posted by user: rma || 3117 views || tracked by 5 users: [display]

SCBP 2015 : Workshop on Security and Compliance in Business Processes

FacebookTwitterLinkedInGoogle

Link: http://scbp15.cs.ut.ee
 
When Aug 26, 2015 - Aug 26, 2015
Where Tartu, Estonia
Submission Deadline Jun 4, 2015
Notification Due Jun 29, 2015
Final Version Due Jul 20, 2015
Categories    business process security   business process compliance   security engineering   information systems
 

Call For Papers

CALL FOR PAPERS:
——————————

Extended deadline --- June 4, 2015


WORKSHOP ON SECURITY AND COMPLIANCE IN BUSINESS PROCESSES
Co-located with the 14th Int’l Conf. on Perspectives in Business Informatics Research, Tartu, Estonia (BIR 2015)

URL: http://scbp15.cs.ut.ee


IMPORTANT DATES:
——————————
Submission deadline: June 4, 2015
Notification: June 29, 2015
Camera Ready: July 20, 2015
Workshop Date: August 26, 2015

GOAL:
———
Despite the growing demand for business processes that comply with security policies, security and privacy incidents caused by erroneous workflow specifications are regrettably common. This is, in part, because business process management and security are seldom addressed together, thereby hindering the development of trustworthy and security-compliant business processes. The Workshop on Security and Compliance in Business Processes (SCBP’15) seeks to bring together researchers and practitioners interested in the management and modelling of secure and compliant business processes in process-aware information systems. In particular, SCBP’15 encourages innovative methods for workflow security modelling, security compliance, audit and control throughout the business process lifecycle: from design time verification to online operational support and post-mortem analysis. Furthermore, it welcomes contributions beyond the strictly technical, such as those considering social, economic, legal and standardisation issues. 

The goal of SCBP’15 is to obtain a deeper understanding of a rapidly maturing, yet still largely under-investigated field of business process security, audit and control, including both thorough security requirements formalisation, secure process modelling, and mechanisms for verification, monitoring and auditing. Besides the “technical” intent to substantially advance the current state of the art, SCBP’15 aims to locate active research areas in academia and industry; get a snapshot of the current approaches and existing tool-support; encourage approaches and techniques that combine formal foundations with industrial applicability; and identify new research directions and challenges. In tackling these questions we hope to make a substantial contribution to reliable and secure business process management.

TOPIC OF INTERESTS:
———————————
Alignment
Authorization
Accountability
Audit reduction
Business provenance
Case studies
Conformance/compliance checking
Continuous audit
Cost-benefit analysis
Data-centric process mining
Economics of audit
Experience reports
Formal reasoning
Fraud detection
Information flow control
Meta-models for analysis
Operational decision support
Privacy-aware process discovery
Requirements elicitation
Requirements formalisation
Risk Measurement
Runtime verification and monitoring
Security modelling
Security testing
Trace clustering
Usage control
Workflow forensics
Workflow simulation

SUBMISSION:
———————————
Submitted manuscripts must be written in English and papers can be submitted in two categories: 
1. full papers (no longer than 12 pages), and
2. research in progress & experience report (no longer than 6 pages). 

They must be formatted using the Springer LNBIP format format and submitted as a PDF document to the https://easychair.org/conferences/?conf=scbp15. Submissions will be reviewed on the basis of their originality, significance, technical soundness and clarity of exposition. Each submission will be reviewed by at least three PC members. Submitted manuscripts must not substantially overlap manuscripts that have been published or submitted to another peer-reviewed conference or journal.

Accepted workshop papers will be published in the CEUR proceedings. Authors of the best papers will be invited to submit the extended papers to a special issue of the journal on Complex Systems Informatics and Modeling Quarterly (CSIMQ).


PROGRAM COMMITTEE:
————————————
Achim D. Brucker, SAP Labs, Germany
Isabelle Comyn-Wattiau, ESSEC Business School, France
Eduardo Fernández, Florida Atlantic University, US
Khaled Gaaloul, CRP Henri Tudor, Luxembourg
Anat Goldstein, Ben-Gurion University of the Negev, Israel
Jan Jürjens, Technical University of Dortmund, Germany
Seok-Won Lee, Ajou University, Korea
Lin Liu, Tsinghua University, China
Per Håkon Meland, SINTEF ICT, Norway
Haralambos Mouratidis, University of Brighton, UK
Andreas Opdahl, University of Bergen, Norway
Günther Pernul, Universität Regensburg, Germany
Stefanie Rinderle-Ma, University of Vienna, Austria
David G. Rosado, University of Castilla-La Mancha, Spain
Guttorm Sindre, Norwegian University of Science and Technology, Norway
Nicola Zannone, Eindhoven University of Technology, the Netherlands

PROGRAM CO-CHAIRS
————————————
Naved Ahmed, University of Tartu, Estonia
Raimundas Matulevicius, University of Tartu, Estonia


URL: http://scbp15.cs.ut.ee

Related Resources

PSBP 2020   Special track on Privacy and Security in Business Processes along with The Tenth International Conference on Business Intelligence and Technology
IEEE-CTISC 2020   2020 2nd International Conference on Advances in Computer Technology, Information Science and Communications (CTISC 2020)
DKU 2020   13th Crisis Management Days
AIP Journal - Scopus 2019   Journal of Social and Business Informatics - Acta Informatica Pragensia
CAiSE 2020   32nd International Conference on Advanced Information Systems Engineering
SP 2020   IEEE Symposium on Security and Privacy
CNIOT 2020   2020 International Conference on Computing, Networks and Internet of Things (CNIOT 2020)
IEEE COINS 2020   Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Security | Embedded Systems | Circuit and Systems | WSN | 5G
ICDIS 2020   The 3rd International Conference on Data Intelligence and Security
ACM--ICISS--Ei Compendex and Scopus 2020   ACM--2020 3rd International Conference on Information Science and System (ICISS 2020)--Ei Compendex, Scopus