{"title":"Message from the SIMICE 2015 Workshop Organizers","authors":"Bian Yang, J. Bringer","doi":"10.1109/COMPSAC.2015.307","DOIUrl":null,"url":null,"abstract":"The SIMICE 2015 Program Committee selected four papers to be presented in the workshop for researchers who have interest in the security and privacy aspects of identity management in the cloud environment. These contributions cover the mobile operating system, communications channels, and databases aspects in security and privacy enhancement for identity and personal information use in an untrusted environment. We hope these works will interest our colleagues in this field for more in-depth and extensive discussions paving the way to new research trends. We thank the involvement of all program committee members to review the submissions received and to select the final papers. We look forwards to a successful event of SIMICE 2015 and next SIMICE workshop.","PeriodicalId":74502,"journal":{"name":"Proceedings : Annual International Computer Software and Applications Conference. COMPSAC","volume":"9 1","pages":"296"},"PeriodicalIF":0.0000,"publicationDate":"2015-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings : Annual International Computer Software and Applications Conference. COMPSAC","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COMPSAC.2015.307","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The SIMICE 2015 Program Committee selected four papers to be presented in the workshop for researchers who have interest in the security and privacy aspects of identity management in the cloud environment. These contributions cover the mobile operating system, communications channels, and databases aspects in security and privacy enhancement for identity and personal information use in an untrusted environment. We hope these works will interest our colleagues in this field for more in-depth and extensive discussions paving the way to new research trends. We thank the involvement of all program committee members to review the submissions received and to select the final papers. We look forwards to a successful event of SIMICE 2015 and next SIMICE workshop.