posted by organizer: paolo_mori || 8463 views || tracked by 6 users: [display]

TELERISE 2016 : 2nd International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity


When Jun 9, 2016 - Jun 9, 2016
Where USI Lugano, Switzerland
Submission Deadline Mar 23, 2016
Notification Due Apr 29, 2016
Final Version Due May 13, 2016
Categories    security   privacy   social   cloud computing

Call For Papers



2nd International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity - TELERISE 2016
co-located with ICWE 2016
June, 9 of 2016, USI Lugano, Switzerland

Information sharing on the Web is essential for today's business and societal transactions. Nevertheless, such a sharing should not violate the security and privacy requirements either dictated by Law to protect data subjects or by internal regulations provided both at organisation and individual level. An effectual, rapid, and unfailing electronic data sharing among different parties, while protecting legitimate rights on these data, is a key issue with several shades. Among them, how to translate the high-level law obligations, business constraints, and users' requirements into system-level privacy policies, as well as engineering efficient and practical Web applications-based solutions for policy definition and enforcement. TELERISE aims at providing a forum for researchers and engineers, in academia as well as in industry, to foster an exchange of research results, experiences, and products in the area of privacy preserving, secure data management, and engineering on the Web, from a technical and legal perspective. The ultimate goal is to conceive new trends and ideas on designing, implementing, and evaluating solutions for privacy-preserving information sharing, with an eye to the cross-relations between ICT and regulatory aspects of data management and engineering.

Topics of interest are (but not limited to):
Model-based and experimental assessment of data protection
Privacy in identity management and authentication
Modeling and analysis languages for representation, visualization, specification of legal regulations
Technical, legal, and user requirements for data protection
User-friendly authoring tools to edit privacy preferences
IT infrastructures for privacy and security policies management
IT infrastructure for supporting privacy and security policies evolution
Privacy and security policies conflict analysis and resolution strategies
Electronic Data Sharing Agreements Representation: Languages and Management Infrastructure
Cross-relations between privacy-preserving technical solutions and legal regulations
Privacy aware access and usage control
Privacy and security policies enforcement mechanisms
Privacy preserving data allocation and storage
Software systems compliance with applicable laws and regulations
Heuristic for pattern identification in law text
Empirical analysis of consumer's awareness of privacy and security policies

Domains of application are (but not limited to):
Telecommunication and Networks
Cloud Computing and Web Services
Mobile devices
Video Surveillance
Smart Grid, Smart Cities and Smart Spaces
Financial & Business 
Public Administration
Social Networks

Invited Speaker

Benoit Van Asbroeck, Bird & Bird, Belgium

General Chairs

Ilaria Matteucci, IIT-CNR, Italy
Paolo Mori, IIT-CNR, Italy
Marinella Petrocchi, IIT-CNR, Italy

Program Committee

Benjamin Aziz, University of Portsmouth, UK
Gianpiero Costantino, IIT-CNR, Italy
Francesco Di Cerbo, SAP, DE
Ioanna Dionysiou, University of Nicosia, CY
Carmen Fernandez Gago, University of Malaga, ES
Sorren Hanvey, Lero - The Irish Software Research Centre, Limerick, Ireland
Kuan Hon, Queen Mary University, UK
Jens Jensen, STFC, UK
Erisa Karafili, Imperial College London, UK
Mirko Manea,  HP Italia, IT
Aaron Massey, University of Maryland, Baltimore County, US
Kevin McGillivray, Dept. of Private Law, University of Oslo, Norway
Roberto Sanz Requena, Grupo Hospitalario Quiron, ES
Andrea Saracino. IIT-CNR, Italy
Daniele Sgandurra, Imperial College London, UK
Jatinder Singh, Computer Laboratory, Univ. Cambridge, UK
Debora Stella, Bird & Bird, IT
Slim Trabelsi, SAP, DE

Important dates (all deadlines are 23h59, Hawaii time)

Submission deadline:   March 23, 2016 -- EXTENDED TO March, 30 2016
Notification of authors: April 29, 2016
Camera-ready copy due: May 13, 2016
Camera ready (post proceedings): June 24, 2016

Submission and Publication
Submitted papers must be written in English and must contain results that have not previously published nor concurrently submitted to a journal or conference with published proceedings. Any partial overlap with any published or concurrently submitted paper must be clearly indicated. Submissions are limited to 12 pages and must be formatted according to the information for Springer LNCS authors and submitted in PDF. Papers must be submitted electronically through EasyChair at .

The selection of contributions will be based on peer-review by the Programme Committee. Contacts with Springer are in progress to publish ICWE workshop papers in a ICWE 2016 satellite event post-proceedings as Lecture Notes in Computer Science (LNCS). It is required that each accepted paper be presented at the workshop by one of its authors. Authors of accepted papers are required to submit the final, camera-ready versions of their papers (in LNCS format), including an electronic version as specified in the authors' instructions.

Related Resources

FiCloud 2023   The 10th International Conference on Future Internet of Things and Cloud
ACM-Ei/Scopus-CWCBD 2023   2023 4th International Conference on Wireless Communications and Big Data (CWCBD 2023) -EI Compendex
EICC 2023   European Interdisciplinary Cybersecurity Conference (EICC 2023)
IEEE Journal of Selected Topics in Appli 2023   Security and Privacy-preserving Solutions on Remote Sensing Data of Smart Cities
IEEE CCNC STP-CPS 2023   5th International Workshop on Security Trust Privacy for Cyber-Physical Systems (STP-CPS'23) with IEEE CCNC 2023, 8-11 January, Las Vegas, NV, USA
SI on ATD&IS II 2023   Special Issue on Advanced Technologies in Data and Information Security II, Applied Sciences, MDPI
ACM-EI/Scopus-ITCC 2023   2023 3rd International Conference on Information Technology and Cloud Computing (ITCC 2023) -EI Compendex
ACIJ 2022   Advanced Computing: An International Journal
IEEE ICISPP 2023   IEEE--2023 4th International Conference on Information Security and Privacy Protection (ICISPP 2023)
BIOSIG 2023   International Conference of the Biometrics Special Interest Group