You are on page 1of 3

Call for Papers

2nd IFIP WG 11.6 Working Conference


on
Policies & Research in Identity Management (IDMAN’10)

in Cooperation with

The Norwegian Computing Center


Oslo / Norway, 18 – 19 November 2010

Conference scope

The world of the 21st century is, more than ever, global and impersonal. Criminal and terrorist threats,
both physical and on the internet, increase by the day. The demand for better methods of identification
is growing, not only in companies and organisations but also in the world at large.

Identity management is put under pressure, due to the growing number of frauds who want to hide
their true identity. Identity management challenges the information security research community to
focus on interdisciplinary and holistic approaches while retaining the benefits of previous research
efforts.

As part of this tendency, surveillance and monitoring are more prominently present in society, both in
the public and private domain. The original intention being to contribute to security and safety,
surveillance and monitoring might, in some cases, have unintended or even contradictory effects.
Besides, the omnipresence of surveillance and monitoring systems might be at daggers drawn with
public and democratic liberties.
Subjects

Papers offering research contributions focusing on identity management in general and surveillance
and monitoring in particular are solicited for submission to the 2nd IFIP WG-11.6 International
Conference on Identity Management.

Papers may present theory, applications or practical experiences in the field of national identity
management, from both a technical and a social perspective, including, but not necessarily limited to:
- History
- Law
- Philosophical and ethical aspects
- Economics

- Impact of surveillance and monitoring in both the physical world and in cyberspace
- Impact on society and politics
- Impact on e-government and e-government applications
- Consecutive developments in social tracking, -tracing and -sorting

- Quality of identity management in general


- Quality identity data, processes and applications
- Security and identity management
- User centered, usable and inclusive identity management
- Attacks on identity management infrastructure and procedures

- Central storage of general and biometric identity data


- Effectiveness of surveillance and monitoring in fighting terrorism, international crime and
human trafficking

- Methods of identification and authentication


- Models of identification procedures
- Models of inclusive identification and authentication procedures
- Government PKI
- (Possible) role of pseudonymous and anonymous identity in identity management
- Electronic Ids

- European and worldwide policies and cooperation in the field of identity management and
surveillance and monitoring
- (Inter)national policies on unique identifiers /social security numbers / personalisation IDs
- (Inter)national applications of biometrics
- Vulnerabilities of electronic identification protocols
- Federative identity management and de-perimetrization
- Fraud, fraud detection, fraud resistence of technologies
- Biometric verification, assurance, metrics and measurements
- Fraud resistance of biometrics
- Junction between (large scale) applications of identity management and surveillance and
monitoring

- Data Protection
- Privacy and Privacy Enhancing Technologies (PETs) in identity management
- Privacy Intrusion Technologies (PITs) in identity management
- - Privacy side-effects and privacy risks assessment of identity management

- Intelligence and (inter)national threats


- Impersonation, identity fraud, identity forge and identity theft
- Tracing, monitoring and forensics
Instructions for paper submission
Submitted papers must be original, unpublished, and not submitted to another conference or journal
for consideration of publication. Papers must be written in English; they should be at most 12 pages
long in total. Accepted papers will be presented at the conference and published in the conference
proceedings by the official IFIP publisher Springer Science and Business Media. At least one author of
each accepted paper is required to register with the conference and present the paper. Papers must be
submitted in electronic form through the web. Detailed instructions for electronic submission and
author instructions will follow at http://ifipidman2010.nr.no/ifipidman2010/index.php5/Main_Page .

Important dates
Submission of papers: January 15, 2010
Notification to authors: March 15, 2010
Camera-ready copies: June 30, 2010

Conference General Chair


Elisabeth de Leeuw, TopForce B.V., Rotterdam, The Netherlands

Programme Committee co-Chairs


Simone Fischer-Hübner, Karlstad University, Sweden
Lothar Fritsch, Norwegian Computing Center, NR, Norway
Alina Stan, Capgemini, The Netherlands

Publication Chair
John Borking, Borking Consultancy, The Netherlands

Program Committee
Claudio Agostino Ardagna, Università degli Studi di Milano, Italy
Bill Caelli, Information Security Institute, Queensland University of Technology, USA
Gurpeet Dhillon, School of Business, Virginia Commonwealth University, USA
Sara Foresti, Università degli Studi di Milano, Italy
Steven Furnell, Communications & Network Research University of Plymouth, UK
Dimitris Gritzalis, Department of Informatics, Athens University of Economics and Business, Greece
Stefanos Gritzalis, University of the Aegean, Greece
Marit Hansen, Independent Centre for Privacy Protection Schleswig-Holstein, Germany
Alejandro Hevia, Dept. of Computer Science, Facultad de Ciencias Fisicas y Matematicas,
Universidad de Chile
Jaap-Henk Hoepman, Radboud Universiteit, Nijmegen, The Netherlands
Gus Hosein, Department of Management Information Systems and Innovation Group, London School
of Economics, UK
Bart Jacobs, Radboud Universiteit, Nijmegen, The Netherlands
Lech Janczewki, Information Systems & Operations Management, University of Auckland, New
Zealand
Ronald Leenes, TNO / Radboud University Nijmegen, The Netherlands
Javier Lopez, Computer Science Department, University of Malaga, Spain
Aljosa Pasic, Atos Origin, Madrid, Spain
Anne Karen Seip, Kredittilsynet, Oslo, Norway
Rama Subramaniam, Valiant Technologies, Chennai, India
Pedro Veiga, University of Lisbon, Portugal
Jozef Vyskoc, VaF, Rovinka, Slovak Republic

You might also like