Note: this blog is a mirror of my HP Labs Blog, on the same topic, accessible at: http://h30507.www3.hp.com/t5/Research-on-Security-and/bg-p/163

Friday, March 7, 2008

Announcing the “Digital Identity Protection 2008” Workshop

The Call-for-Paper of the “Digital Identity Protection 2008 Workshop” is now available online. This workshop is organised in the context of the “International Conference on Security and Management” (SAM 08) at WorldCom 08 (the 2008 World Congress in Computer Science, Computer Engineering and Applied Computing):

“To support emerging online activities within the digital information infrastructure, such as commerce, healthcare, entertainment and scientific collaboration, it is increasingly important to verify and protect the digital identity of the individuals involved. Identity management (IdM) systems have improved the management of identity information and user convenience; however they do not provide specific solutions to address protection of identity from threats such as identity theft and privacy violation. Moreover, current IdM systems do not consider various types of identity information which are increasingly becoming an integral part of an individual's identity; such as biometric, history information, user device ensembles and so on. Such types of identity data also need to be used with other digital identifiers and protected against misuse.”

This workshop aims at discussing solutions for the protection of digital identity. Researchers and practitioners are encouraged to participate and submit papers on topics including, but not limited to the following:
  • Identity threat analysis
  • Identity theft by malware
  • Protection from social engineering attacks
  • Identity security and assurance protocols
  • Key management techniques
  • Security algorithms for identity protection
  • Surveillance technologies
  • Location based identity management
  • Mobile identity management
  • Identity encryption technologies
  • Identity management in grid systems
  • History based identity reputation system
  • Biometric technologies
  • Application of trusted computing to identity protections
  • Secure identity management for healthcare and finance

--- NOTE: my original HP blog can be found here ---

No comments: