ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

TELERISE 2015 - 1st International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity

Date2015-05-18

Deadline2015-01-23

VenueFlorence, Italy Italy

Keywords

Websitehttps://www.iit.cnr.it/telerise2015

Topics/Call fo Papers

Information sharing is essential for today's business and societal transactions. Nevertheless, such a sharing should not violate the security and privacy requirements dictated by Law, by internal regulations of organisations, and by data subjects. An effectual, rapid, and unfailing electronic data sharing among different parties, while protecting legitimate rights on these data, is a key issue with several shades. Among them, how to translate the high-level law obligations, business constraints, and users' requirements into system-level privacy policies, providing efficient and practical solutions for policy definition and enforcement. TELERISE aims at providing a forum for researchers and engineers, in academia and industry, to foster an exchange of research results, experiences, and products in the area of privacy preserving and secure data management, from a technical and legal perspective. The ultimate goal is to conceive new trends and ideas on designing, implementing, and evaluating solutions for privacy-preserving information sharing, with an eye to cross-relations between ICT and regulatory aspects of data management.
The list of topics includes (but it is not limited to):
Model-based and experimental assessment of data protection
Privacy in identity management and authentication
Modeling and analysis languages for representation, visualization, specification of legal regulations
Technical, legal, and user requirements for data protection
User-friendly authoring tools to edit privacy preferences
IT infrastructures for privacy and security policies management
IT infrastructure for supporting privacy and security policies evolution
Privacy and security policies conflict analysis and resolution strategies
Electronic Data Sharing Agreements representation: languages and management infrastructure
Cross-relations between privacy-preserving technical solutions and legal regulations
Privacy aware access and usage control
Privacy and security policies enforcement mechanisms
Privacy preserving data allocation and storage
Software systems compliance with applicable laws and regulations
Heuristic for pattern identification in law text
Empirical analysis of consumer's awareness of privacy and security policies
Welcome domains of application are (but may not limited to):
Healthcare
Telecommunication and Networks
Cloud Computing and Web Services
Mobile Devices
Video Suirvellance
Smart Grid, Smart Cities, and Smart Spaces
Public Administration
Finance & Business
Social Networks

Last modified: 2014-12-07 22:21:12