posted by user: rafael_accorsi || 4288 views || tracked by 6 users: [display]

SBP 2013 : Workshop on Security in Business Processes

FacebookTwitterLinkedInGoogle

Link: http://www.inf.unibz.it/sbp13/
 
When Aug 26, 2013 - Aug 26, 2013
Where Beijing, China
Submission Deadline May 25, 2013
Notification Due Jun 1, 2013
Final Version Due Jul 23, 2013
Categories    business process management   information security   auditing and control   enterprise architecture
 

Call For Papers

================================================================
SBP'13: 2nd Workshop on Security in Business Processes
Site: (http://www.inf.unibz.it/sbp13/)
PDF: (http://bit.ly/SBP-Flyer)

in conjunction with the

11th Int'l Conference on Business Process Management
(http://bpm2013.tsinghua.edu.cn/)
================================================================

Following the successful events in 2012 (check out the journal report at
(http://bit.ly/X7qwCy)) and 2011, the 2nd Workshop on Security in
Business Processes (SBP'13) brings together researchers and
practitioners interested in security management of business process in
process-aware information systems.

SBP'13 encourages innovative methods for business process security audit
and control along the entire business process life-cycle: from design
time verification to online operational support and post-mortem
analysis. Furthermore, it welcomes contributions beyond the strictly
technical character, for instance those considering economic, legal and
standardization issues.

*Keynote*
Hejiao Huang (HIT Shenzhen Grad. School, China)

*TOPICS of INTEREST*
SBP13 addresses topics related to security/compliance audit and control and business processes, including:

- Alignment
- Authorization
- Accountability
- Audit reduction
- Business provenance
- Case studies
- Conformance checking
- Compliance checking
- Continuous audit
- Cost-benefit analysis
- Data-aware process mining
- Formal reasoning
- Fraud detection
- Economics of audit
- Experience reports
- Information flow control
- Log formats
- Meta-models for analysis
- Operational decision support
- Privacy-aware process discovery
- Requirements elicitation
- Requirements formalization
- Risk analysis and measurement
- Root-Cause Analysis
- Runtime verification/monitoring
- Security testing
- Trace clustering
- Usage control
- Business process forensics
- Business process simulation

*SUBMISSION INSTRUCTIONS*

Submitted manuscripts must be written in English and be no longer than 12 pages. They must be formatted using the LNCS format (http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0). Submissions will be reviewed by at least three PC members based on their originality, significance, technical soundness and clarity of exposition. The workshop papers will be published by Springer as a post-workshop proceedings volume in the series Lecture Notes in Business Information Processing (LNBIP). The submission website is at (https://www.easychair.org/conferences/?conf=sbpw13)

*IMPORTANT DATES*
Paper submission: May 25th, 2013
Paper notification: June 25th, 2013
Camera-ready version: July 23rd, 2013
Workshop: August 26th, 2013

*ORGANIZERS*
Wil van der Aalst, Eindhoven University of Technology, the Netherlands
Rafael Accorsi, University of Freiburg, Germany
Raimundas Matulevicius, University of Tartu, Estonia

*PROGRAM COMMITTEE*
Anne Baumgrass, HPI, Germany
Achim Brucker, SAP AG, Germany
Benoit Depaire, Hasselt University, Belgium
Jason Crampton, University of London, UK
Khaled Gaaloul, CRP Henri Tudor, Luxembourg
Aditya Ghose, University of Wollongong, Australia
Hejiao Huang, Shenzhen Graduate School, China
Michael Huth, Imperial College, UK
Fuyuki Ishikawa, National Institute of Informatics, Japan
Jan Jürjens, Technical University of Dortmund, Germany
Dimka Karastoyanova, University of Stuttgart, Germany
Günter Karjoth, IBM Research, China
Peter Karpati, Institute for Energy Technology, Norway
Seok-Won Lee, Ajou University, Korea
Lin Liu, Tsinghua University, China
Heiko Ludwig, IBM Almaden Research Center, USA
Nicolas Mayer, CRP Henri Tudor, Luxembourg
Per H. Meland, SINTEF, Norway
Marko Montali, Free University of Bozen-Bolzano, Italy
Haralambos Mouratidis, University of East London, UK
Andreas Opdahl, University of Bergen, Norway
Günther Pernul, University of Regensburg, Germany
Silvio Ranise, Fundazione Bruno Kessler, Italy
Stefanie Rinderle-Ma, University of Vienna, Austria
David G. Rosado, University of Castilla-La Mancha, Spain
Shazia Sadiq, University of Queensland, Australia
Guttorm Sindre, Norwegian University of Science and Technology, Norway
Mark Strembeck, Vienna University of Economics and Business, Austria
Jan M. van der Werf, Technical University of Eindhoven, the Netherlands
Nicola Zannone, Technical University of Eindhoven, the Netherlands

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
IJCIS 2024   International Journal on Cryptography and Information Security
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
SEAS 2025   14th International Conference on Software Engineering and Applications
BS LAB 2025   9th Business Systems Laboratory International Symposium TECHNOLOGY AND SOCIETY: Boon or Bane?
SECRYPT 2025   22nd International Conference on Security and Cryptography
CCS 2025   ACM Conference on Computer and Communications Security 2024 (round 2)
ACM ICIIT 2025   ACM--2025 10th International Conference on Intelligent Information Technology (ICIIT 2025)--ESCI
Topical collection Springer 2025   CFP: Sense-Making and Collective Virtues among AI Innovators. Aligning Shared Concepts and Common Goals
ICBDA 2025   IEEE--2025 the 10th International Conference on Big Data Analytics (ICBDA 2025)