(Sorry if you have received this already)

Please note that experience reports and case studies are welcome as
well as technical papers. We look forward to submissions from this
community!

Kenji
-- 
The Fifth ACM Workshop on Digital Identity Management
(http://www2.pflab.ecl.ntt.co.jp/dim2009)
Call for Papers
November 13, 2009, Collocated with ACM CCS2009, Chicago, IL, USA

“Identity in a Changing World”

This workshop will explore critical issues concerning identity
management technologies for the information society. Identity
management is an endeavor for maintaining the integrity of identities
through their life cycle. It aims at making the identities available
to services in a secure and privacy protected manner. Digital
identities play an increasingly important role as the society depends
more and more on services provided over Internet. For example, solid
identity management practices are essential for implementing social
welfare (e.g., healthcare and e-government), enabling secure service
offering (e.g., cloud computing and Software as a Service),
personalizing users' experiences (e.g., e-commerce and entertainment),
and connecting people over networks (e.g., social networking and
mobile communications).
Digital identity management must strike the best balance between
usability, security, and privacy. A number of identity solutions are
being proposed, each taking different approaches with different goals.
Existing solutions are not necessarily interoperable or complementary,
and sometimes overlap. Thus it is critical to lay foundations for a
holistic understanding of problem areas and synergetic approaches to
innovative solutions, such as guidelines, methodologies, and tools.
The workshop seeks submissions from diverse communities, such as
social networking, open source projects, standardization fora,
governments, system & security administrators, software engineers, and
corporate & academic researchers. Topics of interest include, but are
not limited to:

- Identity life cycle
- Networking social networks
- Identity data portability
- Identity assurance compatibility
- Identity in cloud computing
- Identity management for software-as-a-service (SaaS)
- Identity Governance
- Identity management for mobile and ubiquitous computing
- Novel approach to identity management interoperability
- Privacy enhancement
- Identity solutions for specific areas (e.g., health care,
government, and education)
- Trust negotiation
- Comparative analysis of RESTful vs SOAP approaches
- Reputation management
- Attribute aggregation
- Identity discovery
- Identity theft prevention
- Mash-up security
- Identity metasystem
- User experience integrity
- Gap analysis of different identity management technologies
- Standards harmonization
- Experience reports on identity management practices
- Case studies and lessons from large scale deployment
- Vulnerabilities, threat analysis and risk assessment of IDM solutions
- Identity Analytics: analysis, modeling and simulation applied to IDM
- IDM for critical infrastructure

The goal of this workshop is to share the latest findings, identify
key challenges, inspire debates, and foster collaboration between
industries and academia towards interoperable identity service
infrastructures.

Submission Instructions:
Submitted papers must not substantially overlap with papers that have
been published or that are simultaneously submitted to a journal or a
conference with proceedings. Papers should be at most 10 pages, using
at least 10.5-point font and reasonable margins on A4 or US
letter-size paper (8.5 inch x 11 inch). Committee members are not
required to read the appendices, and so submissions should be
intelligible without them. Each submission should start with the
title, abstract, and names and contact information of authors. The
introduction should give background and summarize the contributions of
the paper at a level appropriate for a non-specialist reader. Authors
of accepted papers must guarantee that their paper will be presented
at the workshop.

Important Dates:
Paper submission due : June 12, 2009
Notification: July 24, 2009
Camera-ready: August 25, 2009
Workshop date: Novembre 13, 2009
(ACM CCS 2009: November 9 - 13, 2009)

Co-chairs:
Elisa Bertino, Purdue University, USA
Thomas Groß, IBM Research, Switzerland
Kenji Takahashi, NTT, Japan

Program Committee:
Gail-Joon Ahn, Arizona State University, USA
James Backhouse, London School of Economics, UK
Abhilasha Bhargav-Spantzel, Intel, USA
Hu Bin, Motorola, USA
Doug Blough, Georgia Tech, USA
Jan Camenisch, IBM Research, Switzerland
Feng Cao, Cisco, USA
Marco Casassa Mont, HP Labs, UK
David Chadwick, University of Kent, UK
Chihung Chi, Tsinghua University, China
Rachna Dhamija, Harvard University, USA
Hidehito Gomi, Yahoo! Japan Research, Japan
Weili Han, Fudan University, China
Seung-Hyun Kim, ETRI, Korea
Brian LaMacchia, Microsoft, USA
Hyung-Jin Lim, Financial Security Agency, Korea
Howard Lipson, CERT, USA
Paul Madsen, NTT, Canada
Eve Maler, Sun Microsystems, USA
Toshihiko Matsuo, NTT Data, Japan
Piotr Pacyna, AGH Univ. of Science and Technology, Poland
Andreas Pfitzmann, Dresden University of Technology, Germany
Rakesh Radhakrishnan, Sun Microsystems, USA
Amardeo Sarma, NEC Laboratories Europe, Germany
Diana Smetters, PARC, USA
Anna C. Squicciarini, Pennsylvania State Univ., USA
Tsuyoshi Takagi, Future University - Hakodate, Japan

For further information:
Write to dim2009-chairs_at_lab.ntt.co.jp or visit
www2.pflab.ecl.ntt.co.jp/dim2009

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google
Groups "DataPortability.Public.General" group.
To post to this group, send email to
[email protected]
To unsubscribe from this group, send email to
[email protected]
For more options, visit this group at
http://groups.google.com/group/dataportability-public?hl=en
For additional information, please visit:
http://www.dataportability.org/
-~----------~----~----~----~------~----~------~--~---

Reply via email to