AOH :: ISNQ5442.HTM

Deadline extension: 5th VLDB Workshop on Secure DataManagement




Deadline extension: 5th VLDB Workshop on Secure DataManagement
Deadline extension: 5th VLDB Workshop on Secure DataManagement



Forwarded from: Petkovic 

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Due to a number of requests the submission deadline is extended to April 14, 2008
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

5th VLDB Workshop on Secure Data Management (SDM)
- with a special session on security and privacy in healthcare -
August 24, 2008, Auckland, New Zealand
http://www.hitech-projects.com/sdm-workshop/sdm08.html 

In conjunction with 34th International Conference on Very Large Databases
August 24-30, 2008, Auckland, New Zealand
https://www.cs.auckland.ac.nz/research/conferences/vldb08/index.php/VLDB_08 

The 5th SDM workshop builds upon the success of the first four 
workshops, which were organized in conjunction with VLDB 2004 in 
Toronto, Canada, VLDB 2005 in Trondheim, Norway, VLDB 2006 in Seoul, 
Korea, and VLDB 2007 in Vienna, Austria.

NEWS

It is our pleasure to announce an invited talk by Prof.Dr. X. Sean Wang of 
University of Vermont.

INVITED TALK
X. Sean Wang, Sushil Jajodia, Claudio Bettini
Title: How anonymous is k-anonymous? Look at your quasi-ID
Abstract: In relational microdata publication, the concept of 
k-anonymity has been one of the prevalent formal notions used in 
evaluating the anonymity provided by privacy preserving techniques. The 
notion of quasi-ID is in the basis of k-anonymity. While most authors 
rigorously validate their anonymization techniques against the 
k-anonymity notion, they tend to treat quasi-ID rather informally. In 
this talk, we will revisit and formalize the notion of quasi-ID. We will 
provide evidence showing that (1) quasi-ID must be used carefully in 
order to achieve the intended anonymity, and (2) precise definition of 
quasi-ID can help produce more useful data while achieving the intended 
anonymity.

Travel Grants
Thanks to support from the UNESCO Chair in Data Privacy, we are able to 
offer three grants to offset some of the costs associated with attending 
the SDM workshop for participants coming from "transition" countries", 
which are nations other than the USA, Canada, Western Europe, New 
Zealand, Australia, Japan and South Korea.

Motivation
Although cryptography and security techniques have been around for quite 
some time, emerging technologies such as ubiquitous computing and 
ambient intelligence that exploit increasingly interconnected networks, 
mobility and personalization, put new requirements on security with 
respect to data management. As data is accessible anytime anywhere, 
according to these new concepts, it becomes much easier to get 
unauthorized data access. Furthermore, it becomes simpler to collect, 
store, and search personal information and endanger people's privacy. 
Therefore, research in the area of secure data management is of growing 
importance, attracting attention of both the data management and 
security research communities. The interesting problems range from 
traditional ones such as, access control (with all variations, like 
dynamic, context-aware, role-based), database security (e.g. efficient 
database encryption schemes, search over encrypted data, etc.), privacy 
preserving data mining to controlled sharing of data.

This year, we will continue with a tradition to have a special session 
devoted to secure data management in healthcare. Data security and 
privacy issue are traditionally important in the medical domain. 
However, recent developments and increasing deployment of IT in 
healthcare such as the introduction of electronic health records and 
extramural applications in the personal health care domain, pose new 
challenges towards the protection of medical data. In contrast to other 
domains, such as financial, which can absorb the cost of the abuse of 
the system, healthcare cannot. Once sensitive information about 
individual's health problems is uncovered and social damage is done, 
there is no way to revoke the information or to restitute the 
individual. In addition to this, the medical field has some other 
specific characteristics, such as long-term value of medical data and 
flexibility with respect to, on one hand confidentiality, and on the 
other hand availability of medical data in the case of emergency.


Aim
The aim of the workshop is to bring together people from the security 
research community and data management research community in order to 
exchange ideas on the secure management of data. This year an additional 
special session will be organized with the focus on secure and private 
data management in healthcare. The workshop will provide forum for 
discussing practical experiences and theoretical research efforts that 
can help in solving the critical problems in secure data management. 
Authors from both academia and industry are invited to submit papers 
presenting novel research on the topics of interest (see below).

