| |||||||||||||||
RISI 2013 : The Third International Workshop on Resilience and IT-Risk in Social Infrastructures | |||||||||||||||
Link: http://bit.ly/XyB1Tu | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
[Apologies for cross postings. Please feel free to circulate this CfP to colleagues and prospective interested parties.]
============================================= RISI 2013: The Third International Workshop on Resilience and IT-Risk in Social Infrastructures within ARES 2013 September 2nd - 6th, 2013 University of Regensburg Regensburg, Germany http://www.ares-conference.eu http://bit.ly/XyB1Tu !!! EXTENDED SUBMISSION DEADLINE !!! !!! March 22th, 2013 !!! CALL FOR PAPERS ============================================= SCOPE Resilience gains importance for sustainable welfare of societies with respect to their acceptable adaption to interferences of all kind. The aim is to identify current states of systems and to predict their development. In order to prepare for expected interferences and to response to unexpected, inevitable interferences in real-time, current initiatives in computer science aim to analyze huge amount of data from public and private domains with adaptive IT systems, e.g. Cloud Computing. Realizing such analyzing services implies availability of authentic, personal data form different origins, their aggregation, and secondary use. These services are "data-centric" by definition. One main challenge to be solved for achieving such reliable data-centric services within acceptable risks is cross-domain processing of (personal) data in compliance to law, business rules and social norms. Whereas many security solutions are well studied for models and their implementation for separated security domains, this is not the case for data-centric services and adaptive IT systems. The aim of the RISI 2013 workshop is to identify research problems and to discuss risk scenarios with data-centric services regarding their support for "Resilience in Social Infrastructures" as well as the necessity to take non-technical aspects into consideration. We encourage academic researchers and industry experts to present and discuss novel ideas and ongoing work. Contributions addressing promising approaches to provide and manage resilient infrastructures with data-centric services are invited as research in progress and best practices. TOPICS OF INTEREST Topics of interest include, but are not limited to: Risk assessment and vulnerability analysis for data-centric services * Economics of controls * Risk measurements for data-centric services * Identification of vulnerabilities in service-oriented computing/data-centric services * Methods of Business Intelligence and their suitability for data-centric services * Management of data quality in data-centric services * Risk scenarios of data-centric services Policy and IT security management for data-centric services * Policy management for processing of personal data * Policy enforcement vs. monitoring and their risks for data-centric services * Anonymity/pseudonymity and data-centric services * Legal implications of data-centric services and security mechanisms Methods for resilience & best practices * Privacy and security in participatory sensing * Critical information infrastructure protection * Human-centric resilience systems * Measurements of resilience * Case studies IMPORTANT DATES Submission Deadline March 8th, 2013 Author Notification May 2nd, 2013 Author Registration May 18th, 2013 Proceedings Version June 1st, 2013 Conference September 2nd - 6th, 2013 SUBMISSION GUIDELINES All accepted papers will be published as ISBN proceedings published by Conference Publishing Services (CPS) of ARES 2013: http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6329167 The submission guidelines valid for the workshop are the same as for the ARES conference. They can be found at http://www.ares-conference.eu. ORGANIZING COMMITTEE Isao Echizen National Institute of Informatics, Japan iechizen[at]nii.ac.jp Stefan Sackmann Martin-Luther University of Halle-Wittenberg, Germany stefan.sackmann[at]wiwi.uni-halle.de Sven Wohlgemuth CASED, Intel Collaborative Research Institute for Secure Computing (ICRI-SC), TU Darmstadt, Germany sven.wohlgemuth[at]trust.cased.de PROGRAM COMMITTEE (TBC) * Sonja Buchegger, KTH - Stockholm, Sweden * Mathias Fischer, TU Darmstadt/CASED, Germany * Koichiro Hayashi, Institute of Information Security Yokohama, Japan * Bernd Heinrich, University of Regensburg, Germany * Marlen Hofmann, Martin-Luther University Halle-Wittenberg, Germany * Rüdiger Kapitza, TU Braunschweig, Germany * Ioannis Krontiris, Goethe University Frankfurt/Main, Germany * Dennis Kundisch, University of Paderborn, Germany * Hiroshi Maruyama, Institute of Statistical Mathematics, Japan * Ryoichi Sasaki, Tokyo Denki University, Japan * Christian Schaefer, Ericsson AB Research, Sweden * Stephan Sigg, National Institute of Informatics, Japan * Kazuo Takaragi, RISEC National Institute of Advanced Industrial Science and Technology, Japan * A Min Tjoa, Vienna University of Technology, Austria * Edgar Weippl, Secure Business Austria, Austria * Rigo Wenning, W3C/ERCIM, France * Hideki Yoshii, Softbank Telecom Corp., Japan * Hiroshi Yoshiura, The University of Electro-Communications of Tokyo, Japan * Alf Zugenmaier, University of Applied Sciences Munich, Germany |
|