2011 International Workshop on Identity: Security, Management & Applications (ID 2011)

Kochi, Kerala, India

July 22-24, 2011




International Workshop on Identity:Security, Management & Applications (ID 2011), is designated to meet with researchers, engineers and practitioners from academia, service providers, industry and government working on Identity-based Internet & infrastructure systems. ID 2011 aims to bring to forefront the recent trends in most significant technology topics such as Identity Management (IdM), Cloud Computing, Internet of Things (IoT), Service Oriented Architecture (SoA), Security & Privacy Systems, Access Management, Risk Management, and Role and Policy Management, etc in software, hardware and firmware applications running on private and public networks. ID 2011 is the first Indian international workshop edition in its kind and co-located with The First International Conference on Advances in Computing & Communications (ACC 2011).


High-quality papers on identity security, management & applications that at the time of submission are not under review or have not already been published or accepted for publication elsewhere are solicited. Authors are invited to submit papers through EDAS Conference Management System (http://edas.info/newPaper.php?c=9485). If you don't have an EDAS account yet, the above link allows you to create it. Authors can confirm the Springer Author Guidelines at the following web page: LNCS Format. Only PDF files will be accepted and reviewed (Single-column, 10pt and no longer than 10 pages -including all figures and references).

LNCS Manuscript Template: (Word format, LaTeX format)

All the accepted papers will be published by Springer in the series of Communications in Computer and Information Science (CCIS). CCIS is abstracted/indexed in ISI Proceedings, DBLP and Scopus. The accepted papers will also be included in the CCIS Electronic Book Series hosted in the SpringerLink Digital Library.

We welcome submissions of papers for ID 2011. The workshop’s topics of interest include (but are not limited to the following):

Digital Identity

  • Identity Services
  • Identity Federation
  • Mobile Identity
  • Identity Theft
  • Directory Services & Virtual Directory
  • Virtual Identities
  • Web Identity
  • Identity-driven Security
  • Identity Architecture

Identity Management

  • User Provisioning Trends
  • Role Management
  • Policy Management
  • Rights management
  • Trust Management
  • Risk Management
  • Access Control & Management
  • Governance, Compliance and Risk (GCR)
  • Enterprise Single Sign-On (ESSO/SSO)
  • Architecture for IdM
  • Identity for Business Management
  • Software Agents & Identity Management
  • User Centric Identity Management
  • Business Centric Identity Management
  • Open Internet Identity Standards
  • Fault Tolerance in Identity Management
  • Quality of Service and Quality of Experience in IdM

Cloud Computing

  • Cloud Security
  • Trends in Virtualization
  • Architecture for Cloud
  • Cloud Business Models
  • Cloud Services
  • Role of Identities in Cloud Computing
  • Privacy in Cloud

Service Oriented Architecture (SoA)

  • SOA Security
  • Service Oriented Solutions based on Identities
  • Identity Management & SOA
  • Identities for SOA & Security

Internet of Things (IoT)

  • Trends in IoT
  • Identities & IoT
  • IoT Layers
  • Architecture for IoT
  • IoT & Business Challenges
  • Future of Internet
  • Internet Services

Object Technology & Open Systems

  • Open Systems & Identity
  • Object Oriented Identity Systems

Identity Communications & Services

  • Web 2.0 & Identity
  • Identity & Information and Communication Technology (ICT)
  • Social Networks & Identity
  • Mobile Communication Applications
  • Trends in Communication Services

Security & Privacy in Private and Public Networks

  • Identity Management Security Challenges
  • Identity Management Privacy Challenges
  • Network & Information Privacy issues
  • Network Security
  • Identity & data security
  • End-to-end security
  • Authentication and Authorization
  • Security and privacy in P2P networks

Infrastructure Management Systems (IMS)

  • Trends in IMS
  • Identity-based IMS
  • IMS Innovations & Applications
  • Future IMS


  • Identity in eHealth
  • Identity in eGovernment
  • Identity in Automotive & Manufacturing Industries
  • Identity in Banking & Finance
  • Identity & Sensor Network Applications
  • Identity-based Data Mining Techniques
  • Bio-metric Application
  • Identity & P2P Systems
  • Identity-based Soft Computing

