Florence - Italy
Submission Deadline Jan 30, 2015
Notification Due Feb 18, 2015
Final Version Due Feb 27, 2015
Categories    security   information security   computer security   law
 

Call For Papers

Information sharing is essential for today's business and societal transactions. Nevertheless, such a sharing should not violate the security and privacy requirements dictated by Law, by internal regulations of organisations, and by data subjects. An effectual, rapid, and unfailing electronic data sharing among different parties, while protecting legitimate rights on these data, is a key issue with several shades. Among them, how to translate the high-level law obligations, business constraints, and users' requirements into system-level privacy policies, providing efficient and practical solutions for policy definition and enforcement.
TELERISE aims at providing a forum for researchers and engineers, in academia and industry, to foster an exchange of research results, experiences, and products in the area of privacy preserving and secure data management, from a technical and legal perspective. The ultimate goal is to conceive new trends and ideas on designing, implementing, and evaluating solutions for privacy-preserving information sharing, with an eye to cross-relations between ICT and regulatory aspects of data management.

Topics of interest are (but not limited to):

Model-based and experimental assessment of data protection
Privacy in identity management and authentication
Modelling and analysis languages for representation, visualization, specification of legal regulations
Technical, legal and user requirements for data protection
User-friendly authoring tools to edit privacy preferences
IT infrastructures for privacy and security policies management
IT infrastructure for supporting privacy and security policies evolution
Privacy and security policies conflict analysis and resolution strategies
Electronic Data Sharing Agreements Representation: Languages and Management Infrastructure
Cross-relations between privacy-preserving technical solutions and legal regulations
Privacy aware access and usage control
Privacy and security policies enforcement mechanisms
Privacy preserving data allocation and storage
Software systems compliance with applicable laws and regulations
Heuristic for pattern identification in law text
Empirical analysis of consumer's awareness of privacy and security policies



Domains of application are (but not limited to):

Healthcare
Telecommunication and Networks
Cloud Computing and Web Services
Mobile devices
Video Surveillance
Smart Grid, Smart Cities and Smart Spaces
Financial & Business organization
Public Administration
Social Networks


=================
General Chair
=================

Ilaria Matteucci, IIT-CNR, Italy
Paolo Mori, IIT-CNR, Italy
Marinella Petrocchi, IIT-CNR, Italy


==================
Program Committee
==================

Annie Anton, Georgia Institute of Technology, US
Benjamin Aziz, University of Portsmouth, UK
Francesco Di Cerbo, SAP, DE
Ioanna Dionysiou, University of Nicosia, CY
Marina Egea Gonzalez, ATOS, ES
Samson Yoseph Esayas, Dept. of Private Law, University of Oslo, Norway
Carmen Fernandez Gago, University of Malaga, ES
Jens Jensen, STFC, UK
Emil Lupu, Imperial College London, UK
Alejandro Manas Garcia, Grupo Hospitalario Quiron, ES
Mirko Manea, HP Italia, IT
Aaron Massey, Georgia Institute of Technology, US
Kevin McGillivray, Dept. of Private Law, University of Oslo, Norway
Jose Luis Cabrera, Grupo Hospitalario Quiron, ES
Bashar Nuseibeh, The Open University, UK
Bart Preneel, KU Leuven, BE
Roberto Sanz Requena, Grupo Hospitalario Quiron, ES
Daniele Sgandurra, Imperial College London, UK
Jatinder Singh, Computer Laboratory, Univ. Cambridge, UK
Debora Stella, Bird & Bird, IT
Peter Swire, Georgia Institute of Technology, US
Slim Trabelsi, SAP, DE
Roel Wieringa, University of Twente, NL

Related Resources

ESPR-IoTBD 2020   Applied Sciences (Q2), Enterprise Security, Privacy and Risk for Internet of Things and Big Data (ESPR-IoTBD)
AVC 2020   Advances in Vision Computing: An International Journal
RDAAPS 2021   Reconciling Data Analytics, Automation, Privacy, and Security: A Big Data Challenge
IJCIS 2020   International Journal on Cryptography and Information Security
JISA-CYBER-SEC 2020   Special Issue on Trends in Cybersecurity, Journal of Information Security and Applications, Elsevier
ICISPP--IEEE, Ei, Scopus 2020   IEEE--2020 International Conference on Information Security and Privacy Protection (ICISPP 2020)--Ei Compendex, Scopus
IWCSP 2021   2021 International Workshop on Cryptography, Security and Privacy (IWCSP 2021)
TrustCom 2020   The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
KEOD 2020   12th International Conference on Knowledge Engineering and Ontology Development
LegalAI 2020   The Fourth Annual Workshop on Applications of Artificial Intelligence in the Legal Industry