OID 2015 - Open Identiy Summit 2015
Date2015-11-10 - 2015-11-11
Deadline2015-05-29
VenueBerlin, Germany
Keywords
Websitehttps://www.openidentity.eu
Topics/Call fo Papers
The aim of the Open Identity Summit 2015 is to link practical experiences and requirements with academic
innovations. Focus areas will be Research and Applications in the area of Identity Management, Trust
Services, Open Source, End-to-End Encryption and Cloud Computing.
Open standards and interfaces as well as open source technologies play a central role in the current identity
management landscape as well as in emerging future scenarios in the area of electronic identification and
trust services for electronic transactions according to the eIDAS regulation (2014/910/EC), trustworthy
end-to-end encryption and innovative applications in the area of e-health, e-government and cloud
computing for example. While there are already plenty of successful applications in which those techniques
are used to safeguard the authenticity, integrity and confidentiality, there are still many closely related areas
which demand further research.
We invite stakeholder and technical experts from public administration, industry, science and academia to
propose contributions to the program of the workshop. Submissions should be short papers (5-6 pages) or
full papers (ca. 12 pages) in English. Submitted papers will be reviewed by the program committee.
Accepted papers will be presented at the workshop and are planned to be published in the GI-Edition
Lecture Notes in Informatics (LNI).
innovations. Focus areas will be Research and Applications in the area of Identity Management, Trust
Services, Open Source, End-to-End Encryption and Cloud Computing.
Open standards and interfaces as well as open source technologies play a central role in the current identity
management landscape as well as in emerging future scenarios in the area of electronic identification and
trust services for electronic transactions according to the eIDAS regulation (2014/910/EC), trustworthy
end-to-end encryption and innovative applications in the area of e-health, e-government and cloud
computing for example. While there are already plenty of successful applications in which those techniques
are used to safeguard the authenticity, integrity and confidentiality, there are still many closely related areas
which demand further research.
We invite stakeholder and technical experts from public administration, industry, science and academia to
propose contributions to the program of the workshop. Submissions should be short papers (5-6 pages) or
full papers (ca. 12 pages) in English. Submitted papers will be reviewed by the program committee.
Accepted papers will be presented at the workshop and are planned to be published in the GI-Edition
Lecture Notes in Informatics (LNI).
Other CFPs
- 9th USENIX Workshop on Offensive Technologies
- IEEE 5th International Workshop on Security and Privacy Engineering (SPE2015)
- 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM)
- 22nd Annual ACMRS Interdisciplinary Conference in Medieval and Renaissance Studies
- Fifth IEEE ICDM Workshop on Data Mining in Networks
Last modified: 2015-03-31 23:33:24