SIMICE 2017: The 3rd IEEE International COMPSAC Workshop on Secure Identity Management in the Cloud Environment

IEEE SIMICE 2017

Computer Security & Cryptography Security & Trust & Testing



Workshop organizer(s):
Bian Yang, Norwegian University of Science and Technology, Norway (E-mail: bian.yang (at) ntnu.no)
Julien Bringer, Safran Identity & Security, France
 (E-mail: julien.bringer (at) safrangroup.com)
Hideaki Goto, Tohoku University, Japan (E-mail: hgot (at) cc.tohoku.ac.jp)
Goal of the workshop:
While identity management solutions are increasingly migrating to cloud, conventional identity management approaches are facing challenges in trust, security, privacy, computational efficiency, interoperability, and service reliability in the cloud environment. Security concerns are reportedly among the biggest inhibitors holding back the wider adoption of cloud computing in this domain. Secure identity management, required by emerging cloud services as well as existing federated services or newest distributed technologies, is receiving increasing attention from both service providers' and end users' perspectives, in terms of protection of enterprise assets and customers’ privacy in the cloud, respectively. This workshop solicits contributions describing state-of-the-art methodology and technology innovations in the field of secure identity management in the cloud computing environment, encourages experience sharing (both positive and negative ones), and also welcomes disruptive work-in-progress ideas towards future concepts.
Workshop theme:
The workshop is dedicated to the security and privacy aspects of identity management (IDM) in the cloud. Topics are articulated around several important themes as "concept design", "enabling technologies", "federated identities" and "applications". It is expected they will attract both theoretical and empirical works from the IDM society and the cloud computing society.
Scope of the workshop:
Any submission whose content is relevant to the area of secure identity management in the cloud environment will be considered, but any submission whose subject matter is related to one of the following topics will be particularly welcome. Practically-oriented approaches will also be appreciated.
identity-based access control and remote personal data management (authentication, authorization, accounting and access management, single sign on for Web services and non-web applications)
data processing and analysis in a protected domain for personal data management
service-oriented architecture for IDM in cloud, e.g. identity authentication outsourcing
identity federations & trust fabrics (technologies and policies); federation of identities in roaming scenario
new concept design of IDM towards cloud (e.g. distributed ledger-based)
technologies for enhancing privacy and security of customer data and social media (biometrics, multi-factor authentication, mobile devices)
security and privacy enhanced databases and directory services
Secure messaging, digital signature, and encryption; PKI architecture, Security Policy, and operation method
Big data/Cloud/GRID access control and privacy protection
applications, e.g. cross-border IDM, security and privacy enhanced IDM for eCommerce, 
eCitizen, and eHealth in cloud
privacy and security evaluation for IDM services in cloud and case study of security breaches of IDM in cloud
Program Committee:
Erik-Oliver Blass (Airbus Group Innovations, Germany)
Julien Bringer (Safran Identity & Security, France)
Martin Gilje Jaatun (SINTEF, Norway)
Hideaki Goto (Tohoku University, Japan)
Thomas Kemmerich (Norwegian Information Security Laboratory, Norway)
Atsushi Kanai (Hosei University, Japan)
Els Kindt (KU Leuven, Belgium)
Qiong Li (Harbin Institute of Technology, China)
Mikael Linden (CSC, Finland)
Diego R. Lopez (Telefonica I+D, Spain)
Suhaimi Napis (Universiti Putra Malaysia, Malaysia)
Yasuo Okabe (Kyoto University, Japan)
Christian Rathgeb (Hochschule Darmstadt, Germany)
Hiroyuki Sato (The University of Tokyo, Japan)
Muhammad Farhan Sjaugi (Perdana University, Malaysia)
Chik-How Tan (National University of Singapore, Singapore)
Shigeaki Tanimoto (Chiba Institute of Technology, Japan)
Per Thorsheim (God Praksis AS, Norway)
Bian Yang (Norwegian Information Security Laboratory, Norway)