| |||||||||||||||
IEEE COMPSAC-SDIM 2020 : The 3rd IEEE International Workshop on Secure Digital Identity Management | |||||||||||||||
Link: https://ieeecompsac.computer.org/2020/sdim/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
CfP: SDIM 2020: The 3rd IEEE International Workshop on Secure Digital Identity Management
https://ieeecompsac.computer.org/2020/sdim/ Workshop papers due: 01 May 2020 Workshop paper notifications: 15 May 2020 Camera-ready versions due: 31 May 2020 Goal of the workshop: Secure digital identity management, required by cloud services, federated services, or newest distributed and decentralized technologies such as blockchain and distributed ledger technologies, is receiving increasing attention from both service providers’ and end users’ perspectives, in terms of protection of enterprise assets and customers’ privacy in the cloud, respectively. This workshop solicits contributions describing state-of-the-art methodology and technology innovations in the field of secure identity management, encourages experience sharing (both positive and negative ones), and also welcomes work-in-progress ideas towards future concepts. Workshop theme: The workshop is dedicated to the security and privacy aspects of identity management (IDM) in smart devices, the cloud, or blockchain and distributed ledger environment. Topics are articulated around several important themes as “concept design”, “enabling technologies”, “federated identities”, “decentralized identities” and “applications”. It is expected they will attract both theoretical and empirical works from the IDM society, the cloud computing society, and the decentralized identity management society. Scope of the workshop: Any submission whose content is relevant to the area of secure identity management will be considered, but any submission whose subject matter is related to one of the following topics will be particularly welcome. Practically-oriented approaches will also be appreciated. • identity-based access control and personal data management • data provenance • identity attributes processing and analysis in a protected domain • service-oriented architecture for IDM in cloud • identity federations & trust fabrics • Cryptographic methods for IDM • PKI architecture, security policy, and operation method • identity management in the IoT environment • IDM on a blockchain, self-sovereign identity or other decentralized identity platform • Anonymization, pseudonymization, and other privacy / data protection methods • legal, ethical, and socioeconomic aspects Likely participants: eID, federation and digital IDM researchers, privacy regulation and technology researchers, security and access management researchers, cryptographic researchers, blockchain & distributed ledger identity experts, SSI/DID experts, IDM industries, and government agencies. |
|