TELERISE 2016 - 2nd International Workshop on TEchnical and LEgal 
aspects of data pRIvacy and SEcurity (co-located with ICWE 2016) 
June 9, 2016, 
Università della Svizzera Italiana (USI) Lugano, Switzerland deadline 23 March 2016)

Information sharing on the Web is essential for today's business and 
societal transactions. Nevertheless, such a sharing should not violate 
the security and privacy requirements either dictated by Law to protect 
data subjects or by internal regulations provided both at organisation 
and individual level. An effectual, rapid, and unfailing electronic data 
sharing among different parties, while protecting legitimate rights on 
these data, is a key issue with several shades. Among them, how to 
translate the high-level law obligations, business constraints, and 
users' requirements into system-level privacy policies, as well as 
engineering efficient and practical Web applications-based solutions for 
policy definition and enforcement. TELERISE aims at providing a forum 
for researchers and engineers, in academia as well as in industry, to 
foster an exchange of research results, experiences, and products in the 
area of privacy preserving, secure data management, and engineering on 
the Web, from a technical and legal perspective. The ultimate goal is to 
conceive new trends and ideas on designing, implementing, and evaluating 
solutions for privacy-preserving information sharing, with an eye to the 
cross-relations between ICT and regulatory aspects of data management 
and engineering.

Topics of interest are (but not limited to):

Model-based and experimental assessment of data protection
Privacy in identity management and authentication
Modeling and analysis languages for representation, visualization, 
specification of legal regulations
Technical, legal, and user requirements for data protection
User-friendly authoring tools to edit privacy preferences
IT infrastructures for privacy and security policies management
IT infrastructure for supporting privacy and security policies evolution
Privacy and security policies conflict analysis and resolution strategies
Electronic Data Sharing Agreements Representation: Languages and 
Management Infrastructure
Cross-relations between privacy-preserving technical solutions and legal 
Privacy aware access and usage control
Privacy and security policies enforcement mechanisms
Privacy preserving data allocation and storage
Software systems compliance with applicable laws and regulations
Heuristic for pattern identification in law text
Empirical analysis of consumer's awareness of privacy and security policies

Domains of application are (but not limited to):

Telecommunication and Networks
Cloud Computing and Web Services
Mobile devices
Video Surveillance
Smart Grid, Smart Cities and Smart Spaces
Financial & Business
Public Administration
Social Networks

Invited Speaker:

Benoit Van Asbroeck, Bird & Bird, Belgium