Note: this blog is a mirror of my HP Labs Blog, on the same topic, accessible at: http://h30507.www3.hp.com/t5/Research-on-Security-and/bg-p/163

Sunday, June 20, 2010

ACM Digital Identity Management (DIM) 2010 – Submission Deadline: June, 28th

Please consider submitting to the Sixth ACM Workshop on Digital Identity Management October 8, 2010, Chicago, IL, USA. Collocated with ACM CCS 2010

http://www2.pflab.ecl.ntt.co.jp/dim2010
http://www.sigsac.org/ccs/CCS2010/

Important dates
* Paper submissions due : June 28, 2010
* Notification to the authors : August 6, 2010
* Camera ready papers due : August 16, 2010 (Firm deadline)
* DIM Workshop : October 8, 2010 (CCS Conference : October 4 – 10, 2010)

The Digital Identity Management Workshop brings together academia and industry to explore all aspects of identity management.
Identity management is an endeavor to make identities available to humans, services, and systems in a secure and privacy-protecting manner. Currently we are facing grand challenges, such as financial and ecological crises, which require global collaboration.
Best exemplified in the cloud computing and smart grid movement, ICT-enabled infrastructures are playing a crucial role in facilitating global collaboration for economic and ecological advancement.
Such infrastructures must incorporate identity management capabilities that allow individuals and organizations to identify and trust each other over networks in a scalable and reliable manner, while striking the best balance between usability, security, and privacy.
The goal of this workshop is to share new findings and ideas, discover key issues, and seek opportunities for active collaboration between industry and academia.
The workshop seeks submissions from diverse communities, such as open source projects, standardization fora, government organizations, security and privacy experts, software engineers, and corporate & academic researchers. Topics of interest include, but are not limited to:

* Identity management for cloud computing
* Identity management for critical infrastructure (e.g., smart grid)
* Identity assurance
* Identity governance
* Attribute aggregation
* Identity in service-oriented architecture (SOA)
* Anonymity and pseudonymity
* Accountability in identity management
* Identity management APIs
* Identity management in ubiquitous and mobile computing
* Reputation and incentive systems, and reputation management
* Privacy-enhanced identity management
* Identity solutions for specific areas
(e.g., healthcare, government, education, and telecommunications)
* Identity-based access control
* Identity discovery
* Identity theft prevention
* User-centric identity management
* User experience models and integrity
* Standardization of IDM and policies thereof, standards harmonization
* Case studies and lessons from large scale deployment
* Vulnerabilities, threat analysis and risk assessment of IDM solutions (e.g., threat of malware affecting identity theft)
* Analysis of differences between requirements for consumer and enterprise IDM

________________________
Submission Instructions

Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings.
Papers should be at most 10 pages, using at least 10.5-point font and reasonable margins on A4 or US letter-size paper (8.5 inch x 11 inch).
Committee members are not required to read the appendices, and so submissions should be intelligible without them. Each submission should start with the title, abstract, and names and contact information of authors. The introduction should give background and summarize the contributions of the paper at a level appropriate for a non-specialist reader. Authors of accepted papers must guarantee that their paper will be presented at the workshop.

_______________________
=== Organizing Committee ===

Co-chairs
* Thomas Groß, IBM Research, Switzerland
* Kenji Takahashi, NTT, Japan

________________________
=== Program Committee ===

* Gail-Joon Ahn, Arizona State University, USA
* Abhilasha Bhargav-Spantzel, Intel, USA
* Hu Bin, Huawei Technologies, USA
* Federica Paci, University of Trento, Italy
* Jan Camenisch, IBM Research, Switzerland
* Marco Casassa Mont, HP Labs, UK
* David Chadwick, University of Kent, UK
* Chihung Chi, Tsinghua University, China
* Hidehito Gomi, Yahoo! Japan Research, Japan
* Weili Han, Fudan University, China
* Seung-Hyun Kim, ETRI, Korea
* Brian LaMacchia, Microsoft, USA
* Hyung-Jin Lim, Financial Security Agency, Korea
* Howard Lipson, CERT, USA
* Paul Madsen, NTT, Canada
* Eve Maler, PayPal, USA
* Piotr Pacyna, AGH Univ. of Science and Technology, Poland
* Andreas Pfitzmann, Dresden Univ. of Technology, Germany
* Rakesh Radhakrishnan, Sun Microsystems, USA
* Amardeo Sarma, NEC Laboratories Europe, Germany
* Jörg Schwenk, Ruhr-University Bochum, Germany
* Diana Smetters, PARC, USA
* Anna C. Squicciarini, Pennsylvania State Univ., USA
* Tsuyoshi Takagi, Future University - Hakodate, Japan
* Peter Weik, Fraunhofer FOKUS, Germany






--- Posted by Marco Casassa Mont (here and here) ---

--- NOTE: use this mirror blog if you prefer posting on an external blog site ---

--- NOTE: my original HP blog can be found here ---

No comments: