[ID 2011] Springer International Workshop on Identity: Security, Management & Applications

2011 Springer International Workshop on Identity: Security, Management & Applications (ID 2011)

July 22-24, 2011, Kochi, Kerala, India 

http://www.acc-rajagiri.org/ID2011.html

***Proceedings will be published by Springer in the series of Communications in Computer and Information Science (CCIS) & papers will also be included in the CCIS Book Series hosted in the SpringerLink Digital Library***
-------------------------------------------------------------------------------------------------------
Paper Submission System Now Open

2011 Springer International Workshop on Identity ID 2011: Security, Management & Applications, is designated to meet with researchers, engineers and practitioners from academia, service providers, industry and government working on Identity-based Internet & infrastructure systems. ID 2011 aims to bring to forefront the recent trends in most significant technology topics such as Identity Management (IdM), Cloud Computing, Internet of Things (IoT), Service Oriented Architecture (SoA), Security & Privacy Systems, Access Management, Risk Management, and Role and Policy Management, etc in software, hardware and firmware applications running on private and public networks. ID 2011 is the first Indian international workshop edition in its kind and co-located with The First International Conference on Advances in Computing & Communications ACC 2011.

All the accepted papers will be published in the ACC 2011 conference proceedings. The proceedings of the conference will be published by Springer in the series of Communications in Computer and Information Science (CCIS). CCIS is abstracted/indexed in ISI Proceedings and Scopus. All the accepted papers will also be included in the CCIS Book Series hosted in the SpringerLink Digital Library. Authors can confirm the Springer Author Guidelines at the following web page: LNCS Format. We welcome submissions of papers for Springer ID 2011. The workshop’s topics of interest include (but are not limited to the following):

Digital Identity
----------------
Identity Services 
Identity Federation
Mobile Identity
Identity Theft
Directory Services & Virtual Directory
Virtual Identities
Web Identity
Identity-driven Security
Identity Architecture

Identity Management
-------------------------
User Provisioning Trends
Role Management
Policy Management
Rights management
Trust Management
Risk Management
Access Control & Management
Governance, Compliance and Risk (GCR)
Enterprise Single Sign-On (ESSO/SSO)
Architecture for IdM
Identity for Business Management
Software Agents & Identity Management
User Centric Identity Management
Business Centric Identity Management
Open Internet Identity Standards 
Fault Tolerance in Identity Management
Quality of Service and Quality of Experience in IdM

Cloud Computing
-----------------
Cloud Security 
Trends in Virtualization
Architecture for Cloud
Cloud Business Models
Cloud Services
Role of Identities in Cloud Computing
Privacy in Cloud

Service Oriented Architecture (SoA)
-----------------------------------
SOA Security
Service Oriented Solutions based on Identities
Identity Management & SOA
Identities for SOA & Security Internet of Things (IoT)
Trends in IoT
Identities & IoT
IoT Layers
Architecture for IoT
IoT & Business Challenges
Future of Internet
Internet Services 

Object Technology & Open Systems
--------------------------------
Open Systems & Identity
Object Oriented Identity Systems

Identity Communications & Services
-----------------------------------
Web 2.0 & Identity
Identity & Information and Communication Technology (ICT)
Social Networks & Identity
Mobile Communication Applications
Trends in Communication Services

Security & Privacy in Private and Public Networks
-------------------------------------------------
Identity Management Security Challenges
Identity Management Privacy Challenges 
Network & Information Privacy issues
Network Security
Identity & data security
End-to-end security
Authentication and Authorization
Security and privacy in P2P networks

Infrastructure Management Systems (IMS)
---------------------------------------
Trends in IMS
Identity-based IMS
IMS Innovations & Applications
Future IMS

Applications 
-------------
Identity in eHealth
Identity in eGovernment
Identity in Automotive & Manufacturing Industries
Identity in Banking & Finance
Identity & Sensor Network Applications
Identity-based Data Mining Techniques
Bio-metric Application
Identity & P2P Systems
Identity-based Soft Computing

PAPER SUBMISSION
ID 2011 is seeking original research work which is not yet published or not submitted in any other conferences, journals or magazines. All paper submissions for ID 2011 are handled through EDAS. Please see Author Information page for submission guidelines at ACC 2011 website. In case of any issues/problem in the submission of paper to ID 2011, please mail it to: iwid2011@gmail.com. Papers must be submitted electronically, in PDF or DOC format, on-line via the EDAS system (http://edas.info//N9559). 


Important Dates:
Full Paper Submission: March 24, 2011 EXTENDED
Acceptance Notification: March 15, 2011
Camera Ready Papers due: April 15, 2011
Registration Starts: March 18, 2011
Registration Closes: May 01, 2011
Conference: July, 22-24, 2011


Organizing Chair
ID 2011

0 σχόλια:

Post a Comment