CALL FOR PAPERS
International Conference on Security and Identity Management (SIM) – 2009 Sponsored by Research Council of UK (RCUK) May 11‐12, 2009 Indian Institute of Management, Ahmedabad Description and Objectives The digital economy is burgeoning. Organizations and individuals are gearing up to make optimum utilization of the benefits, which can be expected to be derived through a digital economy. However, there is a critical concern, which is bothering all stakeholders of the digital economy i.e. identity and information theft by digital hackers. This international conference is an integral part of the UK‐India research project in the area of information security and identity management. This conference is supported by Research Councils UK, the strategic partnership of the seven Research Councils in the United Kingdom. This International Conference on Security and Identity Management (SIM) aims to develop and bring together diverse community from the academia, research, industry and government those interested in identifying and understanding several security and identity challenges across the globe, to address better the gap which exists in the digital economy. Through this conference we aim to explore security and identity frameworks and solutions in order to protect the next generation of Information Technology applications. This initiative with a focus on the burgeoning digital economy is aimed specifically at promoting the importance of digital identity and information security solutions both in India and UK. The Indo‐UK joint workshop will bring together several international experts from both academia and industry to build new Industrial‐Academic focused scientific networks between the UK and India. The workshop will be used as a forum to identify and present several security and identity challenges across the globe to address better the ‘gap in the digital economy market’ and thus to develop further an appropriate security and identity framework and solutions to protect the next generation of IT applications. The conference seeks for original research papers, industrial papers and proposals for demonstration, tutorials and workshops in the context of ‘Security and Identity Management’. Details about the conference can be found out from www.iimahd.ernet.in/sim09/ or www.epsrc‐identity.net/SIM2009.php .
1
Conference Tracks We solicit original research and technical papers not published elsewhere. The papers can be theoretical, practical and application oriented on the following tracks: • Technology perspectives • Legal and regulatory issues • Business and managerial issues • Social and economic implications Authors can submit papers for a specific track with the following theme (but not limited to) • • • • • • • • • • •
National ID Information security Digital rights management Banking technology Biometrics Information & telecommunication Identity theft Social networks Traceability Cyber legislation Digital fraud
Paper Submission Submission must be in an electronic form as PDF format and should be sent as an email to
[email protected] . Submissions should be at most 10 single space printed pages following ACM/IEEE formatting guidelines. Papers that fail to comply with length limit will be rejected. Submissions will be double blind peer‐reviewed. Selection criteria will include – relevance, significance, impact, originality, technical soundness and quality of presentation. Preference will be given to submissions that take strong or challenging positions on important emergent topics related to Security and Identity Management. At least one author should attend the conference to present the paper; else the paper will be dropped from the conference. The conference proceedings will be published. No submissions will be accepted after the submission date. Criterion for Evaluation by the Reviewers • Relevance: Does the subject of the paper appeal to the interests of the conference attendees? • Methodology: Does the paper use sound and appropriate method(s)? • Originality: Does the paper add new findings, insights, or knowledge to the body of literature? • Research: Does the paper compare and weigh the material against the work of others? • Conclusions: Are the conclusions sound and justified? • Managerial Implications: Is the managerial relevance and implications of the decision problem demonstrated?
2
• References: Are the references adequate? Important Dates: • Submission Deadline ‐ Mar 20th 2009 • Review Submission ‐ Apr 24th 2009 • Conference ‐ May 11‐12th,2009 Special Issues and Journal Publication The papers selected for the conference will come out as Proceedings from a reputed publisher. Selected papers will also be invited to be a part of an edited book which will be declared later. Program Committee Professor Rajanish Dass, Indian Institute of Management, Ahmedabad, India Professor Wendy Currie, Information Systems Group, Warwick Business School, UK Dr. M. Rajarajan, Mobile Networks Group, City University, London, UK Professor Steven Furnell, Head of Computer Science, University of Plymouth, UK Professor David Wall, Cybercrime Criminologist, University of Leeds, UK Prof. Rekha Jain, Indian Institute of Management, Ahmedabad Dr Mukesh Mohania, IBM Research Labs, New Delhi, India Dr Lyndon Lee, Head of Security, BT, UK Dr Martin Kobaya, Security Research, British Telecom, UK Dr Kapaleeswaran Viswanathan, HP Labs, India
3