OASIS Mailing List ArchivesView the OASIS mailing list archive below
or browse/search using MarkMail.


Help: OASIS Mailing Lists Help | MarkMail Help

xacml message

[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]

Subject: another CFP

Another conference that folks here may be interested in. The deadline is 
  June 13, so there's a little more time to pull together papers..


                            Call for Papers

                              InSPEC 2008
International Workshop on Security and Privacy in Enterprise Computing 
 in conjunction with the 12th IEEE International EDOC Conference 2008
                  Munich, Germany, 15 September 2008

Several technologies have emerged for enterprise computing. Workflows 
are now widely adopted by industry and distributed workflows have been a
topic of research for many years. Today, services are becoming the new 
building blocks of enterprise systems and service-oriented architectures
are combining them in a flexible and novel way. Business applications, 
such as Enterprise Resource Planning (ERP), Supply Chain Management 
(SCM) and Supplier Relationship Management (SRM) systems form the core 
of enterprise systems. In addition, with wide adoption of e-commerce, 
business analytics that exploits multiple, heterogeneous data sources 
have become an important field. These technological trends are 
accompanied by new business trends due to globalization that involve 
innovative forms of collaborations such as virtual organizations. 
Further, the increased speed of business requires IT systems to become 
more flexible and highly dynamic.

All of these trends bring with them new challenges to the security and 
privacy of enterprise computing. We are increasingly relying on IT 
systems for our daily business including essential utilities such as 
water and power. The traditional forms of computer security need to be 
enhanced to address the distributed nature and multiple administrative 
domains of conducting business. For example, algorithms for 
incorporating the new business practices need to be identified for 
access control. Similarly, data confidentiality cannot be provided on 
the network layer anymore, it needs to be built into applications and 
processes that span across various domains. The enhanced data sharing 
calls for innovative algorithms and protocols. Novel cryptographic 
techniques need to be developed and established ones evaluated for 
industrial adoption. In addition to the security measures, this new 
generation of distributed systems requires techniques for ensuring 
compliance with regulations on governance and privacy of data, including 
those asserted by government and regulatory agencies.

New concepts for solving these challenges require the combination of 
many disciplines from computer science and information systems, such as 
cryptography, networking, distributed systems, process modeling and 
design, access control, privacy etc.  It is the goal of this workshop 
to provide a forum for exchange of novel research in these areas among 
the experts from academia and industry. Completed work as well as 
research in progress is welcome, as we want to foster the exchange of
novel ideas and approaches. 

Topics of interest include but are not limited to:

* Security and privacy in workflow systems
  o Access control architectures
  o Modeling of security and privacy constraints
  o Automatic security augmentation
  o Secure/Trusted virtual domains
* Security and privacy in service-oriented architectures
  o Secure composition of services
  o Semantic aware security
  o Security services
  o Trustworthy computation
* Identity Management
  o Security and Privacy
  o Applications to compliance
  o Effective use in business IT systems
* Data sharing
  o Cryptographic protection during data sharing
  o Privacy-preserving distributed applications
  o Efficient multi-party computations
  o Privacy and data sharing policies
* Security and privacy in management information systems
  o Novel secure applications
  o Secure and private data analytics
  o Flexible and seamless security architectures
  o Secure operating system design
* Collaborations
  o Secure and private supply chains
  o Security and privacy in virtual organizations
  o Private social network and Web 2.0 applications
  o Security and privacy in outsourcing

Workshop Chairs

Ernesto Damiani (University of Milan, Italy)
Florian Kerschbaum (SAP Research, Germany)
Vijaykumar Rachamadugu (MITRE, USA)

Program Committee

Rafael Accorsi (University of Freiburg, Germany)
Jan Camenisch (IBM Research Zurich, Switzerland)
Marco Casassa-Mont (HP Research Labs Bristol, UK)
Octavian Catrina (International University, Germany)
David Chadwick (University of Kent, UK)
Xiuzhen Cheng (George Washington University, USA)
Wenliang Du (Syracuse University, USA)
Keith Frikken (Miami University, USA)
Fabio Massacci (University of Trento, Italy)
Jörn Müller-Quade (University of Karlsruhe, Germany)
Seth Proctor (Sun Microsystems Labs, USA)
Ahmad-Reza Sadeghi (Ruhr-Universität Bochum, Germany)
Andreas Schaad (SAP Research, Germany)
Berry Schoenmakers (TU Eindhoven, Netherlands)
Anoop Singhal (NIST, USA)
Duminda Wijesekera (George Mason University, USA)
Huafei Zhu (I2R, Singapore)

Important Dates

Paper submission deadline: 13 June 2008 
Paper acceptance notification: 18 July 2008 
Camera ready of papers: 28 July 2008

Submission Instructions

Authors are invited to submit previously unpublished, high-quality 
papers before 13 June 2008. Submitted papers must be unpublished and 
must not be currently under review for any other publication.
Submissions should be at most 8 pages long in IEEE Computer Society 
format and include the author's name, affiliation and contact details. 
They should be submitted by e-mail as PDF files by 13 June 2008, to 
Florian Kerschbaum (mailto:florian.kerschbaum@sap.com) and include 
"InSPEC2008" in the subject line. Guidelines and templates for the IEEE
format are available at the IEEE Computer Society site.

Authors will be notified of acceptance by 28 July 2008. At least one 
author of every accepted paper MUST register for the Workshop and 
present the paper. The workshop proceedings will be published on the 
conference CD-ROM and all accepted papers will appear in the IEEE 
Digital Library.

[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]