1st International Workshop on TEchnical and LEgal aspects of data 
pRIvacy and SEcurity - TELERISE 2015 (co-located with ICSE 2015), May 
18th, 2015, Florence, Italy (submission due 23 January 2015.

Information sharing is essential for today's business and societal 
transactions. Nevertheless, such a sharing should not violate the 
security and privacy requirements dictated by Law,  by internal 
regulations of organisations, and by data subjects. An effectual, rapid, 
and unfailing electronic data sharing among different parties, while 
protecting legitimate rights on these data, is a key issue with several 
shades. Among them, how to translate the high-level law obligations, 
business constraints, and users' requirements into system-level privacy 
policies, providing efficient and practical solutions for policy 
definition and enforcement.

TELERISE aims at providing a forum for researchers and engineers, in 
academia and industry, to foster an exchange of research results, 
experiences, and products in the area of privacy preserving and secure 
data management, from a technical and legal perspective. The ultimate 
goal  is to conceive new trends and ideas on designing, implementing, 
and evaluating solutions for privacy-preserving information sharing, 
with an eye to cross-relations between ICT and regulatory aspects of 
data management.

Topics of interest are (but not limited to):

  * Model-based and experimental assessment of data protection
  * Privacy in identity management and authentication
  * Modelling and analysis languages for representation, visualization,
    specification of legal regulations
  * Technical, legal and user requirements for data protection
  * User-friendly authoring tools to edit privacy preferences
  * IT infrastructures for privacy and security policies management
  * IT infrastructure for supporting privacy and security policies evolution
  * Privacy and security policies conflict analysis and resolution
  * Electronic Data Sharing Agreements Representation: Languages and
    Management Infrastructure
  * Cross-relations between privacy-preserving technical solutions and
    legal regulations
  * Privacy aware access and usage control
  * Privacy and security policies enforcement mechanisms
  * Privacy preserving data allocation and storage
  * Software systems compliance with applicable laws and regulations
  * Heuristic for pattern identification in law text
  * Empirical analysis of consumer's awareness of privacy and security

Domains of application are (but not limited to):

  * Healthcare
  * Telecommunication and Networks
  * Cloud Computing and Web Services
  * Mobile devices
  * Video Surveillance
  * Smart Grid, Smart Cities and Smart Spaces
  * Financial & Business organization
  * Public Administration
  * Social Networks