Topics
Topics of interest include (but are not limited to) the following:
- Secure Data Management
- Database Security
- Data Anonymization/Pseudonymization
- Data Hiding
- Metadata and Security
- XML Security
- Authorization and Access Control
- Data Integrity
- Privacy Preserving Data Mining
- Statistical Database Security
- Control of Data Disclosure
- Private Information Retrieval
- Secure Auditing
- Search on Encrypted Data
- Digital and Enterprise Rights Management
- Multimedia Security and Privacy
- Private Authentication
- Identity Management
- Privacy Enhancing Technologies
- Security and Semantic Web
- Security and Privacy in Ubiquitous Computing
- Security and Privacy of Health Data
- Watermarking 
- Trust Management
- Policy Management
- Applied Cryptography
- Web Service Security


Format of the workshop and proceedings
Te workshop will be organized in conjunction with the VLDB conference. 
Also, it is the intention to publish the proceedings in the 
Spinger-Verlag Lecture Notes on Computer Science series as it was done 
for the first four workshops. Additionally, we also want to select the 
best papers with the intent to publish their extended and revised 
versions in a special edition of a journal (as it was done for the SDM 
2007 workshop with the Journal of Computer Security).


Paper submission
Authors are invited to submit original, unpublished research papers that 
are not being considered for publication in any other forum. Manuscripts 
should be submitted electronically as PDF or PS files via email to 
al_sdm05 (at) natlab.research.philips.com Full papers should not exceed 
fifteen pages in length (formatted using the camera-ready templates of 
Springer Lecture Notes in Computer Science).

We also encourage submitting position statement papers describing 
research work in progress or lessons learned in practice (max six 
pages). Submissions must be received no later than April 14, 2008. 
Please check the workshop page for further information and submission 
instructions: http://www.extra.research.philips.com/sdm-workshop/ 


Important dates 
Submission deadline: April 14, 2008
Notification of acceptance or rejection: May 15, 2008
Final versions due: June 1, 2008
Workshop: August 24, 2008
VLDB conference: August 24-30, 2008

Workshop organizers
Willem Jonker Philips Research / Twente University, Netherlands
Milan Petkovic Philips Research, Netherlands

Program Committee
Gerrit Bleumer, Francotyp-Postalia, Germany
Ljiljana Brankovic, University of Newcastle, Australia 
Sabrina De Capitani di Vimercati, University of Milan, Italy 
Andrew Clark, Queensland University of Technology, Australia
Ernesto Damiani, University of Milan, Italy 
Eric Diehl, Thomson Research, France 
Lee Dong Hoon, Korea university, Korea
Jeroen Doumen, Twente University, The Netherlands
Jan Eloff, University of Pretoria, South Africa
Csilla Farkas, University of South Carolina, USA 
Eduardo Fernndez-Medina, University of Castilla-La Mancha, Spain 
Elena Ferrari, Universit degli Studi dell'Insubria, Italy 
Simone Fischer-Hbner, Karlstad University, Sweden
Tyrone Grandison, IBM Almaden Research Center, USA 
Dieter Gollmann, Technische Universitt Hamburg-Harburg, Germany
Hakan Hacigumus, IBM Almaden Research Center, USA
Marit Hansen, Independent Centre for Privacy Protection, Germany
Min-Shiang Hwang, National Chung Hsing University, Taiwan
Mizuho Iwaihara, Kyoto University, Japan
Sushil Jajodia, George Mason University, USA
Ton Kalker, HP Labs, USA 
Marc Langheinrich, Institute for Pervasive Computing ETH Zurich, Switzerland
Nguyen Manh Tho, Vienna University of Technology, Austria
Nick Mankovich, Philips Medical Systems, USA
Sharad Mehrotra, University of California at Irvine, USA
Stig Frode Mjlsnes, Norwegian University of Science and Technology, Norway
Eiji Okamoto, University of Tsukuba, Japan
Sylvia Osborn, University of Western Ontario, Canada 
Gnther Pernul, University of Regensburg. Germany
Birgit Pfitzmann, IBM Zurich Research Lab, Switzerland
Bart Preneel, KU Leuven, Belgium 
Kai Rannenberg, Goethe University Frankfurt, Germany
Andreas Schaad, SAP Labs, France
Nicholas Sheppard, The University of Wollongong, Australia
Morton Swimmer, John Jay College of Criminal Justice/CUNY, USA
Clark Thomborson, University of Auckland, New Zealand
Sheng Zhong, State University of New York at Buffalo, USA


___________________________________________________      
Subscribe to InfoSec News
http://www.infosecnews.org/mailman/listinfo/isn 

Site design & layout copyright © 1986-2014 CodeGods