Empreintes digitales - Forme de la main - Visage - Iris - Rétine - Réseau veineux - Analyse comportementale - Voix - Signature dynamique - Frappe au clavier - Démarche ...

The 3rd IFIP WG 11.6 Working Conference on Policies & Research in Identity Management, will take place on the 8th and 9th of April 2013 at Royal Holloway, University of London, UK.

IMPORTANT DATES

  • Deadline for submissions: Friday 26 October 2012
  • Notifications to authors: Friday 14 December 2012
  • Camera-ready due: Friday 18 January 2013

Call for Papers

Background

Building on the success of IDMAN 2007 and 2010 (which were held in Rotterdam and Oslo, respectively), this conference focuses on the theory, technologies and applications of identity management.

IFIP IDMAN 2013, the 3rd IFIP WG 11.6 Working Conference on Policies & Research in Identity Management, will take place on the 8th and 9th of April 2013 at Royal Holloway, University of London, UK.

Conference scope

The world of the 21st century is, more than ever, global and impersonal. As a result of increasing cyber fraud and cyber terrorism, the demand for better technical methods of identification is growing, not only in companies and organisations but also in the world at large. Moreover, in our society digital identities increasingly play a role in the provision of eGovernment and eCommerce services. For practical reasons, Identity Management Systems are needed that are usable and interoperable.

At the same time, individuals increasingly leave trails of personal data when using the Internet, which allows them to be profiled and which may be stored for many years to come. Technical trends such as Cloud Computing and pervasive computing make personal data processing non-transparent, and make it increasingly difficult for users to control their personal spheres. As part of this tendency, surveillance and monitoring are increasingly present in society, both in the public and private domains. Whilst the original intention is to contribute to security and safety, surveillance and monitoring might, in some cases, have unintended or even contradictory effects. Moreover, the omnipresence of surveillance and monitoring systems might directly conflict with public and democratic liberties. These developments raise substantial new challenges for privacy and identity management at the technical, social, ethical, regulatory, and legal levels.

Identity management challenges the information security research community to focus on interdisciplinary and holistic approaches, while retaining the benefits of previous research efforts.

Topics for papers

Papers offering research contributions to the area of identity management are solicited for submission to the 3rd IFIP WG-11.6 IDMAN conference.

Papers may present theory, applications or practical experience in the field of identity management, from a technical, legal or socio-economic perspective, including, but not necessarily limited to:

  • Novel identity management technologies and approaches
  • Interoperable identity management solutions
  • Privacy-enhancing technologies
  • Identity management for mobile and ubiquitous computing
  • Identity management solutions for eHealth, eGovernment and eCommerce
  • Privacy and Identity (Management) in and for cloud computing
  • Privacy and Identity in social networks
  • Risk analysis techniques for privacy risk and privacy impact assessment
  • Privacy management of identity management
  • Identity theft prevention
  • Attribute based authentication and access control
  • User-centric identity management
  • Legal, socio-economic, philosophical and ethical aspects
  • Impact on society and politics
  • Related developments in social tracking, tracing and sorting
  • Quality of identity data, processes and applications
  • User centered, usable and inclusive identity management
  • Attacks on identity management infrastructures
  • Methods of identification and authentication
  • Identification and authentication procedures
  • Applications of anonymous credentials
  • (Privacy-preserving) identity profiling and fraud detection
  • Government PKIs
  • (Possible) role of pseudonymous and anonymous identity in identity management
  • Electronic IDs: European and worldwide policies and cooperation in the field of identity management
  • Surveillance and monitoring
  • (Inter)national policies on unique identifiers /social security numbers / personalisation IDs
  • Vulnerabilities in electronic identification protocols
  • Federative identity management and de-perimeterisation
  • Biometric verification
  • (Inter)national applications of biometrics
  • Impersonation, identity fraud, identity forge and identity theft
  • Tracing, monitoring and forensics
  • Proliferation/omnipresence of identification
  • Threats to democracy and political control

Instructions for authors

Submitted papers must be original, unpublished, and not submitted to another conference or journal for consideration for publication. Papers must be written in English; they should be at most 14 pages long in total. Accepted papers will be presented at the conference and published in the conference proceedings by the official IFIP publisher: Springer Science and Business Media. At least one author of each accepted paper is required to register with the conference and present the paper. Papers must be submitted in electronic form through the web.

Papers must be submitted using the EasyChair conference management system.

Please send any enquiries to: webmaster [insert the at symbol] idman2013.com

Important dates

  • Deadline for submissions: Friday 26 October 2012
  • Notifications to authors: Friday 14 December 2012
  • Camera-ready due: Friday 18 January 2013
  • Opening of conference: Monday 8 April 2013

Conference organisation

General Chair

  • Chris Mitchell, RHUL, UK

Programme Committee Chairs

  • Simone Fischer-Hübner, Karlstad University, Sweden
  • Elisabeth de Leeuw, Netherlands

Organising Committee Chairs

  • Haitham Al-Sinani, Royal Holloway, University of London, UK
  • Marcelo Carlomagno Carlos, Royal Holloway, University of London, UK

Programme Committee

  • Rose-Marie Åhlfeldt, Skövde University, Sweden
  • Haitham Al-Sinani, Royal Holloway, University of London, UK
  • Claudio Ardagna, Università degli Studi di Milano, Italy
  • Alessandro Armando, FBK, Italy
  • Bharat Bhargava, Purdue University, USA
  • Sonja Buchegger, Royal Institute of Technology, Sweden
  • David Chadwick, University of Kent, UK
  • Sara Foresti, Università degli Studi di Milano, Italy
  • Lothar Fritsch, Norwegian Computing Center, Norway
  • Steven Furnell, University of Plymouth, UK
  • Stefanos Gritzalis, University of the Aegean, Greece
  • Marit Hansen, Independent Centre for Privacy Protection Schleswig-Holstein, Germany
  • Hans Hedbom, Karlstad University, Sweden
  • Alejandro Hevia, Universidad de Chile, Chile
  • Jaap-Henk Hoepman, TNO and Radboud University Nijmegen, the Netherlands
  • Bart Jacobs, Radboud Universiteit, Netherlands
  • Lech Janczewski, University of Auckland, New Zealand
  • Ronald Leenes, Tilburg University, Netherlands
  • Javier Lopez, University of Malaga, Spain
  • Raj Muttukrishnan, City University, UK
  • Andreas Pashalidis, Katholieke Universiteit Leuven, Belgium
  • Aljosa Pasic, Atos Origin, Spain
  • Siani Pearson, Hewlett-Packard Laboratories, UK
  • Guenther Pernul, Regensburg University, Germany
  • Geraint Price, Royal Holloway, University of London, UK
  • Kai Rannenburg, Goethe University, Frankfurt, Germany
  • Anne Karen Seip, Kredittilsynet, Norway
  • Einar Snekkenes, Gjövik University College, Norway
  • Rama Subramaniam, Valiant Technologies, India
  • Pedro Veiga, University of Lisbon, Portugal
  • Jozef Vyskoc, VaF, Slovakia