OID 2025 : 12th Open Identity Summit
Call For Paper (CFP) Description
================================================================
Call for Papers
12th Open Identity Summit 2025
May 22nd – May 23rd , 2025, Munich, Germany
https://www.unibw.de/oid
================================================================
Submission deadline: January 31st , 2025
================================================================
The aim of the Open Identity Summit 2025 is to link practical experiences and requirements with academic
innovations. The focus areas will be Research and Applications in the areas of Identity Management
Trust Services, Open Source, Internet of Things, Digital Wallets, Privacy, AI, and Cloud Computing.
Open standards and interfaces, as well as open-source technologies, play a central role in the current identity
and access management (IAM) landscape as well as in emerging future scenarios in electronic identification
and trust services for electronic transactions. Reliable identity management is an essential building block for
many applications and services, such as innovative payment services, digital manufacturing, and other
innovative applications in the areas of e-health, e-government, distributed ledgers, cloud computing, data
management for artificial intelligence, and the internet of things.
While there are already plenty of successful applications in which those techniques are applied to safeguard
authenticity, integrity, and confidentiality, there are still many closely related areas, which demand further
research. These include technical solutions that provide higher levels of transparency, intervenability, and
accountability. Moreover, the security and privacy properties of technologies are of paramount importance.
We invite stakeholders and technical experts from public administration, industry, science and academia to
propose contributions to the program of the workshop. Submissions should be short papers (max. 8 pages)
introducing novel ideas or industry experiences or full papers (max. 12 pages not including references) in
English. The program committee will review submitted papers in a double-blind process. Accepted papers
will be presented at the workshop and are planned to be published in the GI-Edition “Lecture Notes in
Informatics” (LNI) and listed in Scopus.
================================================================
Topics of Interest
================================================================
The topics of the workshop include but are not limited to:
----------------------------------------------------------------
Identity Management and Privacy
----------------------------------------------------------------
Technological Foundations and Security Aspects of Identity Management
* Authentication protocols and federated identity management.
* Digital wallets and mobile aspects of identity management and EU Digital Identity Wallet.
* OT/IT-Security in production and the Industry 4.0.
* Role of AI in biometrics and identity management
* Cybersecurity aspects of digital identity: Resilience, risk, contingency, counterintelligence.
* Standards, interoperability aspects, and interoperable solutions for identity management.
Application of Identity Management
* Security, interoperability, user experience, and novel use cases related to identity management, credential technologies and electronic identity means.
* Distributed and self-sovereign identities (SSI) and decentralized identity management.
* Concepts for and practical experiences with components, systems, services, processes, and applications for identity management.
* Identity and access management in IoT, IIoT, Industry 4.0, and digital manufacturing scenarios.
* User Journey, Usability Research, Accessibility, and Usable Security.
* Smart assistants for security, privacy, and identity management.
* Identity and access management for digital medical devices and digital solutions for use in clinical settings.
Management of Digital Identities and Privacy Issues
* Privacy, unlinkability, auditability, and evidence within identity management systems.
* Technologies enhancing transparency, intervenability, and accountability of IAM
* Legal and socio-economic aspects of privacy and identity management, in particular effects of the changing EU Regulatory Framework and effects of the NIS directive.
* National and international ecosystems for digital identities and long-term aspects of IAM
* Zero Trust strategies and implementations for identity and network management.
* Socio-economic aspects of digital identity, privacy and data protection.
* Impact of quantum computing on the management of digital identities.
* Role of AI in digital identity management (including identity fraud, morphing, and deep fakes).
* Privacy aspects and guidelines for mobile medical applications.
* Human Factors, social engineering, and identity fraud.
----------------------------------------------------------------
Trust Services and Related Applications
----------------------------------------------------------------
* Legal and international aspects related to the eIDAS regulatory framework and its development into “eIDAS 2.0”: Qualified Electronic Attestation of Attributes (QEAA), Qualified Trust Services, (QTS) and Qualified Trust Service Providers (QTSP)
* Innovative solutions, standards, and technologies related to trust services.
* Socio-economic aspects of trust services.
* Aspects related to the certification and accreditation of trust services and related components.
* Concepts and solutions for the long-term preservation of evidence of electronic data.
----------------------------------------------------------------
Open Source
----------------------------------------------------------------
* Security, interoperability, as well as legal and economic aspects of open source, in the areas of security and identity management.
* Concepts and practical experiences with open-source components related to security, identity management, and trust services.
