[OpenID] ACM DIM 2009 - Submission due is set to June 12

Nachi Ueno ueno.nachi at lab.ntt.co.jp
Tue Apr 21 00:36:12 UTC 2009

(Sorry if you have received this already)

Please note that experience reports and case studies are welcome as well
as technical papers. We look forward to submissions from this community!

The Fifth ACM Workshop on Digital Identity Management
Call for Papers
November 13, 2009, Collocated with ACM CCS2009, Chicago, IL, USA

“Identity in a Changing World”

This workshop will explore critical issues concerning identity
management technologies for the information society. Identity management
is an endeavor for maintaining the integrity of identities through their
life cycle. It aims at making the identities available to services in a
secure and privacy protected manner. Digital identities play an
increasingly important role as the society depends more and more on
services provided over Internet. For example, solid identity management
practices are essential for implementing social welfare (e.g.,
healthcare and e-government), enabling secure service offering (e.g.,
cloud computing and Software as a Service), personalizing users'
experiences (e.g., e-commerce and entertainment), and connecting people
over networks (e.g., social networking and mobile communications).
Digital identity management must strike the best balance between
usability, security, and privacy. A number of identity solutions are
being proposed, each taking different approaches with different goals.
Existing solutions are not necessarily interoperable or complementary,
and sometimes overlap. Thus it is critical to lay foundations for a
holistic understanding of problem areas and synergetic approaches to
innovative solutions, such as guidelines, methodologies, and tools.
The workshop seeks submissions from diverse communities, such as social
networking, open source projects, standardization fora, governments,
system & security administrators, software engineers, and corporate &
academic researchers. Topics of interest include, but are not limited to:

- Identity life cycle
- Networking social networks
- Identity data portability
- Identity assurance compatibility
- Identity in cloud computing
- Identity management for software-as-a-service (SaaS)
- Identity Governance
- Identity management for mobile and ubiquitous computing
- Novel approach to identity management interoperability
- Privacy enhancement
- Identity solutions for specific areas (e.g., health care, government,
and education)
- Trust negotiation
- Comparative analysis of RESTful vs SOAP approaches
- Reputation management
- Attribute aggregation
- Identity discovery
- Identity theft prevention
- Mash-up security
- Identity metasystem
- User experience integrity
- Gap analysis of different identity management technologies
- Standards harmonization
- Experience reports on identity management practices
- Case studies and lessons from large scale deployment
- Vulnerabilities, threat analysis and risk assessment of IDM solutions
- Identity Analytics: analysis, modeling and simulation applied to IDM
- IDM for critical infrastructure

The goal of this workshop is to share the latest findings, identify key
challenges, inspire debates, and foster collaboration between industries
and academia towards interoperable identity service infrastructures.

Submission Instructions:
Submitted papers must not substantially overlap with papers that have
been published or that are simultaneously submitted to a journal or a
conference with proceedings. Papers should be at most 10 pages, using at
least 10.5-point font and reasonable margins on A4 or US letter-size
paper (8.5 inch x 11 inch). Committee members are not required to read
the appendices, and so submissions should be intelligible without them.
Each submission should start with the title, abstract, and names and
contact information of authors. The introduction should give background
and summarize the contributions of the paper at a level appropriate for
a non-specialist reader. Authors of accepted papers must guarantee that
their paper will be presented at the workshop.

Important Dates:
Paper submission due : June 12, 2009
Notification: July 24, 2009
Camera-ready: August 25, 2009
Workshop date: Novembre 13, 2009
(ACM CCS 2009: November 9 - 13, 2009)

Elisa Bertino, Purdue University, USA
Thomas Gro?, IBM Research, Switzerland
Kenji Takahashi, NTT, Japan

Program Committee:
Gail-Joon Ahn, Arizona State University, USA
James Backhouse, London School of Economics, UK
Abhilasha Bhargav-Spantzel, Intel, USA
Hu Bin, Motorola, USA
Doug Blough, Georgia Tech, USA
Jan Camenisch, IBM Research, Switzerland
Feng Cao, Cisco, USA
Marco Casassa Mont, HP Labs, UK
David Chadwick, University of Kent, UK
Chihung Chi, Tsinghua University, China
Rachna Dhamija, Harvard University, USA
Hidehito Gomi, Yahoo! Japan Research, Japan
Weili Han, Fudan University, China
Seung-Hyun Kim, ETRI, Korea
Brian LaMacchia, Microsoft, USA
Hyung-Jin Lim, Financial Security Agency, Korea
Howard Lipson, CERT, USA
Paul Madsen, NTT, Canada
Eve Maler, Sun Microsystems, USA
Toshihiko Matsuo, NTT Data, Japan
Piotr Pacyna, AGH Univ. of Science and Technology, Poland
Andreas Pfitzmann, Dresden University of Technology, Germany
Rakesh Radhakrishnan, Sun Microsystems, USA
Amardeo Sarma, NEC Laboratories Europe, Germany
Diana Smetters, PARC, USA
Anna C. Squicciarini, Pennsylvania State Univ., USA
Tsuyoshi Takagi, Future University - Hakodate, Japan
Jo"rg Schenk, Ruhr-University Bochum, Germany

For further information:
Write to dim2009-chairs_at_lab.ntt.co.jp or visit

More information about the general mailing list