CfP SDIM @IEEE COMPSAC 2018

January 8, 2018

The 1st IEEE International Workshop on Secure Digital Identity Management - SDIM 2018 adjunct with the 42th IEEE Computer Society International Conference on Computers, Software & Applications (COMPSAC 2018)

Goal:

Secure digital identity management, required by cloud services, federated services, or newest distributed technologies such as blockchain and distributed ledger technologies, is receiving increasing attention from both service providers' and end users' perspectives, in terms of protection of enterprise assets and customers’ privacy in the cloud, respectively. This workshop solicits contributions describing state-of-the-art methodology and technology innovations in the field of secure identity management, encourages experience sharing (both positive and negative ones), and also welcomes disruptive work-in-progress ideas towards future concepts.

The workshop is dedicated to the security and privacy aspects of identity management (IDM) in smart devices, the cloud, or blockchain and distributed ledger environment. Topics are articulated around several important themes as “concept design”, “enabling technologies”, “federated identities” and “applications”. It is expected they will attract both theoretical and empirical works from the IDM society, the cloud computing society, and the blockchain/distributed ledger technologies society.

https://www.computer.org/web/compsac2018/sdim

Scope:

Any submission whose content is relevant to the area of secure identity management will be considered, but any submission whose subject matter is related to one of the following topics will be particularly welcome. Practically-oriented approaches will also be appreciated.

  • identity-based access control and remote personal data management (authentication, authorization, accounting and access management, single sign on for Web services and non-web applications)
  • data processing and analysis in a protected domain for personal data management
  • service-oriented architecture for IDM in cloud, e.g. identity authentication outsourcing
  • identity federations & trust fabrics (technologies and policies) ; federation of identities in roaming scenario
  • new concept design of IDM towards cloud (e.g. distributed ledger-based)
  • technologies for enhancing privacy and security of customer data and social media (biometrics, multi-factor authentication, mobile devices)
  • security and privacy enhanced databases and directory services
  • Secure messaging, digital signature, and encryption ; PKI architecture, Security Policy, and operation method
  • Big data/Cloud/GRID access control and privacy protection
  • applications, e.g. cross-border IDM, security and privacy enhanced IDM for eCommerce, eCitizen, and eHealth in cloud
  • privacy and security evaluation for IDM services in cloud and case study of security breaches of IDM in cloud
  • IDM on a blockchain or distributed ledger platform
  • Privacy protection of personal identities on a blockchain or distributed ledger platform
  • Anonymous identity attribute ownership verification on a blockchain or distributed ledger

 

Important Dates

  • Full paper submission deadline: April 10th, 2018
  • Acceptance notification: May 1st, 2018
  • Camera ready and advance registration: May 15th, 2017
  • Workshop date: one day (tbd) during the COMPSAC week 

 

Paper Submission

All accepted papers will be published in the electronic proceedings by the IEEE Computer Society. A camera ready paper will be limited to 6 pages (IEEE Conference Proceedings style). Authors must follow COMPSAC Author Guidelines under "Information for Authors" to prepare papers. At least one of the authors of an accepted paper is required to pay full registration fee and present the paper at the workshop in person, in order to enable indexing through INSPEC and EI, and inclusion in the IEEE digital library.

 

Organizers:

  • Bian Yang, Norwegian University of Science and Technology, Norway
  • Julien Bringer, Smart Valor, Switzerland
  • Hideaki Goto, Tohoku University, Japan

 

Program Committee:

  •           Erik-Oliver Blass (Airbus Group Innovations, Germany)
  •          Julien Bringer (Smart Valor, Switzerland)
  •          Martin Gilje Jaatun (SINTEF, Norway)
  •          Hideaki Goto (Tohoku University, Japan)
  •          Thomas Kemmerich (Norwegian Information Security Laboratory, Norway)
  •          Atsushi Kanai (Hosei University, Japan)
  •          Els Kindt (KU Leuven, Belgium)
  •          Qiong Li (Harbin Institute of Technology, China)
  •          Diego R. Lopez (Telefonica I+D, Spain)
  •          Suhaimi Napis (Universiti Putra Malaysia, Malaysia)
  •          Yasuo Okabe (Kyoto University, Japan)
  •          Nicolas Buchmann (Freie Universität Berlin, Germany)
  •          Hiroyuki Sato (The University of Tokyo, Japan)
  •          Muhammad Farhan Sjaugi (Perdana University, Malaysia)
  •          Chik-How Tan (National University of Singapore, Singapore)
  •          Shigeaki Tanimoto (Chiba Institute of Technology, Japan)
  •          Per Thorsheim (God Praksis AS, Norway)
  •          Bian Yang (NTNU, Norway)
  •          Xuebing Zhou (Huawei European Research Center, Germany)