* New open-source projects and news from existing open source projects in the area of security, identity management, trust services, digital wallets, and cloud computing.
================================================================
Conference Chair
================================================================
* Heiko Roßnagel (Fraunhofer IAO), [email protected]
* Daniela Pöhn (Universität der Bundeswehr München), [email protected]
* Christian Schunck (Fraunhofer IAO) [email protected]
================================================================
Local Organisation
================================================================
* Daniela Pöhn (Universität der Bundeswehr München), [email protected]
================================================================
================================================================
Program Committee
================================================================
The program comittee is listed on: https://www.unibw.de/oid
================================================================
Important Dates
================================================================
Paper Submission Deadline: 31st January 2025
Notification of Acceptance: 30th March 2025
Submission of Camera-Ready Copies: 22nd April 2025
================================================================
Call for Papers
12th Open Identity Summit 2025
May 22nd – May 23rd , 2025, Munich, Germany
https://www.unibw.de/oid
================================================================
Submission deadline: January 31st , 2025
================================================================
The aim of the Open Identity Summit 2025 is to link practical experiences and requirements with academic
innovations. The focus areas will be Research and Applications in the areas of Identity Management
Trust Services, Open Source, Internet of Things, Digital Wallets, Privacy, AI, and Cloud Computing.
Open standards and interfaces, as well as open-source technologies, play a central role in the current identity
and access management (IAM) landscape as well as in emerging future scenarios in electronic identification
and trust services for electronic transactions. Reliable identity management is an essential building block for
many applications and services, such as innovative payment services, digital manufacturing, and other
innovative applications in the areas of e-health, e-government, distributed ledgers, cloud computing, data
management for artificial intelligence, and the internet of things.
While there are already plenty of successful applications in which those techniques are applied to safeguard
authenticity, integrity, and confidentiality, there are still many closely related areas, which demand further
research. These include technical solutions that provide higher levels of transparency, intervenability, and
accountability. Moreover, the security and privacy properties of technologies are of paramount importance.
We invite stakeholders and technical experts from public administration, industry, science and academia to
propose contributions to the program of the workshop. Submissions should be short papers (max. 8 pages)
introducing novel ideas or industry experiences or full papers (max. 12 pages not including references) in
English. The program committee will review submitted papers in a double-blind process. Accepted papers
will be presented at the workshop and are planned to be published in the GI-Edition “Lecture Notes in
Informatics” (LNI) and listed in Scopus.
================================================================
Topics of Interest
================================================================
The topics of the workshop include but are not limited to:
----------------------------------------------------------------
Identity Management and Privacy
----------------------------------------------------------------
Technological Foundations and Security Aspects of Identity Management
* Authentication protocols and federated identity management.
* Digital wallets and mobile aspects of identity management and EU Digital Identity Wallet.
* OT/IT-Security in production and the Industry 4.0.
* Role of AI in biometrics and identity management
* Cybersecurity aspects of digital identity: Resilience, risk, contingency, counterintelligence.
* Standards, interoperability aspects, and interoperable solutions for identity management.
Application of Identity Management
* Security, interoperability, user experience, and novel use cases related to identity management, credential technologies and electronic identity means.
* Distributed and self-sovereign identities (SSI) and decentralized identity management.
* Concepts for and practical experiences with components, systems, services, processes, and applications for identity management.
* Identity and access management in IoT, IIoT, Industry 4.0, and digital manufacturing scenarios.
* User Journey, Usability Research, Accessibility, and Usable Security.
* Smart assistants for security, privacy, and identity management.
* Identity and access management for digital medical devices and digital solutions for use in clinical settings.
Management of Digital Identities and Privacy Issues
* Privacy, unlinkability, auditability, and evidence within identity management systems.
* Technologies enhancing transparency, intervenability, and accountability of IAM
* Legal and socio-economic aspects of privacy and identity management, in particular effects of the changing EU Regulatory Framework and effects of the NIS directive.
* National and international ecosystems for digital identities and long-term aspects of IAM
* Zero Trust strategies and implementations for identity and network management.
* Socio-economic aspects of digital identity, privacy and data protection.
* Impact of quantum computing on the management of digital identities.
* Role of AI in digital identity management (including identity fraud, morphing, and deep fakes).
* Privacy aspects and guidelines for mobile medical applications.
* Human Factors, social engineering, and identity fraud.
