Overview
Information sharing on the Web is essential for today's business and societal transactions. Nevertheless, such a sharing should not violate the security and privacy requirements either dictated by Law to protect data subjects or by internal regulations provided both at organisation and individual level. An effectual, rapid, and unfailing electronic data sharing among different parties, while protecting legitimate rights on these data, is a key issue with several shades. Among them, how to translate the high-level law obligations, business constraints, and users' requirements into system-level privacy policies, as well as engineering efficient and practical Web applications-based solutions for policy definition and enforcement. TELERISE aims at providing a forum for researchers and engineers, in academia as well as in industry, to foster an exchange of research results, experiences, and products in the area of privacy preserving, secure data management, and engineering on the Web, from a technical and legal perspective. The ultimate goal is to conceive new trends and ideas on designing, implementing, and evaluating solutions for privacy-preserving information sharing, with an eye to the cross-relations between ICT and regulatory aspects of data management and engineering.
The list of topics includes (but it is not limited to):
- Model-based and experimental assessment of data protection
- Privacy in identity management and authentication
- Modeling and analysis languages for representation, visualization, specification of legal regulations
- Technical, legal, and user requirements for data protection
- User-friendly authoring tools to edit privacy preferences
- IT infrastructures for privacy and security policies management
- IT infrastructure for supporting privacy and security policies evolution
- Privacy and security policies conflict analysis and resolution strategies
- Electronic Data Sharing Agreements representation: languages and management infrastructure
- Cross-relations between privacy-preserving technical solutions and legal regulations
- Privacy aware access and usage control
- Privacy and security policies enforcement mechanisms
- Privacy preserving data allocation and storage
- Software systems compliance with applicable laws and regulations
- Heuristic for pattern identification in law text
- Empirical analysis of consumer's awareness of privacy and security policies
Welcome domains of application are (but may not limited to):
- Healthcare
- Telecommunication and Networks
- Cloud Computing and Web Services
- Mobile Devices
- Video Suirvellance
- Smart Grid, Smart Cities, and Smart Spaces
- Public Administration
- Finance & Business
- Social Networks
Keynote Speaker
We are honoured to announce that the keynote will be given by Benoit Van Asbroeck , Bird & Bird, Belgium.Title and Abstract. To be Announced Soon.
Important dates (All deadlines are 23h59, Hawaii Time):
Submission deadline for paper: | 30/03/2016 (EXTENDED) |
Notification of authors: | 29/04/2016 |
Camera-ready copy due: | 13/05/2016 |
Author Registration date: | 18/05/2016 |
Workshop date: | 09/06/2016 |
Camera-ready (post proceedings): | 24/06/2016 |
Workshop Organizers:
- Ilaria Matteucci, IIT-CNR, Italy
- Paolo Mori, IIT-CNR, Italy
- Marinella Petrocchi, IIT-CNR, Italy
Program Committee:
- Benjamin Aziz, University of Portsmouth, UK
- Gianpiero Costantino, IIT-CNR, Italy
- Vittoria Cozza, IIT-CNR, Italy
- Francesco Di Cerbo, SAP Labs, France
- Ioanna Dionysiou, University of Nicosia, Cyprus
- Carmen Fernandez Gago, University of Malaga, Spain
- Sorren Hanvey, Lero - The Irish Software Research Centre, Limerick, Ireland
- Kuan Hon, Queen Mary University, UK
- Jens Jensen, STFC, UK
- Erisa Karafili, Imperial College London, UK
- Mirko Manea, Hewlett Packard Enterprise, Italy
- Aaron Massey, University of Maryland, Baltimore County, US
- Kevin McGillivray, Dept. of Private Law, University of Oslo, Norway
- Roberto Sanz Requena, Grupo Hospitalario Quiron, Spain
- Andrea Saracino, IIT-CNR, Italy
- Daniele Sgandurra, Imperial College London, UK
- Jatinder Singh, Computer Laboratory, University of Cambridge, UK
- Debora Stella, Bird&Bird, Italy
- Slim Trabelsi, SAP Labs, France
Submission
Submitted papers must be written in English and must contain results that have not previously published nor concurrently submitted to a journal or conference with published proceedings. Any partial overlap with any published or concurrently submitted paper must be clearly indicated. Submissions are limited to 12 pages and must be formatted according to the information for Springer LNCS authors and submitted in PDF. Papers must be submitted electronically through EasyChair at https://easychair.org/conferences/?conf=telerise2016 .Publication
The selection of contributions will be based on peer-review by the Programme Committee. All accepted papers will be published by Springer in a single joint ICWE 2016 Workshop post-proceedings in Lecture Notes in Computer Science (LNCS). It is required that each accepted paper be presented at the workshop by one of its authors. Authors of accepted papers are required to submit the final, camera-ready versions of their papers (in LNCS format), including an electronic version as specified in the authors' instructions. Accepted contributions will be included into the ICWE 2016 Workshop post-proceedings published by Springer, including all workshop papers.Program
- 9:00-10:30 Session 1. Security and Privacy Aspects
- 09:00-09:30 Harald Gjermundrod, Ioanna Dionysiou and Kyriakos Costa. privacyTracker: A Privacy-by-Design GDPR-Compliant Framework with Verifiable Data Traceability Controls.
- 09:30-10:00 Daniel Schougaard, Nicola Dragoni, and Angelo Spognardi. Evaluation of Professional Cloud Password Management Tools.
- 10:00-10:30 Neil Ayeb, Francesco Di Cerbo, and Slim Trabelsi. Enhancing Access Control Trees for Cloud Computing.
- 10:30-11:00 Coffee Break
- 11:00-13:00 Session 2. Legal Aspects
- 11:00-12:00 Keynote. Benoit Van Asbroeck
- 12:00-12:30 Kevin Mcgillivray, Samson Esayas, and Tobias Mahler. Is a Picture Worth a Thousand Terms? Visualising Contract Terms and Data Protection Requirements for Cloud Computing Users.
- 12:30-13:00 Francesca Mauro and Debora Stella. A brief Overview of the legal instruments and the related limits for sharing data while complying with the EU Data Protection Law.
- 13:00-14:00 Lunch and End of the Workshop
Contact
For any question, please contact the organizing committee.
Acknowledgement
The workshop is supported by the FP7-EU Project CoCo-Cloud: Confidential and Compliant Clouds funded by the European Commission under the grant n°610853