“To support emerging online activities within the digital information infrastructure, such as commerce, healthcare, entertainment and scientific collaboration, it is increasingly important to verify and protect the digital identity of the individuals involved. Identity management (IdM) systems have improved the management of identity information and user convenience; however they do not provide specific solutions to address protection of identity from threats such as identity theft and privacy violation. Moreover, current IdM systems do not consider various types of identity information which are increasingly becoming an integral part of an individual's identity; such as biometric, history information, user device ensembles and so on. Such types of identity data also need to be used with other digital identifiers and protected against misuse.”
This workshop aims at discussing solutions for the protection of digital identity. Researchers and practitioners are encouraged to participate and submit papers on topics including, but not limited to the following:
- Identity threat analysis
- Identity theft by malware
- Protection from social engineering attacks
- Identity security and assurance protocols
- Key management techniques
- Security algorithms for identity protection
- Surveillance technologies
- Location based identity management
- Mobile identity management
- Identity encryption technologies
- Identity management in grid systems
- History based identity reputation system
- Biometric technologies
- Application of trusted computing to identity protections
- Secure identity management for healthcare and finance
--- NOTE: my original HP blog can be found here ---
No comments:
Post a Comment