Second International Workshop on Privacy and Security in Enterprise Modeling (in conjunction with IEEE EDOC 2021)

PriSEM 2021


Computer Security & Cryptography Security & Trust & Testing



Security and privacy are critical issues in modern organizations. Enterprise business processes and their supporting systems have to constantly evolve in order to comply with security and privacy policies. Complex organizational structures and their distributed business processes make such compliance a major effort. Moreover, the intersection between privacy and security technologies and software engineering has tremendous implications on the very way information systems are modeled for their design and development. These changes affect the requirements and software engineering processes in organizations. That is why security and privacy requirements have to be explicitly addressed in enterprise models while technologies supporting security and privacy have to become an integrated part of Enterprise Architecture.
Emerging technologies such as distributed ledgers, privacy-enhancing technologies, and blockchains leverage powerful cryptography features, all-purpose Turing-complete programming languages and flexible communication models. They are considered as new transparency security and privacy enablers for distributed processing without requiring a trusted third-party. Today, their integration within information systems is a difficult task for enterprise architects due to the paradigm-shifting nature of those technologies and the lack of adequate models and tools from the enterprise modeling community. This paradigmatic shift can also be explained with privacy-enhancing technologies coming from a tradition of privacy as confidentiality. This area is under explored and yet to be understood.
The goal of PriSEM’21 is to bring together researchers and practitioners to discuss theoretical and practical problems and solutions in a rapidly maturing domain of enterprise security and privacy. The integration of security and privacy aspects in enterprise models is a central theme of this workshop.
Topics
We strongly encourage the submissions reporting a synergy of innovative research and best practices in the area of organizational privacy and security management, modeling and architecture, etc.
The topics of interest include but are not limited to
The topics of interest include but are not limited to:
modeling and design for privacy-enhanced enterprise systems
privacy and security by design
privacy in software modeling
privacy beyond compliance/privacy as confidentiality
conceptualization and modeling of privacy-enhancing technologies in requirements engineering
modeling for privacy-preserving ML and AI
privacy & security management using emerging technologies
privacy & security modeling for enterprise distributed ledger and blockchain solutions
privacy & security for enterprise governance
privacy & security for enterprise process modeling
privacy & security modeling for DAOs
privacy & security modeling for enterprise smart contracts
privacy & security modeling for enterprise IoT integration
privacy & security modeling for Supply-chain
practical aspects of privacy & security modeling in the organizations
usability of privacy and security in the context of enterprise architecture
Paper Types
We solicit four types of contributions:
Technical papers should describe original results not been accepted or submitted for publication elsewhere. These papers will be evaluated based on their scientific and technical contribution, originality, and relevance.
Experience reports should provide new insights gained in case studies or when applying enterprise computing technology in practice; industry experience reports shall further provide important feedback about the state of practice and pose challenges for researchers. These papers will be evaluated based on their appropriateness, significance, and clarity. Industry experience reports must report an actual implementation in practice and must have at least one author with an industry affiliation.
Successful failures and negative results papers should report experiences of an attempt to combine privacy and/or security in enterprise modeling with a less favorable outcome than expected. These papers should present an analysis of the situation about intentions vs reality and reflections in the format of lessons learnt and guidelines about what could be done to avoid repeating such cases.
Position papers should give a broad yet well-informed overview of the topic they focus on and build a vision and a research roadmap, or open questions for the community at any topic related to privacy, security, and enterprise modeling. These papers should show familiarity with related work and could be built on extensive literature review but should offer the reflections of the authors about the research domain and not merely summarize prior research. These papers will be evaluated on their potential to spark debate during the workshop as well as how articulate they highlight current and future challenges.