-------- Original Message --------
Subject: [computational.science] IFIP IDMAN 2013: second call for papers
Date: Mon, 17 Sep 2012 11:42:53 +0100
From: Chris Mitchell <me@chrismitchell.net>
Organization: "ICCSA"
To: Computational Science Mailing List <computational.science@lists.iccsa.org>


                     Second Call for Papers

   IFIP IDMAN 2013 - 3rd IFIP WG 11.6 Working Conference on
          Policies & Research in Identity Management
                London, UK, 8th-9th April 2013
                       www.idman2013.com

Background

Building on the success of IDMAN 2007 and 2010 (which were held
in Rotterdam and Oslo, respectively), this conference focuses
on the theory, technologies and applications of identity
management. IFIP IDMAN 2013, the 3rd IFIP WG 11.6 Working
Conference on Policies & Research in Identity Management, will
take place between the 8th and 10th of April 2013 at Royal
Holloway, University of London, UK.


Conference scope

The world of the 21st century is, more than ever, global and impersonal. As
a result of increasing cyber fraud and cyber terrorism, the demand for
better technical methods of identification is growing, not only in companies
and organisations but also in the world at large. Moreover, in our society
digital identities increasingly play a role in the provision of eGovernment
and eCommerce services. For practical reasons, Identity Management Systems
are needed that are usable and interoperable.

At the same time, individuals increasingly leave trails of personal data
when using the Internet, which allows them to be profiled and which may be
stored for many years to come. Technical trends such as Cloud Computing and
pervasive computing make personal data processing non-transparent, and make
it increasingly difficult for users to control their personal spheres. As
part of this tendency, surveillance and monitoring are increasingly
present in society, both in the public and private domains. Whilst the
original
intention is to contribute to security and safety, surveillance and
monitoring might, in some cases, have unintended or even contradictory
effects. Moreover, the omnipresence of surveillance and monitoring systems
might directly conflict with public and democratic liberties.
These developments raise substantial new challenges for privacy and identity
management at the technical, social, ethical, regulatory, and legal levels.

Identity management challenges the information security research community
to focus on interdisciplinary and holistic approaches, while retaining the
benefits of previous research efforts.


Topics for papers

Papers offering research contributions to the area of  identity  management
are solicited for submission to the 3rd IFIP WG-11.6 IDMAN conference.

Papers may present theory, applications or practical experience in the
field of identity management, from a technical, legal or
socio-economic perspective, including, but not necessarily limited to:

o	Novel identity management technologies and approaches
o	Interoperable identity management solutions
o	Privacy-enhancing technologies
o	Identity management for mobile and ubiquitous computing
o	Identity management solutions for eHealth, eGovernment and
eCommerce
o	Privacy and Identity (Management) in and for cloud computing
o	Privacy and Identity in social networks
o	Risk analysis techniques for privacy risk and privacy impact
assessment
o	Privacy management of identity management
o	Identity theft prevention
o	Attribute based authentication and access control
o	User-centric identity management
o	Legal, socio-economic, philosophical and ethical aspects
o	Impact on society and politics
o	Related developments in social tracking, tracing and sorting
o	Quality of identity data, processes and applications
o	User centered, usable and inclusive identity management
o	Attacks on identity management infrastructures
o	Methods of identification and authentication
o	Identification and authentication procedures
o	Applications of anonymous credentials
o	(Privacy-preserving) identity profiling and fraud detection
o	Government PKIs
o	(Possible) role of pseudonymous and anonymous identity in identity
management
o	Electronic IDs: European and worldwide policies and cooperation in
the field of identity management
o	Surveillance and monitoring
o	(Inter)national policies on unique identifiers /social security
numbers / personalisation IDs
o	Vulnerabilities in electronic identification protocols
o	Federative identity management and de-perimeterisation
o	Biometric verification
o	(Inter)national applications of biometrics
o	Impersonation, identity fraud, identity forge and identity theft
o	Tracing, monitoring and forensics
o	Proliferation/omnipresence of identification
o	Threats to democracy and political control


Instructions for paper submission

Submitted papers must be original, unpublished, and not submitted to another
conference or journal for consideration for publication. Papers must be
written in English; they should be at most 14 pages long in total. Accepted
papers will be presented at the conference and published in the conference
proceedings by the official IFIP publisher: Springer Science and Business
Media. At least one author of each accepted paper is required to register
with the conference and present the paper. Papers must be submitted in
electronic form through the web.

Papers must be submitted using the EasyChair conference
management system at:
  https://www.easychair.org/conferences/?conf=ifipidman13
Please send any enquiries to:
  webmaster@idman2013.com


Important dates

 Deadline for submissions: Friday 26 October 2012
 Notifications to authors: Friday 14 December 2012
 Camera-ready due: Friday 18 January 2013
 Opening of conference: Monday 8 April 2013


Conference organisation

General Chair

 Chris Mitchell, Royal Holloway, University of London, UK

Programme Committee Chairs

 Simone Fischer-Hübner, Karlstad University, Sweden
 Elisabeth de Leeuw, Netherlands

Organising Committee Chairs

 Haitham Al-Sinani, Royal Holloway, University of London, UK
 Marcelo Carlomagno Carlos, Royal Holloway, University of London, UK


Program Committee

 Rose-Marie Åhlfeldt, Skövde University, Sweden
 Haitham Al-Sinani, Royal Holloway, University of London, UK
 Claudio Ardagna, Università degli Studi di Milano, Italy
 Alessandro Armando, FBK, Italy
 Bharat Bhargava, Purdue University, USA
 Sonja Buchegger, Royal Institute of Technology, Sweden
 David Chadwick, University of Kent, UK
 Sara Foresti, Università degli Studi di Milano, Italy
 Lothar Fritsch, Norwegian Computing Center, Norway
 Steven Furnell, University of Plymouth, UK
 Stefanos Gritzalis, University of the Aegean, Greece
 Marit Hansen, Independent Centre for Privacy Protection Schleswig-Holstein,
Germany
 Hans Hedbom, Karlstad University, Sweden
 Alejandro Hevia, Universidad de Chile, Chile
 Jaap-Henk Hoepman, TNO and Radboud University Nijmegen, the Netherlands
 Bart Jacobs, Radboud Universiteit, Netherlands
 Lech Janczewski, University of Auckland, New Zealand
 Ronald Leenes, Tilburg University, Netherlands
 Javier Lopez, University of Malaga, Spain
 Raj Muttukrishnan, City University, UK
 Andreas Pashalidis, Katholieke Universiteit Leuven, Belgium
 Aljosa Pasic, Atos Origin, Spain
 Siani Pearson, Hewlett-Packard Laboratories, UK
 Guenther Pernul, Regensburg University, Germany
 Geraint Price, Royal Holloway, University of London, UK
 Kai Rannenberg, Goethe University, Frankfurt, Germany
 Anne Karen Seip, Kredittilsynet, Norway
 Einar Snekkenes, Gjövik University College, Norway
 Rama Subramaniam, Valiant Technologies, India
 Pedro Veiga, University of Lisbon, Portugal
 Jozef Vyskoc, VaF, Slovakia