International Joint Conference on e-Business and Telecommunications
ICETE 2009 – International Joint Conference on e-Business and Telecommunications: July 7-10, Milan, Italy
July 7-10     Milan, Italy
Keynote Speakers

ICETE is a joint conference composed of four concurrent conferences: ICE-B, SECRYPT, SIGMAP and WINSYS.
The four conferences are always co-located and held in parallel.
Keynote lectures are plenary sessions and can be attended by all ICETE participants.

Keynote Speakers List:

Blagovest Shishkov, Bulgarian Academy of Sciences, Bulgaria
Title: Adaptive Antennas in Wireless Communication Networks

Pierangela Samarati, University of Milan, Italy
Title: Protecting Information Privacy in the Electronic Society

David Marca, University of Phoenix, U.S.A.
Title: e-Business Design: A Shift to Adaptability

Frank Leymann, University of Stuttgart, Germany
Title: Cloud Computing: Fundamental Architecture & Future Applications

Gottfried Vossen, University of Muenster, Germany
Title: Web 2.0: a buzzword, a serious development, just fun, or what?

Keynote Lecture 1                                                                                                                                     WINSYS  
Adaptive Antennas in Wireless Communication Networks

Blagovest Shishkov
Bulgarian Academy of Sciences,

Brief Bio
Blagovest Shishkov is professor in Statistical Signal Processing at the Institute of Mathematics and Informatics, Bulgarian Academy of Sciences. He holds a Master degree in Electrical Engineering and Doctoral degrees – PhD in Physics, and DSc in Telecommunications, and has published over one hundred scientific and professional articles as well as several books. He has been responsible for several research projects, including national (Bulgarian) and international. His research interests include signal processing of cyclostationary signals and detection of nonlinear wave interactions by using higher-order statistics, which areas are successfully incorporated into adaptive antenna beamforming and analysis of time series associated with space data. He has realized a long-running collaboration with some of the most distinguished universities and labs in Japan, and was a research fellow in leading universities in France and Spain. Find more information at
Wireless communication networks can be considered as a means of linking portable user terminals that meet temporarily in locations where connection to a network infrastructure is difficult. Hence, techniques are needed that contribute to the development of high-performance receiving antennas with the capability of automatically eliminating surrounding interference. Solutions to this problem have been proposed for the conventional linear antenna arrays where we observe nevertheless complex architectures resulting in high power dissipation. In this talk, I will consider novel algorithms for the analog aerial beamforming of a reactively controlled adaptive antenna array as a non-linear spatial filter by variable parameters. Based on stochastic approximation theory, such algorithms have great potentials for use in mobile terminals and provide therefore important support for wireless communication networks. The resulting unconventional adaptive antenna can lead to dramatically simplified architectures that result in significantly lower power dissipation and fabrication costs.
Keynote Lecture 2                                                                                                                                    SECRYPT  
Protecting Information Privacy in the Electronic Society 

Pierangela Samarati
University of Milan,

Brief Bio
Pierangela Samarati is a Professor at the Department of Information Technology of the University of Milan. Her main research interests are access control policies, models and systems, data security and privacy, information system security, and information protection in general. She has participated in several projects involving different aspects of information protection. On these topics she has published more than 150 refereed technical papers in international journals and conferences. She is co-author of the book "Database Security," Addison-Wesley, 1995.

She has been Computer Scientist in the Computer Science Laboratory at SRI, CA (USA). She has been a visiting researcher at the Computer Science Department of Stanford University, CA (USA), and at the ISSE Department of George Mason University, VA (USA).

She is the chair of the Steering Committees of the European Symposium on Research in Computer Security (ESORICS) and of the ACM Workshop on Security and Privacy (WPES). She is vice-chair of the ACM SIGSAC -- Special Interest Group on Security, Audit, and Control. She is the Coordinator of the Working Group on Security of the Italian Association for Information Processing (AICA), the Italian representative in the IFIP (International Federation for Information Processing) Technical Committee 11 (TC-11) on "EDP Security". She is a member of the Steering Committee of: ACM Conference on Computer and Communications Security (ACM-CCS), ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS), International Conference on Information Systems Security (ICISS), and International Conference on Information and Communications Security (ICICS).

She has served on the program committees of various conferences. She has served as Program Chair or co-Chair for: ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS'07), Annual Computer Security Applications Conference (ACSAC'04 -- ACSAC'08), European Symposium on Research in Computer Security (ESORICS'03 and ESORICS'04), ACM Workshop on Privacy in the Electronic Society (WPES'02-WPES'03), ACM Conference on Computer and Communications Security (CCS'01), IFIP TC-11 International Information Security Conference (SEC 2003 and SEC 2008), IFIP WG11.3 Working Conference on Database Security (DBSEC'96 and DBSEC'04).