Important Dates

Full Paper Submission: March 24, 2011
Acceptance Notification: April 10, 2011
Camera Ready Papers due: May 1, 2011
Registration Starts: April 15, 2011
Registration Closes: May 01, 2011
Conference: July, 22-24, 2011

Advisory Committee

Apparao, Vice President, CTS, India
R. Govindarajulu, IIIT, Hyderabad, India
Bala Srinivasan, Monash University, Australia
G. N. Srinivasa Prasanna, IIIT, Bangalore, India
S.C.Sahasrabudhe, Dhirubhai Ambani Institute of Information and Communication Technology (DA-IICT), India
Subramaniyam, Pondicherry University, India
Y.V.Gopala Krishnamuthy, ACE, Hyderabad, India

Workshop TPC Chairs

General Chairs

Paul Rodrigues (CTO, WSS, India), Hindustan University, India
H.R.Vishwakarma (Secretary, Computer Society of India), VIT University, India

Program Chairs

P.Krishna Reddy, IIIT, Hyderabad, India
Sundar KS, Education & Research, Infosys Technologies Limited, India
Srinivasa Ragavan, Intel Inc, USA
S.Venkatachalam, Jawaharlal Nehru Technological University, India

Organizing Chair

Madhan Kumar Srinivasan, Education & Research, Infosys Technologies Limited, India

Organizing Co-chairs

Abhi Saran, London South Bank University, UK
Anireddy Niranjan Reddy, University of Glamorgan, UK
Revathy Madhan Kumar, Education & Research, Infosys Technologies Limited, India

ACC 2011 Workshop Chairs

El-Sayed El-Alfy, King Fahd University of Petroleum and Minerals, Saudi Arabia
John Mathew, Rajagiri School of Engineering and Technology, India
Silvio Bortoleto , Positivo University, Brazil

Technical Committee

Arun Sivanandham, Infosys Technologies Limited, India
Bezawada Bruhadeshwar, IIIT, Hyderabad, India
Bhaskara Reddy AV, Infosys Technologies Limited, India
Bipin Indurkhya, IIIT, Hyderabad, India
Chandrabali Karmakar, Infosys Technologies Limited, India
C. Sunil Kumar, Jawaharlal Nehru Technological University, India
Gudipati Kalyan Kumar, Excellence India, India
Kalaiselvam, Infineon Technologies, Germany
Lukas Ruf, Consecom AG, Switzerland
Hamid Sharif, University of Nebraska-Lincoln, USA
Manik Lal Das, Dhirubhai Ambani Institute of Information and Communication Technology (DA-IICT), India
Narendra Ahuja, University of Illinois, USA
Omar, University of Jourdan
Pradeepa, Wipro Technologies, India
Thomas Little, Boston University, USA
Pradeep Kumar TS, Infosys Technologies Limited, India
Rajiv Tripathi, NIT, Allahabad, India
Rakesh Chithuluri, Oracle, India
Sanjay Chaudhary, Dhirubhai Ambani Institute of Information and Communication Technology (DA-IICT), India
Santosh Pasuladi, Jawaharlal Nehru Technological University, India
Satheesh Kumar Varma, IIIT, Pune, India
Saurabh Barjatiya, IIIT, Hyderabad, India
Sreekumar Vobugari, Education & Research, Infosys Technologies Limited, India
Suthershan Vairavel, CTS, India
Vasudeva Varma, IIIT, Hyderabad, India
Vinod Babu, Giesecke & Devrient, Germany
V. Balamurugan, IBM, India
Tarun Rao, Infosys Technologies Limited, India
Manimaran Govindarasu, Iowa State University
Arjan Durresi, Indiana University Purdue University Indianapolis, USA
Farooq Anjum, On-Ramp Wireless, USA
Yonghe Liu, UT Arlington, USA
Jie Li, University of Tsukuba, Japan
Tim Strayer, BBN Technologies, USA
Lau Lung, UFSC, Brazil
Hui Chen, Virginia State University, USA
Avinash Srinivasan, Bloomsburg University, USA

Contact Us

E-mail:  iwid2011@gmail.com

©RSOFT, Rajagiri School of Engineering & Technology
Rajagiri Valley, Kakkanad, Kochi, Kerala, India.