February 2, 2016

TELERISE 2016 Call for Papers

estimated reading time: 2 minutes and 10 seconds.

I’m pleased to be a member of the program committee for TELERISE 2016, a workshop on technical and legal aspects of data privacy and security. Here’s an overview of the workshop:

Information sharing on the Web is essential for today’s business and societal transactions. Nevertheless, such a sharing should not violate the security and privacy requirements either dictated by Law to protect data subjects or by internal regulations provided both at organisation and individual level. An effectual, rapid, and unfailing electronic data sharing among different parties, while protecting legitimate rights on these data, is a key issue with several shades. Among them, how to translate the high-level law obligations, business constraints, and users’ requirements into system-level privacy policies, as well as engineering efficient and practical Web applications-based solutions for policy definition and enforcement. TELERISE aims at providing a forum for researchers and engineers, in academia as well as in industry, to foster an exchange of research results, experiences, and products in the area of privacy preserving, secure data management, and engineering on the Web, from a technical and legal perspective. The ultimate goal is to conceive new trends and ideas on designing, implementing, and evaluating solutions for privacy-preserving information sharing, with an eye to the cross-relations between ICT and regulatory aspects of data management and engineering.

The list of topics includes (but it is not limited to):

  • Model-based and experimental assessment of data protection
  • Privacy in identity management and authentication
  • Modeling and analysis languages for representation, visualization, specification of legal regulations
  • Technical, legal, and user requirements for data protection
  • User-friendly authoring tools to edit privacy preferences
  • IT infrastructures for privacy and security policies management
  • IT infrastructure for supporting privacy and security policies evolution
  • Privacy and security policies conflict analysis and resolution strategies
  • Electronic Data Sharing Agreements representation: languages and management infrastructure
  • Cross-relations between privacy-preserving technical solutions and legal regulations
  • Privacy aware access and usage control
  • Privacy and security policies enforcement mechanisms
  • Privacy preserving data allocation and storage
  • Software systems compliance with applicable laws and regulations
  • Heuristic for pattern identification in law text
  • Empirical analysis of consumer’s awareness of privacy and security policies

Papers are due March 23rd. Accepted submissions will be published as a post-proceeding event in Springer’s Lecture Notes in Computer Science (LNCS) series.