She is a member of the editorial board of: ACM Transactions on Database Systems, ACM Transactions on the Web, ACM Computing Surveys, The Journal of Computer Security, International Journal of Information and Computer Security, Transactions on Data Privacy .
Today's society places great demand on dissemination and sharing of personal information. Information about us is collected every day, as we join associations or groups, shop for groceries, or execute most of our common daily activities. Pervasive and ubiquitous services allow us to enjoy the convenience of access whenever and wherever we are, but often increase the amount of information about us that is released. In addition, organizations, as well as end users are more and more resorting to external parties for storing and manage their data and resources. Such scenarios has brought to growing privacy concerns. In this talk, I will illustrate different issues related to the problem of protecting privacy in such emerging scenarios, where sensitive information may be directly or indirectly put at risk of disclosure, and discuss some emerging solutions and research directions.
Keynote Lecture 3                                                                                                                                         ICE-B  
e-Business Design: A Shift to Adaptability
  David A. Marca,
University of Phoenix,
United States
Brief Bio
David A. Marca is on the Adjunct Faculty at the University of Phoenix. His six books and 24 papers cover e-Business, e-Commerce, business process reengineering, and software engineering. He holds a patent in workflow technology. His last book, entitled “Open Process Frameworks: Patterns for the Adaptive e-Enterprise,” was published by the IEEE in 2006. David is also President of OpenProcess, Inc. – an e-Business consulting firm since 1997 – that helps firms implement workforce management and e-Business solutions. He has consulted in Italy, Norway, Mexico and the United States. David is a member of the Institute of Electrical and Electronic Engineers (IEEE), the Association for Computing Machinery (ACM), and the Project Management Institute (PMI).
The 2008 ICE-B keynote predicted economic downturn, and this is just starting to happen. As a result, some firms surveyed in early 2009 said that they have experienced decreases in customers, revenue and new business wins. The downturn has also intensified competition and increased demand for custom services. In reaction to this business situation, some companies are trying to alter their e-Business designs, and adaptability is emerging as a dominant design goal. For example, companies are attempting front-end redesigns to enable more adaptive offerings. Simultaneously, they are attempting back-end redesigns to accomplish better integration, more standardized operations, and faster decision making. In this 2009 ICE-B keynote, we will first explore the fundamentals of business design, and see how to create balanced designs for both business and e-Business. We will then present two possible balanced designs for more adaptable e-Business. Lastly we will discuss the role that social networks are expected to play in creating new market forces and possibly encouraging a new kind of e-Business to emerge.
Keynote Lecture 4                                                                                                                                         ICE-B  
                               Cloud Computing: Fundamental Architecture & Future Applications     
Frank Leymann,
University of Stuttgart,
Brief Bio
Since 2004, Frank Leymann is Professor for Computer Science and director, Institute of Architecture of Application Systems at University of Stuttgart, Germany. Before that he worked for IBM from 1984 on in various development positions, in 2000 he was nominated IBM Distinguished Engineer. He was Chief-Architect of IBM’s workflow/process management technology, responsible for the architecture of Grid- and On Demand Computing for IBM Software Group, finally co-leader of the Web Services Architecture Team and architect of IBM’s Service Bus; he is co-author of many Web Service specifications. His current research projects are on many aspects of service- and business process technology, and are funded by the European Community, the German Research Foundation, and the German Federal Ministry of Education and Research. Frank is (co-)author of more than 150 refereed publications and co-inventor of more than 40 patents filed.
We will show that SOA is the underpinning of Cloud Computing. Next, a phenomenological overview of *aaS is given and the layered architecture of Cloud technology is derived. The structure of applications running in the Cloud and their provisioning underpinnings is discussed. Finally, a list of major research problems to be solved in order to make the Cloud ubiquitous is given.  
Keynote Lecture 5                                                                                                                                         ICE-B  
Web 2.0: a buzzword, a serious development, just fun, or what?
Gottfried Vossen,
University of Muenster,
Brief Bio
Gottfried Vossen is a Professor of Computer Science in the Department of Information Systems and a Director of European Research Center for Information Systems at the University of Muenster in Germany. He received his master’s and Ph.D. degrees as well as the German habilitation in 1981, 1986, and 1990, resp., all from the Technical University of Aachen in Germany. He has held visiting positions at the University of California in San Diego, at several German universities including the Hasso-Plattner-Institute for Software Systems Engineering in Potsdam near Berlin, at Karlstad University in Sweden and at The University of Waikato in Hamilton, New Zealand in 2003 and again in 2006. In 2004 he became the European Editor-in-Chief of Elsevier's Information Systems - An International Journal, and a Director of the European Research Center for Information Systems (ERCIS) in Muenster. His research interests include conceptual as well as application-oriented problems concerning databases, information systems, electronic learning, the Semantic Web as well as Web 2.0. Dr. Vossen has been member in numerous program committees of international conferences and workshops. He is an author or co-author of more than 150 publications, and an author, co-author, or co-editor of more than 20 books on databases, business process modeling, the Web, e-commerce, and computer architecture. His most recent book Unleashing Web 2.0 – From Concepts to Creativity centers around the topic of this talk.
Since 2006, everything has its Release 2, Version 0, abbreviated „2.0“, e.g., Silicon Valley 2.0, Family 2.0, Gadgets 2.0, Pub 2.0, Jobs 2.0, Health 2.0 Entertainment 2.0, Business 2.0, Music 2.0, Enterprise 2.0, Marketing 2.0, Law 2.0, Education 2.0, etc. All of this is a consequence of the term “Web 2.0” which was created at O’Reilly Media. But what is behind this shorthand: is it just a buzzword, does it stand for a serious development, is it just for fun, or what? This talk will discuss the core developments that have led to what is currently termed “Web 2.0”: net infrastructure, advances in programming, rich interactive functionality, large data collections, and user participation as well as socialization. For all of these, there are roots in the “earlier” Web, some of which are even more than 10 years old, but only their recent confluence has resulted in the hype we are currently experiencing. The talk will not only look at Web 2.0 from the perspective of a user having new forms of fun and enjoying a host of new services, but will also outline the impact this is having on enterprises, and sketch legal issues that are often overlooked.