CHI-ANNOUNCEMENTS Archives

ACM SIGCHI General Interest Announcements (Mailing List)

CHI-ANNOUNCEMENTS@LISTSERV.ACM.ORG

Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Condense Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Content-Type:
text/plain; charset="utf-8"
Date:
Mon, 30 Mar 2015 14:17:57 +0200
Reply-To:
Sven Wohlgemuth <[log in to unmask]>
Subject:
MIME-Version:
1.0
Message-ID:
Content-Transfer-Encoding:
quoted-printable
Sender:
"ACM SIGCHI General Interest Announcements (Mailing List)" <[log in to unmask]>
From:
Sven Wohlgemuth <[log in to unmask]>
Parts/Attachments:
text/plain (152 lines)
I apologize should you receive multiple copies of this message.

 

===================

Extended submission deadline: April 22, 2015
===================

 

===================
Call for Papers
The Fifth International Workshop on Resilience and IT-Risk in Social Infrastructures  (RISI 2015)
 <http://www.ares-conference.eu/conference/workshops/risi-2015/> http://www.ares-conference.eu/conference/workshops/risi-2015/

 

To be held in conjunction with the 10th International Conference on Availability, Reliability and Security (ARES 2015 –  <http://www.ares-conference.eu> http://www.ares-conference.eu)

 

August 24 – 28, 2015
Université Paul Sabatier 
Toulouse, France
===================

 

Resilience gains importance for sustainable welfare of societies with respect to their acceptable adaption to interferences of all kind. In order to prepare for expected interferences and to response to unexpected, inevitable interferences in real-time, current initiatives in computer science and business & information systems engineering aim to analyze huge amount of data from public and private domains and to share derived information with adaptive information systems, e.g. social networks. 

 

Realizing adequate and shared IT services implies availability of sufficient authentic, partly personal data from different origins, their aggregation, and secondary use. These services are "data-centric" by definition. One main challenge to be solved for achieving reliable data-centric services within acceptable risks is cross-domain processing of (personal) data in compliance to law, business rules, and social norms. Whereas many security solutions are well studied for models and their implementation for separated security domains, this is not the case for data-centric services and adaptive information systems. 

 

The aim of the RISI 2015 workshop is to discuss risk scenarios with data-centric services and approaches for improving "Resilience in Social Infrastructures" as well as the necessity to take non-technical aspects into consideration. We encourage academic researchers and industry experts to present and discuss novel ideas and ongoing work. Contributions addressing promising approaches to provide and manage resilient infrastructures with data-centric services are invited as research in progress and best practices.

 

===================
Topics of interest include but are not limited to:
===================

 

Risk assessment and vulnerability analysis for data-centric services
* Economics of controls
* Risk measurements and controlling 
* Identification of vulnerabilities 
* Methods of Business Intelligence 
* Management of data quality 
* Risk scenarios 

 

Policy and IT security management for data-centric services
* Authentication, authorization, and accounting
* Policy management for processing of personal data 
* Policy enforcement vs. monitoring and their risks 
* Anonymity/pseudonymity 
* Legal implications of data-centric services and security mechanisms

 

Methods for resilience & best practices
* Privacy and security in participatory sensing
* Critical information infrastructure protection
* Human-centric resilience systems
* Measurements of resilience
* Case studies

 

===================
Important Dates
===================

 

Submission Deadline   April 22, 2015 (EXTENDED)
Author Notification   May 11, 2015
Proceedings Version   June 8, 2015
Conference    August 24 – 28, 2015

 

===================
Submission Guidelines
===================

 

The submission guidelines valid for the workshop are the same as for the ARES conference. They can be found at  <http://www.ares-conference.eu> http://www.ares-conference.eu

 

===================
Organizing Committee
===================

 

* Isao Echizen
National Institute of Informatics, Japan
 <mailto:[log in to unmask]> [log in to unmask]
* Stefan Sackmann
Martin-Luther University Halle-Wittenberg, Germany
 <mailto:[log in to unmask]> [log in to unmask]
* Sven Wohlgemuth
 <mailto:[log in to unmask]> [log in to unmask]

 

===================
Program Committee (tbc)
===================

 

* Mathias Fischer, International Computer Science Institute, USA
* Koichiro Hayashi, Institute of Information Security Yokohama, Japan
* Ioannis Krontiris, Huawei Technologies, Germany
* Hiroshi Maruyama, Institute of Statistical Mathematics, Japan
* Leonardo Mostarda, University of Camerino, Italy
* Andreas Peter, University of Twente, Netherlands
* Heiko Roßnagel, Fraunhofer IAO, Germany
* Ryoichi Sasaki, Tokyo Denki University, Japan
* Christian Schaefer, Ericsson AB Research, Sweden
* Stephan Sigg, Georg-August University Göttingen, Germany
* Ali Sunyaev, University of Cologne, Germany
* Kazuo Takaragi, National Institute of Advanced Industrial Science and Technology, Japan
* Edgar Weippl, Secure Business Austria, Austria
* Rigo Wenning, W3C/ERCIM, France
* Hideki Yoshii, Softbank Telecom Corp., Japan
* Hiroshi Yoshiura, The University of Electro-Communications of Tokyo, Japan
* Christian Zimmermann, Albert-Ludwigs University Freiburg, Germany
* Alf Zugenmaier, University of Applied Sciences Munich, Germany
​


    ---------------------------------------------------------------
    For news of CHI books, courses & software, join CHI-RESOURCES
     mailto: [log in to unmask]

    To unsubscribe from CHI-ANNOUNCEMENTS send an email to
     mailto:[log in to unmask]

    For further details of CHI lists see http://listserv.acm.org
    ---------------------------------------------------------------

ATOM RSS1 RSS2