ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

SBP 2014 - Workshop on Security in Business Processes

Date2014-09-08

Deadline2014-06-01

VenueHaifa, Israel Israel

Keywords

Websitehttp://sbp14.cs.ut.ee

Topics/Call fo Papers

Despite the growing demand for business processes that comply with security policies, security and privacy incidents caused by erroneous workflow specifications are regrettably common. This is, in part, because business process management and security are seldom addressed together, thereby hindering the development of trustworthy and security-compliant business processes. The third edition of the Workshop on Security in Business Processes (SBP’14) seeks to bring together researchers and practitioners interested in the management and modelling of secure business processes in process-aware information systems.
The goal of SBP’14 is to obtain a deeper understanding of a rapidly maturing, yet still largely under-investigated field of business process security, audit and control, including both thorough security requirements formalization, secure process modelling, and mechanisms for verification, monitoring and auditing. Besides the “technical” intent to substantially advance the current state of the art, SBP’14 aims to identify active research areas in academia and industry; get a snapshot of the current approaches and existing tool-support; encourage approaches and techniques that combine formal foundations with industrial applicability; and highlight new research directions and challenges. In tackling these questions we hope to make a substantial contribution to reliable and secure business process management.
In particular, SBP’14 encourages innovative methods for workflow security modelling, security audit and control throughout the business process lifecycle: from design time verification to online operational support and post-mortem analysis. Furthermore, it welcomes contributions beyond the strictly technical, such as those considering social, economic, legal and standardisation issues.
Topics of Interest:
Alignment
Authorization
Accountability
Audit reduction
Business provenance
Case studies
Conformance/compliance checking
Continuous audit
Cost-benefit analysis
Data-centric process mining
Economics of audit
Experience reports
Formal reasoning
Fraud detection
Information flow control
Meta-models for analysis
Operational decision support
Privacy-aware process discovery
Requirements elicitation
Requirements formalization
Risk Measurement
Runtime verification and monitoring
Security modelling
Security testing
Trace clustering
Usage control
Workflow forensics
Workflow simulation
PROGRAM
... to be announced
KEYNOTES
... to be announced
SUBMISSION GUIDELINES
Submitted manuscripts must be written in English and be no longer than 12 pages. They must be formatted using the LNBIP format format and submitted as a PDF document to the EasyChair website. Submissions will be reviewed on the basis of their originality, significance, technical soundness and clarity of exposition. Each submission will be reviewed by at least three PC members. Submitted manuscripts must not substantially overlap manuscripts that have been published or submitted to another peer-reviewed conference or journal.
The workshop papers will be published by Springer as a post-workshop proceedings volume in the series Lecture Notes in Business Information Processing (LNBIP).
IMPORTANT DATES
Paper submission: June 1st, 2014
Paper notification: July 1st, 2014
Camera-ready: July 23rd, 2014
Workshop: September 8th, 2014
ORGANIZERS
Honorary PC Chair
Wil van der Aalst, Eindhoven University of Technology, the Netherlands
Program Committee Chairs
Rafael Accorsi, University of Freiburg, Germany
Raimundas Matulevičius, University of Tartu, Estonia
Jason Crampton, University of London, United Kingdom
Publicity Chairs
Giovanni Livraga, University of Milan, Italy
PROGRAM COMMITTEE
Anne Baumgrass, University of Potsdam, Germany
Achim D. Brucker, SAP Labs, Germany
Khaled Gaaloul, CRP Henri Tudor, Luxembourg
Aditya Ghose, University of Wollongong, Australia
Anat Goldat, University of Duisburg-Essen, Germany
Hejiao Huang, Shenzhen Graduate School, Harbin Institute of Technology, China
Michael Huth, Imperial College, UK
Fuyuki Ishikawa, National Institute of Infomatics Tokyo, Japan
Jan Jürjens, Technical University of Dortmund, Germany
Dimka Karastoyanova, University of Stuttgart, Germany
Guenter Karjoth, Lucerne University of Applied Sciences and Arts, Switzerland
Seok-Won Lee, Ajou University, Korea
Lin Liu, Tsinghua University, China
Heiko Ludwig, IBM Research, US
Nicolas Mayer, CRP Henri Tudor, Luxembourg
Per Håkon Meland, SINTEF ICT, Norway
Marco Montali, Free University of Bozen-Bolzano, Italy
Haralambos Mouratidis, University of Brighton, UK
Andreas Opdahl, University of Bergen, Norway
Günther Pernul, University of Regensburg, Germany
Silvio Ranise, FBK-IRST, Italy
Stefanie Rinderle-Ma, University of Vienna, Austria
David G. Rosado, University of Castilla-La Mancha, Spain
Shazia Sadiq, Queensland University, Australia
Guttorm Sindre, Norwegian University of Science and Technology, Norway
Pnina Soffer, University of Haifa, Israel
Mark Strembeck, Vienna University of Economics and Business, Austria
Arnon Sturm, Ben-Gurion University of the Negev, Israel
Matthias Weidlich, Imperial College, UK
Jan Martijn van der Werf, Eindhoven University of Technology, the Netherlands
Nicola Zannone, Eindhoven University of Technology, the Netherlands
PREVIOUS WORKSHOPS AND EVENTS
2013: SBP'13 (see the report), Dagstuhl Seminar on Verifiably Secure PaIS (see the report)
2012: SBP'12 (see the report )
2011: ABPSM'11, WfSAC'11

Last modified: 2014-01-28 23:41:59