----------------------------------------------------------------
Trust Services and Related Applications
----------------------------------------------------------------
* Legal and international aspects related to the eIDAS regulatory framework and its development into “eIDAS 2.0”: Qualified Electronic Attestation of Attributes (QEAA), Qualified Trust Services, (QTS) and Qualified Trust Service Providers (QTSP)
* Innovative solutions, standards, and technologies related to trust services.
* Socio-economic aspects of trust services.
* Aspects related to the certification and accreditation of trust services and related components.
* Concepts and solutions for the long-term preservation of evidence of electronic data.
----------------------------------------------------------------
Open Source
----------------------------------------------------------------
* Security, interoperability, as well as legal and economic aspects of open source, in the areas of security and identity management.
* Concepts and practical experiences with open-source components related to security, identity management, and trust services.
* New open-source projects and news from existing open source projects in the area of security, identity management, trust services, digital wallets, and cloud computing.
================================================================
Conference Chair
================================================================
* Heiko Roßnagel (Fraunhofer IAO), [email protected]
* Daniela Pöhn (Universität der Bundeswehr München), [email protected]
* Christian Schunck (Fraunhofer IAO) [email protected]
================================================================
Local Organisation
================================================================
* Daniela Pöhn (Universität der Bundeswehr München), [email protected]
================================================================
================================================================
Program Committee
================================================================
The program comittee is listed on: https://www.unibw.de/oid
================================================================
Important Dates
================================================================
Paper Submission Deadline: 31st January 2025
Notification of Acceptance: 30th March 2025
Submission of Camera-Ready Copies: 22nd April 2025
================================================================
Conference Topics
Frequently Asked Questions
What is OID 2025 : 12th Open Identity Summit?
OID 2025 : 12th Open Identity Summit is Join us at the 12th Open Identity Summit 2025 in Munich, Germany, from May 22nd to 23rd, 2025, to explore the latest innovations and practical experiences in Identity Management, Trust Services, Open Source, Internet of Things, Digital Wallets, Privacy, AI, and Cloud Computing.
How do I submit my paper to OID 2025 : 12th Open Identity Summit?
Submit your paper via the official submission portal at https://www.unibw.de/oid. Follow the submission guidelines outlined in the CFP.
How do I register for the OID 2025 : 12th Open Identity Summit?
Register at https://www.unibw.de/oid. Early registration is recommended to secure your spot and avail discounts.
What topics are accepted at OID 2025 : 12th Open Identity Summit?
The topics accepted at OID 2025 : 12th Open Identity Summit include security, identity management, trust, opern source. Papers that explore innovative ideas or solutions in these areas are highly encouraged.
What are the important dates for OID 2025 : 12th Open Identity Summit?
- Start Date: 22 May, 2025
- End Date: 23 May, 2025
- End Date: 23 May, 2025
What is the location and date of OID 2025 : 12th Open Identity Summit?
OID 2025 : 12th Open Identity Summit will be held on 22 May, 2025 - 23 May, 2025 at Munich, Germany. More details about the event location and travel arrangements can be found on the conference’s official website.
What is the location of OID 2025 : 12th Open Identity Summit?
OID 2025 : 12th Open Identity Summit will be held at Munich, Germany.
Can I submit more than one paper to OID 2025 : 12th Open Identity Summit?
Yes, multiple submissions are allowed, provided they align with the conference’s themes and topics. Each submission will be reviewed independently.
What is the review process for submissions?
Papers will be reviewed by a panel of experts in the field, ensuring that only high-quality, relevant work is selected for presentation. Each paper will be evaluated on originality, significance, and clarity.
What presentation formats are available at OID 2025 : 12th Open Identity Summit?
Presentations can be made in various formats including oral presentations, poster sessions, or virtual presentations. Specific details will be provided upon acceptance of your paper.
Can I make changes to my submission after I’ve submitted it?
Modifications to your submission are allowed until the submission deadline. After that, no changes can be made. Please make sure all details are correct before submitting.
What are the benefits of attending OID 2025 : 12th Open Identity Summit?
Attending OID 2025 : 12th Open Identity Summit provides an opportunity to present your research, network with peers and experts in your field, and gain feedback on your work. Additionally, it is an excellent platform for career advancement and collaboration opportunities.
What should I include in my abstract or proposal submission?
Your abstract or proposal should include a concise summary of your paper, including its purpose, methodology, and key findings. Ensure that it aligns with the conference themes.