ACM SIGCHI General Interest Announcements (Mailing List)


Options: Use Classic View

Use Proportional Font
Show HTML Part by Default
Condense Mail Headers

Topic: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Content-Type: text/plain; charset="Windows-1252"
Date: Thu, 29 Jan 2015 12:31:25 +0100
Reply-To: Sven Wohlgemuth <[log in to unmask]>
MIME-Version: 1.0
Message-ID: <[log in to unmask]>
Content-Transfer-Encoding: quoted-printable
Sender: "ACM SIGCHI General Interest Announcements (Mailing List)" <[log in to unmask]>
From: Sven Wohlgemuth <[log in to unmask]>
Parts/Attachments: text/plain (35 lines)
(I apologize if you receive multiple copies of this message)
Please let me draw your attention on the CfP of the 5th workshop on "Resilience and IT-Risk in Social Infrastructures (RISI)". #RISI15 is part of the @ARES_Conference series, which will take place in Toulouse, France. Please find the CfP below and at 
The RISI team would be grateful if you could please forward this CfP through your networks and encourage submission.
Sincerely yours,Sven Wohlgemuth
on behalf of the RISI organization teamIsao Echizen, Stefan Sackmann, Sven Wohlgemuth

===================Call for PapersThe Fifth International Workshop on Resilience and IT-Risk in Social Infrastructures  (RISI 2015)
To be held in conjunction with the 10th International Conference on Availability, Reliability and Security (ARES 2015 –
August 24 – 28, 2015Université Paul Sabatier Toulouse, France===================
Resilience gains importance for sustainable welfare of societies with respect to their acceptable adaption to interferences of all kind. In order to prepare for expected interferences and to response to unexpected, inevitable interferences in real-time, current initiatives in computer science and business & information systems engineering aim to analyze huge amount of data from public and private domains and to share derived information with adaptive information systems, e.g. social networks. 
Realizing adequate and shared IT services implies availability of sufficient authentic, partly personal data from different origins, their aggregation, and secondary use. These services are "data-centric" by definition. One main challenge to be solved for achieving reliable data-centric services within acceptable risks is cross-domain processing of (personal) data in compliance to law, business rules, and social norms. Whereas many security solutions are well studied for models and their implementation for separated security domains, this is not the case for data-centric services and adaptive information systems. 
The aim of the RISI 2015 workshop is to discuss risk scenarios with data-centric services and approaches for improving "Resilience in Social Infrastructures" as well as the necessity to take non-technical aspects into consideration. We encourage academic researchers and industry experts to present and discuss novel ideas and ongoing work. Contributions addressing promising approaches to provide and manage resilient infrastructures with data-centric services are invited as research in progress and best practices.
===================Topics of interest include but are not limited to:===================
Risk assessment and vulnerability analysis for data-centric services* Economics of controls* Risk measurements and controlling * Identification of vulnerabilities * Methods of Business Intelligence * Management of data quality * Risk scenarios 
Policy and IT security management for data-centric services* Authentication, authorization, and accounting* Policy management for processing of personal data * Policy enforcement vs. monitoring and their risks * Anonymity/pseudonymity * Legal implications of data-centric services and security mechanisms
Methods for resilience & best practices* Privacy and security in participatory sensing* Critical information infrastructure protection* Human-centric resilience systems* Measurements of resilience* Case studies
===================Important Dates===================
Submission Deadline	  April 1, 2015Author Notification	  May 11, 2015Proceedings Version	  June 8, 2015Conference		          August 24 – 28, 2015
===================Submission Guidelines===================
The submission guidelines valid for the workshop are the same as for the ARES conference. They can be found at
===================Organizing Committee===================
* Isao EchizenNational Institute of Informatics, [log in to unmask]* Stefan SackmannMartin-Luther University Halle-Wittenberg, [log in to unmask]* Sven WohlgemuthCASED, Intel Collaborative Research Institute for Secure Computing (ICRI-SC), TU Darmstadt, [log in to unmask]
===================Program Committee (tbc)===================
* Mathias Fischer, International Computer Science Institute, USA* Koichiro Hayashi, Institute of Information Security Yokohama, Japan* Ioannis Krontiris, Huawei Technologies, Germany* Hiroshi Maruyama, Institute of Statistical Mathematics, Japan* Leonardo Mostarda, University of Camerino, Italy* Andreas Peter, University of Twente, Netherlands* Heiko Roßnagel, Fraunhofer IAO, Germany* Ryoichi Sasaki, Tokyo Denki University, Japan* Christian Schaefer, Ericsson AB Research, Sweden* Stephan Sigg, Georg-August University Göttingen, Germany* Ali Sunyaev, University of Cologne, Germany* Kazuo Takaragi, National Institute of Advanced Industrial Science and Technology, Japan* Edgar Weippl, Secure Business Austria, Austria* Rigo Wenning, W3C/ERCIM, France* Hideki Yoshii, Softbank Telecom Corp., Japan* Hiroshi Yoshiura, The University of Electro-Communications of Tokyo, Japan* Christian Zimmermann, Albert-Ludwigs University Freiburg, Germany* Alf Zugenmaier, University of Applied Sciences Munich, Germany
    For news of CHI books, courses & software, join CHI-RESOURCES
     mailto: [log in to unmask]

    To unsubscribe from CHI-ANNOUNCEMENTS send an email to
     mailto:[log in to unmask]

    For further details of CHI lists see