[Apologies if you receive multiple copies; please forward this CfP to people who might be interested in this workshop] !!! EXTENDED SUBMISSION DEADLINE: 2011-06-24 !!! !!! Paper submissions via !!! International Workshop on Resilience and ICT for Secure Open Cities (ReISOC-2011) ================================================================================= - Call for Papers - To be held in conjunction with the 4th IEEE International Conference on Cyber, Physical and Social Computing - IEEE CPSCom 2011, Accepted papers will be included in the conference proceedings of IEEE CPSCom 2011 and published by IEEE Computer Society (EI indexed). Selected best papers will be recommended for publication in the special issue "Security and Privacy in Business Networking" of the international journal "Electronic Markets" published by Springer and in special issues of several SCI-indexed international journals. Submission deadline: 2011-06-24 ReISOC-2011 at IEEE CPSCom 2011: 2011-10-19 Submissions via ReISOC-2011 in the Web at Scope ----- Threats to cities and their critical/social infrastructures, e.g. natural disasters, crime, and terrorism, endanger human life directly and indirectly. Parts of social infrastructures won't be available due to damages. Both emergency response and recovery activities will be hindered, if not even be impossible. Resilience is gaining in importance as a core concept to cope with such threats. Resilience means strengthening social infrastructures to prevent or mitigate threats and its ultimate level would be immunity to such threats. Resilience is not only understood in terms of resistance against attacks and threats (i.e. prevent and protect) but also in terms of the ability to adapt social infrastructures to deal with threats and attacks (i.e. respond and recover). Information and communication infrastructure (ICT) in its vital role to enable communication and coordination is the primary part of social infrastructures and therefore one of the central objects of resilience research. When a threat becomes a reality, ICT still has to provide its services to rescue organizations and for catastrophe management. To ensure availability of ICT for affected social infrastructures, these ICT systems must be able to flexibly - or even autonomously - adapt to changing environments. Such flexibility implies granting access to services and data to an "outsider" and thereby making him or her an "insider" of the failed part of the affected social infrastructures. This opens an enormous potential of misuse and place challenges on security and privacy. For instance, controllability of data usage by the data owner is not given anymore leading to risks regarding confidentiality and integrity. Objective --------- ReISOC-2011 aims to identify further requirements and scientific challenges as well as to discuss novel idea, ongoing work, and best practices regarding ICT support for "Resilience and ICT for Secure Open Cities", in particular to Compliance, IT-Security, and Privacy. We encourage researchers and experts from industry to submit original, unpublished contributions addressing promising approaches to provide and manage resilient ICT infrastructures. Topics ------ Suggested topics, but not limited to, are: (a) Autonomic and Dependable Computing - Methods and Techniques for Self-Configuration, Self-Healing, Self-Protecting, etc. - Distributed Systems and Agents - Flexible and Secure Orchestration of ICT Services - Trustworthy Organic Computing (b) Risk and Vulnerability Analysis - Identification of Vulnerabilities in Service-Oriented Computing - Anomaly Detection - Risk Assessment Methods for Automated Business/Service Processes - Economics of Controls (c) Policy Specification Models and Languages - Matching of High-Level Policies with Security-related Execution Traces - Automatic Identification of Conflicts between Policies - Automatic Resolution of Policy Conflicts (d) Policy Enforcement Mechanisms - Algorithms to Forecast Vulnerabilities - Digital Forensics - Privacy in the Secondary Use of Personal Data - Observability of Control and Data Flows (e) Methods for Resilience & Best Practices - Recovery-oriented Computing - Resilience in the Internet - Resilience in Cryptographic and Communications Protocols - Business Continuity Plan and Business Continuity Management Important Dates --------------- 2011-06-24: Submission Deadline 2011-07-18: Author Notification 2011-08-26: Author Registration/Camera-ready Version 2011-10-19: ReISOC-2011 at IEEE CPSCom 2011 Conference Workshop Organizers ------------------- Isao Echizen National Institute of Informatics (NII), Japan Guenter Mueller Albert-Ludwig University Freiburg, Germany Stefan Sackmann Martin-Luther-University of Halle-Wittenberg, Germany Noboru Sonehara National Institute of Informatics (NII), Japan A Min Tjoa Vienna University of Technology, Austria Sven Wohlgemuth (Point of contact) National Institute of Informatics (NII), Japan wohlgemuth@nii.ac.jp Paper Submission ---------------- Papers submitted to ReISOC-2011 will be peer-reviewed by at least three different reviewers. Accepted papers will be included in the conference proceedings of IEEE CPSCom 2011 and published by IEEE Computer Society (EI indexed). Selected best papers will be recommended for publication in the special issue "Security and Privacy in Business Networking" of the international journal "Electronic Markets" published by Springer and in special issues of several SCI-indexed international journals. Successfully recommended workshop submissions should be revised and enhanced for publication in the journal. Submissions to the workshop should clearly state the research contribution, their relevance to the workshop, as well as their relation to prior research. Authors are invited to submit original, unpublished research papers limited to 6 pages following the IEEE CPSCom 2011 guidelines. Papers must be submitted electronically in PDF format through the online submission system at . Authors of accepted papers must sign a copyright statement and guarantee that their paper will be presented at the conference. Visa information can be obtained at . Program Committee (Tentative) ----------------------------- - Rafael Accorsi, Albert-Ludwig University Freiburg, Germany - Markus Aleksy, ABB Corporate Research, Germany - David Basin, ETH Zurich, Switzerland - Rainer Boehme, University of Muenster, Germany - Isao Echizen, National Institute of Informatics, Japan - Sandro Etalle, Technical University of Eindhoven, Netherlands - Bernd Heinrich, University of Innsbruck, Austria - Marlen Hofmann, Martin-Luther-University of Halle-Wittenberg, Germany - Dennis Kundisch, University of Paderborn, Germany - Javier Lopez, University of Malaga, Spain - Vashek Matyas, University of Brne, Czech Republic - Emanuella Merelli, University of Camerino, Italy - Guenter Mueller, Albert-Ludwig University Freiburg, Germany - Eiji Okamoto, University of Tsukuba, Japan - Hubert Oesterle, University of St. Gallen, Switzerland - Kai Rannenberg, Goethe University Frankfurt, Germany - Stefan Sackmann, Martin-Luther-University of Halle-Wittenberg, Germany - Kazue Sako, NEC Labs., Japan - Ryoichi Sasaki, Tokyo Denki University, Japan - Yoshinori Sato, Hitachi Yokohama Research Laboratory, Japan - Karsten Schulz, SAP Research, Australia - Ryosuke Shibasaki, University of Tokyo, Japan - Noboru Sonehara, National Institute of Informatics, Japan - Omer Tene, College of Management School of Law, Rishon Le Zion, Israel - A Min Tjoa, Vienna University of Technology, Austria - Edgar Weippl, Secure Business Austria, Austria - Sven Wohlgemuth, National Institute of Informatics, Japan - Rigo Wenning, W3C / ERCIM, France - Hiroshi Yoshiura, The University of Electro-Communications of Tokyo, Japan