[crypto] [pieter@cs.utwente.nl: FW: CFP Toronto Workshop]

R. Hirschfeld ray@unipay.nl
Tue, 3 Aug 2004 12:01:06 +0200


------- Start of forwarded message -------
======================
CALL FOR PARTICIPATION
======================

VLDB 2004 Workshop "Secure Data Management in a Connected World"
http://www.extra.research.philips.com/sdm-workshop/

August 30, 2004
Royal York Hotel
Toronto, Canada
In Conjunction with VLDB 2004 www.vldb04.org

*******************************************************************
      !!!!!! Advance Registration by July 26, 2004 !!!!!!!
- -------------------------------------------------------------------
      On-line registration (and other information) at
      https://oak.cpsc.ucalgary.ca/VLDB2004_registration/index.php
      http://www.vldb04.org/
      http://www.extra.research.philips.com/sdm-workshop/
- -------------------------------------------------------------------
Participants of the workshop do not have to register for the main 
VLDB conference. However, workshop attendees who also register for
the VLDB conference will get a discount in registration fee.
*******************************************************************

Concepts like ubiquitous computing and ambient intelligence that 
exploit increasingly interconnected networks and mobility put new 
requirements on data management. An important element in the 
connected world is that data will be accessible anytime 
anywhere. This also has its downside in that it becomes easier to 
get unauthorized data access. Furthermore, it will become easier 
to collect, store, and search personal information and endanger 
peoples' privacy. As a result security and privacy of data becomes 
more and more of an issue. Therefore, secure data management, which 
is also privacy-enhanced, turns out to be a challenging goal that 
will also seriously influence the acceptance of ubiquitous computing 
and ambient intelligence concepts by society.

The SDM workshop will bring together people from the security research 
community and data management research community in order to exchange 
ideas on the secure management of data in the context of emerging 
networked services and applications. The workshop will provide forum 
for discussing practical experiences and theoretical research efforts 
that can help in solving these critical problems in secure data 
management. 

=======
PROGRAM
=======

8.30 - 9.00 Keynote
Sovereign Information Sharing and Mining in a Connected World,
Rakesh Agrawal, IBM Almaden Research Center, USA

9.00 - 10.40 Research Session 1: Encrypted Data Access (4 papers)

1. Securing the Privacy of Outsourced Tree Data in the Presence 
of Correlated Queries,
Ping Lin, K. Selcuk Candan (Arizona State University, USA)

2. Using secret sharing for searching in encrypted data,
Richard Brinkman, Jeroen Doumen, Willem Jonker (University of Twente, 
The Netherlands)

3. A Structure Preserving Database Encryption Scheme,
Yuval Elovici, Erez Shmueli, Ronen Waisenberg, Ehud Gudes, 
(Ben-Gurion University of the Negev, Israel)

4. Modeling Integrity in Data Exchange,
Gerome Miklau, Dan Suciu (University of Washington, USA)

10.40 - 11.00 Break

11.00 - 12.40 Research Session 2: Privacy Preserving Data Management 
(4 papers)

1. Experimental Analysis of Privacy-Preserving Statistics Computation,
Hiranmayee Subramaniam, Rebecca N. Wright, Zhiqiang Yang (Stevens 
Institute of Technology, USA)

2. Achieving Privacy Preservation When Sharing Data For Clustering,
Stanley Oliveira, Osmar Zaiane (University of Alberta, Canada)

3. Privacy Preserving Digital Rights Management,
Claudine Conrado, Milan Petkovic, Willem Jonker (Philips Research, 
The Netherlands)

4. Management of Private Data: Addressing User Privacy and Economic, 
Social, and Ethical Concerns,
Dawn Jutla (Saint Mary University, Canada)
Peter Bodorik, Deyun Gao (Dalhousie University, Canada)

12.40 - 13.40 Lunch

13.40 - 15.40 Research Session 3: Access Control (5 papers)

1. PeerTrust: Automated Trust Negotiation for Peers on the Semantic Web,
Wolfgang Nejdl, Daniel Olmedilla (University of Hannover, Germany), 
Marianne Winslett (University of Illinois at Urbana-Champaign, USA)

2. A Flexible Framework for Architecting XML Access Control Enforcement 
Mechanisms,
Bo Luo, Dongwon Lee, Wang-Chien Lee, Peng Liu, (The Pennsylvania State 
University, USA)

3. Abstracting and Refining Authorization in SQL,
Arnon Rosenthal (The MITRE Corporation, USA), Edward Sciore (Boston 
College, USA)

4. A Classifier-based Approach to User-Role Assignment for Web 
Applications,
Shengli Sheng, Sylvia L. Osborn (The University of Western Ontario, 
Canada)

5. LTAM: A location-temporal authorization model,
Hai Yu, Ee-Peng Lim (Nanyang Technological University, Singapore)

15.40 - 16.00 Break

16.00 - 17.00 Research Session 4: Database Security (2 papers)

1. Identifying Sensitive Associations in Databases for Release 
Control,
Claudio Bettini (Universit`a di Milano Italy), X. Sean Wang (University 
of Vermont, USA), Sushil Jajodia (George Mason University, USA)

2. Using Delay to Defend Against Database Extraction,
Magesh Jayapandian, Brian Noble, H. V. Jagadish, James Mickens 
(University of Michigan, USA)

17.00 - 18.00 Panel Session

- ---------------------------------------------------------------------------

Prof.dr. Willem Jonker
Department Head Information & System Security
Philips Research Eindhoven
Building WY-7.39
Prof.Holstlaan 4
5656 AA Eindhoven - The Netherlands
t. (+31 40 27) 42831
f. (+31 40 27) 46622

- ---------------------------------------------------------------------------
------- End of forwarded message -------