[PET] NEW Submission Deadline: CfP - IFIP IDMAN 2010 - 2nd IFIP WG 11.6 Working Conference on Policies & Research in Identity Management

Simone Fischer Hübner simone.fischer-huebner at kau.se
Wed Nov 11 20:26:39 GMT 2009


The submission deadline for IFIP IDMAN 2010 has ben moved to 1st April 2010


CALL FOR PAPERS

IFIP IDMAN 2010 - 2nd IFIP WG 11.6 Working 
Conference on Policies & Research in Identity Management (IDMAN’10)
in Cooperation with The Norwegian Computing Center

in Oslo / Norway, 18 – 19 November 2010
http://ifipidman2010.nr.no/ifipidman2010/index.php5/Main_Page


Conference scope

The world of the 21st century is, more than ever, 
global and impersonal. Criminal and terrorist 
threats, both physical and on the internet, 
increase by the day. The demand for better 
methods of identification is growing, not only in 
companies and organisations but also in the world at large.

Identity management is put under pressure, due to 
the growing number of frauds who want to hide 
their true identity. Identity management 
challenges the information security research 
community to focus on interdisciplinary and 
holistic approaches while retaining the benefits of previous research efforts.

As part of this tendency, surveillance and 
monitoring are more prominently present in 
society, both in the public and private domain. 
The original intention being to contribute to 
security and safety, surveillance and monitoring 
might, in some cases, have unintended or even 
contradictory effects. Besides, the omnipresence 
of surveillance and monitoring systems might be 
at daggers drawn with public and democratic liberties.


Subjects

Papers offering research contributions focusing 
on identity management in general and 
surveillance and monitoring in particular are 
solicited for submission to the 2nd IFIP WG-11.6 
International Conference on Identity Management.

Papers may present theory, applications or 
practical experiences in the field of national 
identity management, from both a technical and a 
social perspective, including, but not necessarily limited to:
    * History
    * Law
    * Philosophical and ethical aspects
    * Economics Impact of surveillance and 
monitoring in both the physical world and in cyberspace
    * Impact on society and politics
    * Impact on e-government and e-government applications
    * Consecutive developments in social tracking, -tracing and -sorting
    * Quality of identity management in general
    * Quality identity data, processes and applications
    * Security and identity management
    * User centered, usable and inclusive identity management
    * Attacks on identity management 
infrastructure and procedures Central storage of 
general and biometric identity data
    * Effectiveness of surveillance and 
monitoring in fighting terrorism, international crime and
    * human trafficking
    * Methods of identification and authentication
    * Models of identification procedures
    * Models of inclusive identification and authentication procedures
    * Government PKI
    * (Possible) role of pseudonymous and 
anonymous identity in identity management
    * Electronic Ids European and worldwide 
policies and cooperation in the field of identity management and
    * surveillance and monitoring
    * (Inter)national policies on unique 
identifiers /social security numbers / personalisation IDs
    * (Inter)national applications of biometrics
    * Vulnerabilities of electronic identification protocols
    * Federative identity management and de-perimetrization
    * Fraud, fraud detection, fraud resistence of technologies
    * Biometric verification, assurance, metrics and measurements
    * Fraud resistance of biometrics
    * Junction between (large scale) applications 
of identity management and surveillance and
    * monitoring
    * Data Protection
    * Privacy and Privacy Enhancing Technologies (PETs) in identity management
    * Privacy Intrusion Technologies (PITs) in identity management
    * Privacy side-effects and privacy risks 
assessment of identity management Intelligence and (inter)national threats
    * Impersonation, identity fraud, identity forge and identity theft
    * Tracing, monitoring and forensics

Instructions for paper submission

Submitted papers must be original, unpublished, 
and not submitted to another conference or 
journal for consideration of publication. Papers 
must be written in English; they should be at 
most 12 pages long in total. Accepted papers will 
be presented at the conference and published in 
the conference proceedings by the official IFIP 
publisher Springer Science and Business Media. At 
least one author of each accepted paper is 
required to register with the conference and 
present the paper. Papers must be submitted in 
electronic form through the web. Detailed 
instructions for electronic submission and author 
instructions will follow at 
http://ifipidman2010.nr.no/ifipidman2010/index.php5/Main_Page

Important dates


Submission of papers: April 1, 2010

Notification to authors: June 1, 2010

Camera-ready copies: August 15, 2010


Conference General Chair

    * Elisabeth de Leeuw, TopForce B.V., Rotterdam, The Netherlands

Programme Committee co-Chairs

    * Simone Fischer-Hübner, Karlstad University, Sweden
    * Lothar Fritsch, Norwegian Computing Center, NR, Norway
    * Alina Stan, Capgemini, The Netherlands

Publication Chair

    * John Borking, Borking Consultancy, The Netherlands

Program Committee

Claudio Agostino Ardagna, Università degli Studi di Milano, Italy
Bill Caelli, Information Security Institute, 
Queensland University of Technology, USA
Gurpeet Dhillon, School of Business, Virginia Commonwealth University, USA
Sara Foresti, Università degli Studi di Milano, Italy
Steven Furnell, Communications & Network Research University of Plymouth, UK
Dimitris Gritzalis, Department of Informatics, 
Athens University of Economics and Business, Greece
Stefanos Gritzalis, University of the Aegean, Greece
Marit Hansen, Independent Centre for Privacy 
Protection Schleswig-Holstein, Germany
Alejandro Hevia, Dept. of Computer Science, 
Facultad de Ciencias Fisicas y Matematicas, Universidad de Chile
Jaap-Henk Hoepman, Radboud Universiteit, Nijmegen, The Netherlands
Gus Hosein, Department of Management Information 
Systems and Innovation Group, London School of Economics, UK
Bart Jacobs, Radboud Universiteit, Nijmegen, The Netherlands
Lech Janczewki, Information Systems & Operations 
Management, University of Auckland, New Zealand
Ronald Leenes, Tilburg University, The Netherlands
Javier Lopez, Computer Science Department, University of Malaga, Spain
Ruud van Munster, TNO Defence, Security and Safety, Delft, The Netherlands
Aljosa Pasic, Atos Origin, Madrid, Spain
Kai Rannenberg, Goethe University, Frankfurt, Germany
Anne Karen Seip, Kredittilsynet, Oslo, Norway
Rama Subramaniam, Valiant Technologies, Chennai, India
Pedro Veiga, University of Lisbon, Portugal
Jozef Vyskoc, VaF, Rovinka, Slovak Republic
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.links.org/pipermail/pet/attachments/20091111/9643497c/attachment.html>


More information about the PET mailing list