posted by user: rossnage || 5830 views || tracked by 4 users: [display]

OID 2019 : Open Identity Summit

FacebookTwitterLinkedInGoogle

Link: http://www.openidentity.eu
 
When Mar 28, 2019 - Mar 29, 2019
Where Garmisch-Partenkirchen, Germany
Submission Deadline Oct 19, 2018
Notification Due Nov 30, 2018
Final Version Due Jan 31, 2019
Categories    identity management   security   privacy   open source
 

Call For Papers

The aim of Open Identity Summit 2019 is to link practical experiences and requirements with academic innovations. Focus areas will be Research and Applications in the area of Identity Management, Trust Services, Open Source, End-to-End Encryption and Cloud Computing.

Open standards and interfaces as well as open source technologies play a central role in the current identity management landscape as well as in emerging future scenarios in the area of electronic identification and trust services for electronic transactions. At the time reliable identity management is an essential building block for many applications and services such as innovative payment services, digital manufacturing, and other innovative applications in the area of e-health, e-government, cloud computing and the internet of things.

While there are already plenty of successful applications in which those techniques are applied to safeguard the authenticity, integrity and confidentiality, there are still many closely related areas, which demand further research.

We invite stakeholder and technical experts from public administration, industry, science and academia to propose contributions to the program of the workshop. Submissions should be short papers (5-6 pages) or full papers (max. 12 pages) in English. The program committee will review submitted papers. Accepted papers will be presented at the workshop and are planned to be published in the GI-Edition Lecture Notes in Informatics (LNI).
Topics of Interest

The topics of the workshop include but are not limited to:

Identity Management and Privacy
* Security, interoperability, usability and novel use cases related to identity management, credential technologies and electronic identity means.
* Authentication protocols and federated identity management.
* Privacy by design, Privacy enhancing technologies and transparency technologies for identity.
* Security and interoperability of Strong Customer Authentication (SCA) and Access to Account (XS2A) according to PSD2 (2015/2366/EU).
* Concepts for and practical experiences with components, systems, services, processes and applications for identity management.
* Novel technologies for identity management (e.g. based on blockchain and distributed ledger technology).
* Mobile aspects of identity management and novel form factors of identity tokens.
* Identity and access management in IoT, IIoT, Industry 4.0 and digital manufacturing scenarios.
* Standards, interoperability aspects and interoperable solutions for identity management.
* International, global and long-term aspects of identity management.
* Legal and socio-economic aspects of privacy and identity management, in particular effects of the EU General Data Protection Regulation (GDPR).
* Privacy, non-traceability, auditability and evidence within identity management systems.
* Smart assistants for security, privacy and identity management.
* Access control models in the Industry 4.0 (e.g. RBAC vs. ABAC).
* Socio-technical and philosophical aspects of privacy and information security.

Trust Services and Related Applications

* Legal and international aspects related to the eIDAS regulatory framework (2014/910/EC).
* Economic aspects related to electronic identification and trust services in particular for electronic signatures, electronic seals, electronic time stamps, electronic registered delivery and website authentication.
* Standards, technologies and innovative solutions related to electronic identification and trust services in particular for electronic signatures, electronic seals, electronic time stamps, electronic registered delivery and website authentication.
* Aspects related to the certification and accreditation of trust services and related components.
* Concepts and solutions for the long-term preservation of evidence of electronic data.

Open Source

* Security, interoperability as well as legal and economic aspects of open source in the area of security and identity management.
* Concepts and practical experiences with open source components related to security, identity management and end-to-end-encryption.
* Open source tools for distributed specification, development, quality assurance and dissemination of project results.
* New open source projects and news from existing open source projects in the area of security, identity management, trust services, end-to-end encryption and cloud computing.

Important dates

Paper Submission Deadline: 19th October 2018
Notification of Acceptance: 30th November 2018
Submission of Camera Ready Copies: 31st January 2019

Submission Instructions
Article submission

Articles will be submitted using EasyChair. You will have to upload a pdf document and an abstract after registering the corresponding author.
Article format & author instructions

The article shall get formatted according to the GI LNI format. The format is very similar to Springer LNCS. Please download the templates and the author copyright form:

LaTeX templates
Word templates
Copyright form

Related Resources

OID 2024   Open Identity Summit 2024
IEEE COINS 2024   IEEE COINS 2024 - London, UK - July 29-31 - Hybrid (In-Person & Virtual)
TDI 2024   2nd International Workshop on Trends in Digital Identity
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
I3E 2024   23rd IFIP Conference e-Business, e-Services, and e-Society
CSW 2024   2024 3rd International Conference on Cyber Security
NexMat Summit 2024   NexGen Materials Engineering and Applications Summit
JoL 2024   International Journal of Law
IS3DPAM 2024   2nd International Summit on 3D Printing and Additive Manufacturing
SI on ATD&IS III 2024   Special Issue on Advanced Technologies in Data and Information Security III, Applied Sciences, MDPI