ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

IFIP IDMAN 2013 - 3rd IFIP WG 11.6 Working Conference on Policies & Research in Identity Management

Date2013-04-08

Deadline2012-10-26

VenueLondon, UK - United Kingdom UK - United Kingdom

Keywords

Websitehttps://www.idman2013.com

Topics/Call fo Papers

Call for Papers
IFIP IDMAN 2013 - 3rd IFIP WG 11.6 Working Conference on
Policies & Research in Identity Management
London, UK, 8th-9th April 2013
www.idman2013.com
Background
Building on the success of IDMAN 2007 and 2010 (which were held
in Rotterdam and Oslo, respectively), this conference focuses
on the theory, technologies and applications of identity
management. IFIP IDMAN 2013, the 3rd IFIP WG 11.6 Working
Conference on Policies & Research in Identity Management, will
take place between the 8th and 10th of April 2013 at Royal
Holloway, University of London, UK.
Conference scope
The world of the 21st century is, more than ever, global and impersonal. As
a result of increasing cyber fraud and cyber terrorism, the demand for
better technical methods of identification is growing, not only in companies
and organisations but also in the world at large. Moreover, in our society
digital identities increasingly play a role in the provision of eGovernment
and eCommerce services. For practical reasons, Identity Management Systems
are needed that are usable and interoperable.
At the same time, individuals increasingly leave trails of personal data
when using the Internet, which allows them to be profiled and which may be
stored for many years to come. Technical trends such as Cloud Computing and
pervasive computing make personal data processing non-transparent, and make
it increasingly difficult for users to control their personal spheres. As
part of this tendency, surveillance and monitoring are increasingly
present in society, both in the public and private domains. Whilst the original
intention is to contribute to security and safety, surveillance and
monitoring might, in some cases, have unintended or even contradictory
effects. Moreover, the omnipresence of surveillance and monitoring systems
might directly conflict with public and democratic liberties.
These developments raise substantial new challenges for privacy and identity
management at the technical, social, ethical, regulatory, and legal levels.
Identity management challenges the information security research community
to focus on interdisciplinary and holistic approaches, while retaining the
benefits of previous research efforts.
Topics for papers
Papers offering research contributions to the area of identity management
are solicited for submission to the 3rd IFIP WG-11.6 IDMAN conference.
Papers may present theory, applications or practical experience in the
field of identity management, from a technical, legal or
socio-economic perspective, including, but not necessarily limited to:
o Novel identity management technologies and approaches
o Interoperable identity management solutions
o Privacy-enhancing technologies
o Identity management for mobile and ubiquitous computing
o Identity management solutions for eHealth, eGovernmeant and
eCommerce
o Privacy and Identity (Management) in and for cloud computing
o Privacy and Identity in social networks
o Risk analysis techniques for privacy risk and privacy impact
assessment
o Privacy management of identity management
o Identity theft prevention
o Attribute based authentication and access control
o User-centric identity management
o Legal, socio-economic, philosophical and ethical aspects
o Impact on society and politics
o Related developments in social tracking, tracing and sorting
o Quality of identity data, processes and applications
o User centered, usable and inclusive identity management
o Attacks on identity management infrastructures
o Methods of identification and authentication
o Identification and authentication procedures
o Applications of anonymous credentials
o (Privacy-preserving) identity profiling and fraud detection
o Government PKIs
o (Possible) role of pseudonymous and anonymous identity in identity
management
o Electronic IDs: European and worldwide policies and cooperation in
the field of identity management
o Surveillance and monitoring
o (Inter)national policies on unique identifiers /social security
numbers / personalisation IDs
o Vulnerabilities in electronic identification protocols
o Federative identity management and de-perimeterisation
o Biometric verification
o (Inter)national applications of biometrics
o Impersonation, identity fraud, identity forge and identity theft
o Tracing, monitoring and forensics
o Proliferation/omnipresence of identification
o Threats to democracy and political control
Instructions for paper submission
Submitted papers must be original, unpublished, and not submitted to another
conference or journal for consideration for publication. Papers must be
written in English; they should be at most 14 pages long in total. Accepted
papers will be presented at the conference and published in the conference
proceedings by the official IFIP publisher: Springer Science and Business
Media. At least one author of each accepted paper is required to register
with the conference and present the paper. Papers must be submitted in
electronic form through the web.
Papers must be submitted using the EasyChair conference
management system at:
https://www.easychair.org/conferences/?conf=ifipid...
Please send any enquiries to:
webmaster-AT-idman2013.com
Important dates
Deadline for submissions: Friday 26 October 2012
Notifications to authors: Friday 14 December 2012
Camera-ready due: Friday 18 January 2013
Opening of conference: Monday 8 April 2013
Conference organisation
General Chair
Chris Mitchell, Royal Holloway, University of London, UK
Programme Committee Chairs
Simone Fischer-Hübner, Karlstad University, Sweden
Elisabeth de Leeuw, Netherlands
Organising Committee Chairs
Haitham Al-Sinani, Royal Holloway, University of London, UK
Marcelo Carlomagno Carlos, Royal Holloway, University of London, UK
Program Committee
Rose-Mharie Åhlfeldt, Skövde University, Sweden
Haitham Al-Sinani, Royal Holloway, University of London, UK
Claudio Ardagna, Università degli Studi di Milano, Italy
Alessandro Armando, FBK, Italy
Bharat Bhargava, Purdue University, USA
Sonja Buchegger, Royal Institute of Technology, Sweden
David Chadwick, University of Kent, UK
Sara Foresti, Università degli Studi di Milano, Italy
Lothar Fritsch, Norwegian Computing Center, Norway
Steven Furnell, University of Plymouth, UK
Stefanos Gritzalis, University of the Aegean, Greece
Marit Hansen, Independent Centre for Privacy Protection Schleswig-Holstein, Germany
Hans Hedbom, Karlstad University, Sweden
Alejandro Hevia, Universidad de Chile, Chile
Jaap-Henk Hoepman, TNO and Radboud University Nijmegen, the Netherlands
Bart Jacobs, Radboud Universiteit, Netherlands
Lech Janczewski, University of Auckland, New Zealand
Ronald Leenes, Tilburg University, Netherlands
Javier Lopez, University of Malaga, Spain
Andreas Pashalidis, Katholieke Universiteit Leuven, Belgium
Aljosa Pasic, Atos Origin, Spain
Siani Pearson, Hewlett-Packard Laboratories, UK
Guenther Pernul, Regensburg University, Germany
Kai Rannenberg, Goethe University, Frankfurt, Germany
Anne Karen Seip, Kredittilsynet, Norway
Einar Snekkenes, Gjövik University College, Norway
Rama Subramaniam, Valiant Technologies, India
Pedro Veiga, University of Lisbon, Portugal
Jozef Vyskoc, VaF, Slovakia

Last modified: 2012-07-07 13:35:10