Short Name:            Inspec 2008
Full Name:             International Workshop on Security and Privacy 
                        in Enterprise Computing, 
                        Held in conjunction with the 
                        12th IEEE International EDOC Conference (EDOC 2008)
Date:                  15 September 2008
Submission Deadline:   13 June 2008
Place:                 Munich, Germany
URL:                   http://ra.crema.unimi.it/inspec2008/

Several technologies have emerged for enterprise computing.  Today,
services are becoming the new building blocks of enterprise systems
and service-oriented architectures are combining them in a flexible
and novel way.  These technological trends are accompanied by new
business trends due to globalization that involve innovative forms of
collaborations.  All of these trends bring with them new challenges to
the security and privacy of enterprise computing.  New concepts for
solving these challenges require the combination of many disciplines
from computer science and information systems, such as cryptography,
networking, distributed systems, process modeling and design, access
control, privacy etc.  It is the goal of this workshop to provide a
forum for exchange of novel research in these areas among the experts
from academia and industry.

Topics include:
* Security and privacy in workflow systems 
  - Access control architectures 
  - Modeling of security and privacy constraints 
  - Automatic security augmentation 
  - Secure/Trusted virtual domains 
* Security and privacy in service-oriented architectures 
  - Secure composition of services 
  - Semantic aware security 
  - Security services 
  - Trustworthy computation 
* Identity Management 
  - Security and Privacy 
  - Applications to compliance 
  - Effective use in business IT systems 
* Data sharing 
  - Cryptographic protection during data sharing 
  - Privacy-preserving distributed applications 
  - Efficient multi-party computations 
  - Privacy and data sharing policies 
* Security and privacy in management information systems 
  - Novel secure applications 
  - Secure and private data analytics 
  - Flexible and seamless security architectures 
  - Secure operating system design 
* Collaborations 
  - Secure and private supply chains 
  - Security and privacy in virtual organizations 
  - Private social network and Web 2.0 applications 
  - Security and privacy in outsourcing