(Sorry if you have received this already) Please note that experience reports and case studies are welcome as well as technical papers. We look forward to submissions from this community!
Nachi -- The Fifth ACM Workshop on Digital Identity Management (http://www2.pflab.ecl.ntt.co.jp/dim2009) Call for Papers November 13, 2009, Collocated with ACM CCS2009, Chicago, IL, USA “Identity in a Changing World” This workshop will explore critical issues concerning identity management technologies for the information society. Identity management is an endeavor for maintaining the integrity of identities through their life cycle. It aims at making the identities available to services in a secure and privacy protected manner. Digital identities play an increasingly important role as the society depends more and more on services provided over Internet. For example, solid identity management practices are essential for implementing social welfare (e.g., healthcare and e-government), enabling secure service offering (e.g., cloud computing and Software as a Service), personalizing users' experiences (e.g., e-commerce and entertainment), and connecting people over networks (e.g., social networking and mobile communications). Digital identity management must strike the best balance between usability, security, and privacy. A number of identity solutions are being proposed, each taking different approaches with different goals. Existing solutions are not necessarily interoperable or complementary, and sometimes overlap. Thus it is critical to lay foundations for a holistic understanding of problem areas and synergetic approaches to innovative solutions, such as guidelines, methodologies, and tools. The workshop seeks submissions from diverse communities, such as social networking, open source projects, standardization fora, governments, system & security administrators, software engineers, and corporate & academic researchers. Topics of interest include, but are not limited to: - Identity life cycle - Networking social networks - Identity data portability - Identity assurance compatibility - Identity in cloud computing - Identity management for software-as-a-service (SaaS) - Identity Governance - Identity management for mobile and ubiquitous computing - Novel approach to identity management interoperability - Privacy enhancement - Identity solutions for specific areas (e.g., health care, government, and education) - Trust negotiation - Comparative analysis of RESTful vs SOAP approaches - Reputation management - Attribute aggregation - Identity discovery - Identity theft prevention - Mash-up security - Identity metasystem - User experience integrity - Gap analysis of different identity management technologies - Standards harmonization - Experience reports on identity management practices - Case studies and lessons from large scale deployment - Vulnerabilities, threat analysis and risk assessment of IDM solutions - Identity Analytics: analysis, modeling and simulation applied to IDM - IDM for critical infrastructure The goal of this workshop is to share the latest findings, identify key challenges, inspire debates, and foster collaboration between industries and academia towards interoperable identity service infrastructures. Submission Instructions: Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers should be at most 10 pages, using at least 10.5-point font and reasonable margins on A4 or US letter-size paper (8.5 inch x 11 inch). Committee members are not required to read the appendices, and so submissions should be intelligible without them. Each submission should start with the title, abstract, and names and contact information of authors. The introduction should give background and summarize the contributions of the paper at a level appropriate for a non-specialist reader. Authors of accepted papers must guarantee that their paper will be presented at the workshop. Important Dates: Paper submission due : June 12, 2009 Notification: July 24, 2009 Camera-ready: August 25, 2009 Workshop date: Novembre 13, 2009 (ACM CCS 2009: November 9 - 13, 2009) Co-chairs: Elisa Bertino, Purdue University, USA Thomas Gro?, IBM Research, Switzerland Kenji Takahashi, NTT, Japan Program Committee: Gail-Joon Ahn, Arizona State University, USA James Backhouse, London School of Economics, UK Abhilasha Bhargav-Spantzel, Intel, USA Hu Bin, Motorola, USA Doug Blough, Georgia Tech, USA Jan Camenisch, IBM Research, Switzerland Feng Cao, Cisco, USA Marco Casassa Mont, HP Labs, UK David Chadwick, University of Kent, UK Chihung Chi, Tsinghua University, China Rachna Dhamija, Harvard University, USA Hidehito Gomi, Yahoo! Japan Research, Japan Weili Han, Fudan University, China Seung-Hyun Kim, ETRI, Korea Brian LaMacchia, Microsoft, USA Hyung-Jin Lim, Financial Security Agency, Korea Howard Lipson, CERT, USA Paul Madsen, NTT, Canada Eve Maler, Sun Microsystems, USA Toshihiko Matsuo, NTT Data, Japan Piotr Pacyna, AGH Univ. of Science and Technology, Poland Andreas Pfitzmann, Dresden University of Technology, Germany Rakesh Radhakrishnan, Sun Microsystems, USA Amardeo Sarma, NEC Laboratories Europe, Germany Diana Smetters, PARC, USA Anna C. Squicciarini, Pennsylvania State Univ., USA Tsuyoshi Takagi, Future University - Hakodate, Japan Jo"rg Schenk, Ruhr-University Bochum, Germany For further information: Write to dim2009-chairs_at_lab.ntt.co.jp or visit www2.pflab.ecl.ntt.co.jp/dim2009 --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "OAuth" group. To post to this group, send email to [email protected] To unsubscribe from this group, send email to [email protected] For more options, visit this group at http://groups.google.com/group/oauth?hl=en -~----------~----~----~----~------~----~------~--~---
