posted by organizer: rafael_accorsi || 4213 views || tracked by 4 users: [display]

SBP 2014 : Workshop on Security in Business Processes

FacebookTwitterLinkedInGoogle

Link: http://sbp14.cs.ut.ee
 
When Sep 8, 2014 - Sep 8, 2014
Where Haifa, Israel
Submission Deadline Jun 8, 2014
Notification Due Jul 1, 2014
Final Version Due Jul 23, 2014
Categories    business process management   information security   auditing and control   enterprise architecture
 

Call For Papers

================================================================
SBP'14: 3nd Workshop on Security in Business Processes

in conjunction with the

12th Int'l Conference on Business Process Management
(http://bpm2014.haifa.ac.il/)
================================================================

Despite the growing demand for business processes that comply with
security policies, security and privacy incidents caused by erroneous
workflow specifications are regrettably common. This is, in part,
because business process management and security are seldom addressed
together, thereby hindering the development of trustworthy and
security-compliant business processes. The third edition of the Workshop
on Security in Business Processes (SBP'14) seeks to bring together
researchers and practitioners interested in the management and modelling
of secure business processes in process-aware information systems.

The goal of SBP'14 is to obtain a deeper understanding of a rapidly
maturing, yet still largely under-investigated field of business process
security, audit and control, including both thorough security
requirements formalization, secure process modelling, and mechanisms for
verification, monitoring and auditing. In particular, SBP'14 encourages
innovative methods for workflow security modelling, security audit and
control throughout the business process lifecycle: from design time
verification to online operational support and post-mortem analysis.

*Topic of interest*
Alignment Information flow control
Authorization Log formats
Accountability Meta-models for analysis
Audit reduction Operational decision support
Business provenance Privacy-aware process discovery
Case studies Requirements elicitation
Conformance checking Requirements formalization
Compliance checking Risk analysis and measurement
Continuous audit Runtime verification/monitoring
Cost-benefit analysis Security testing
Data-aware process mining Trace clustering
Formal reasoning Usage control
Fraud detection Workflow forensics
Economics of audit Workflow simulation
Experience reports

*Submission instructions*
Submitted manuscripts must be written in English and be no longer than
12 pages. They must be formatted using the LNBIP format and submitted as
a PDF document to the EasyChair website: (https://www.easychair.org/
conferences/?conf=sbp14). Submissions will be reviewed on the basis of
their originality, significance, technical soundness and clarity of
exposition. Each submission will be reviewed by at least three PC
members. Submitted manuscripts should not substantially overlap
manuscripts that have been published or that are simultaneously
submitted to a conference with proceedings or a journal.

*Important dates*
Paper submission: June 8, 2014
Paper notification: July 2, 2014
Camera-ready version: July 23, 2014
Workshop: September 8, 2014

*Organizers*
PC Chairs
Rafael Accorsi (Freiburg U, DE)
Raimundas Matulevicius (Tartu U, EE)
Jason Crampton (Royal Holloway U, UK)

Honorary PC Chair
Wil van der Aalst (TU/E, NL)

Publicity Chair
Giovanni Livraga (Milan U, IT)

*Program committee*
Anne Baumgrass (HPI, DE)
Achim Brucker (SAP AG, DE)
Khaled Gaaloul (CRP Henri Tudor, LU)
Aditya Ghose (Wollongong U, AU)
Anat Goldat (Duisburg-Essen U, DE)
Hejiao Huang (Shenzhen Graduate School, CN)
Michael Huth (Imperial College, UK)
Fuyuki Ishikawa (NII Tokyo, JP)
Jan Jürjens (Dortmund TU, DE)
Dimka Karastoyanova (Stuttgart U, DE)
Günter Karjoth (Lucerne UT, CH)
Seok-Won Lee (Ajou U, KR)
Lin Liu (Tsinghua U, CN)
Heiko Ludwig (IBM Almaden, USA)
Nicolas Mayer (CRP Henri Tudor, LU)
Per H. Meland (SINTEF, NO)
Marko Montali (Bozen-Bolzano FU, IT)
Haralambos Mouratidis (East London U, UK)
Andreas Opdahl (Bergen U, NO)
Günther Pernul (Regensburg U, DE)
Silvio Ranise (FBK, IT)
Stefanie Rinderle-Ma (Vienna U, AT)
David G. Rosado (Castilla-La Mancha U, ES)
Shazia Sadiq (Queensland U, AU)
Guttorm Sindre (Norwegian Science and Technology U., NO)
Pnina Soffer (Haifa U, IS)
Mark Strembeck (Vienna WU, AT)
Arnon Sturm (Haifa U, IS)
Matthias Weidlich (Imperial College, UK)
Jan M. van der Werf (TU/E, NL)
Nicola Zannone (TU/E, NL)

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
IJCIS 2024   International Journal on Cryptography and Information Security
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
SEAS 2025   14th International Conference on Software Engineering and Applications
BS LAB 2025   9th Business Systems Laboratory International Symposium TECHNOLOGY AND SOCIETY: Boon or Bane?
SECRYPT 2025   22nd International Conference on Security and Cryptography
CCS 2025   ACM Conference on Computer and Communications Security 2024 (round 2)
ACM ICIIT 2025   ACM--2025 10th International Conference on Intelligent Information Technology (ICIIT 2025)--ESCI
Topical collection Springer 2025   CFP: Sense-Making and Collective Virtues among AI Innovators. Aligning Shared Concepts and Common Goals
ICBDA 2025   IEEE--2025 the 10th International Conference on Big Data Analytics (ICBDA 2025)