TELERISE: 3rd International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity
Affiliated workshop with SAFECOMP 2017
Trento, Italy, September 12, 2017


NEW: The Keynote Speaker is Francesco Di Cerbo, SAP Labs, France

NEW: The Workshop Program is now Available!

Overview

Information sharing is essential for today’s business and societal transactions. Nevertheless, such a sharing should not violate the security and privacy requirements either dictated by Law to protect data subjects or by internal regulations, which can be provided both at the organisation and at the individual level. An effectual, rapid, and unfailing electronic data sharing among different parties, while protecting legitimate rights on these data, is a key issue with several shades. Among them, how to translate the high-level law obligations, business constraints, and users’ requirements into system-level security and privacy policies, and how to engineer efficient and practical technical solutions for policy definition and enforcement. TELERISE aims at providing a forum for researchers and technicians from the legal and the IT disciplines, both in academia and industry, to foster an exchange of research results, experiences, and products in the area of privacy-preserving and secure data management, as well as, safety aspects in data management systems. The ultimate goal is to conceive new trends and ideas on designing, implementing, and evaluating solutions for safe, reliable, and compliant information sharing, with an eye to the cross-relations between ICT and regulatory aspects of data management.

The list of topics includes (but it is not limited to):

Welcome domains of application are (but may not limited to):

Important dates:

Submission deadline for paper: 10/05/2017 22/05/2017 (EXTENDED DEADLINE)
Notification of authors: 31/05/2017 06/06/2017
Camera-ready copy due: 12/06/2017
Workshop date: 12/09/2017

Keynote Speaker

Francesco Di Cerbo, SAP Labs, France

Title.. Public Disclosure of Cyber Threat Information: Risks and Benefits

Abstract. A growing number of actors perpetrate cyber attacks to various targets, be them public entities, ISPs, enterprises or citizens. Supported by governments or aiming at criminal activities, attackers dispose of channels for sharing and obtaining undisclosed vulnerabilities, attack toolkits and information. On the other hand, attack targets need to react quickly and effectively but they risk to be alone if they do not join forces with others. However timely reactions depend on the quality and timeliness of interactions among peers (e.g., CERTs, public security bodies, ISPs, service providers). There is a need for automated cyber information preparation, sharing and consumption, being fulfilled by initiatives like CybOX, STIX, Taxii, and MISP. However, concerns exist, related to confidential details withing cyber threat information reports, their usage as well as potential data protection laws violations. These constraints render the actual collaboration quite limited in terms of scope. A number of initiatives are focussing on CTI sharing, tackling the most significant obstacles and aiming at bringing benefits to all stakeholders involved in the process. In the talk, risks and benefits will be presented, together with an overview of existing initiatives active in the field.

Workshop Organizers:

Program Committee:

Submission

Submitted papers must be written in English and must contain results that have not previously published nor concurrently submitted to a journal or conference with published proceedings. Any partial overlap with any published or concurrently submitted paper must be clearly indicated. Submissions, as pdf files, are limited to 12 pages. They should follow Springer LNCS submission guidelines and submitted in PDF. Papers must be submitted electronically through EasyChair at https://easychair.org/conferences/?conf=telerise17 .

Publication

The selection of contributions will be based on peer-review by the Programme Committee. All accepted papers will be published by Springer in a single joint SAFECOMP 2017 Workshop Proceedings in Lecture Notes in Computer Science (LNCS). It is required that each accepted paper be presented at the workshop by one of its authors. Authors of accepted papers are required to submit the final, camera-ready versions of their papers following the LNCS guidelines ).

Program

Contact

For any question, please contact the telerise2017@iit.cnr.it.