[crypto] [pieter@cs.utwente.nl: FW: CFP Toronto Workshop]
R. Hirschfeld
ray@unipay.nl
Tue, 3 Aug 2004 12:01:06 +0200
------- Start of forwarded message -------
======================
CALL FOR PARTICIPATION
======================
VLDB 2004 Workshop "Secure Data Management in a Connected World"
http://www.extra.research.philips.com/sdm-workshop/
August 30, 2004
Royal York Hotel
Toronto, Canada
In Conjunction with VLDB 2004 www.vldb04.org
*******************************************************************
!!!!!! Advance Registration by July 26, 2004 !!!!!!!
- -------------------------------------------------------------------
On-line registration (and other information) at
https://oak.cpsc.ucalgary.ca/VLDB2004_registration/index.php
http://www.vldb04.org/
http://www.extra.research.philips.com/sdm-workshop/
- -------------------------------------------------------------------
Participants of the workshop do not have to register for the main
VLDB conference. However, workshop attendees who also register for
the VLDB conference will get a discount in registration fee.
*******************************************************************
Concepts like ubiquitous computing and ambient intelligence that
exploit increasingly interconnected networks and mobility put new
requirements on data management. An important element in the
connected world is that data will be accessible anytime
anywhere. This also has its downside in that it becomes easier to
get unauthorized data access. Furthermore, it will become easier
to collect, store, and search personal information and endanger
peoples' privacy. As a result security and privacy of data becomes
more and more of an issue. Therefore, secure data management, which
is also privacy-enhanced, turns out to be a challenging goal that
will also seriously influence the acceptance of ubiquitous computing
and ambient intelligence concepts by society.
The SDM workshop will bring together people from the security research
community and data management research community in order to exchange
ideas on the secure management of data in the context of emerging
networked services and applications. The workshop will provide forum
for discussing practical experiences and theoretical research efforts
that can help in solving these critical problems in secure data
management.
=======
PROGRAM
=======
8.30 - 9.00 Keynote
Sovereign Information Sharing and Mining in a Connected World,
Rakesh Agrawal, IBM Almaden Research Center, USA
9.00 - 10.40 Research Session 1: Encrypted Data Access (4 papers)
1. Securing the Privacy of Outsourced Tree Data in the Presence
of Correlated Queries,
Ping Lin, K. Selcuk Candan (Arizona State University, USA)
2. Using secret sharing for searching in encrypted data,
Richard Brinkman, Jeroen Doumen, Willem Jonker (University of Twente,
The Netherlands)
3. A Structure Preserving Database Encryption Scheme,
Yuval Elovici, Erez Shmueli, Ronen Waisenberg, Ehud Gudes,
(Ben-Gurion University of the Negev, Israel)
4. Modeling Integrity in Data Exchange,
Gerome Miklau, Dan Suciu (University of Washington, USA)
10.40 - 11.00 Break
11.00 - 12.40 Research Session 2: Privacy Preserving Data Management
(4 papers)
1. Experimental Analysis of Privacy-Preserving Statistics Computation,
Hiranmayee Subramaniam, Rebecca N. Wright, Zhiqiang Yang (Stevens
Institute of Technology, USA)
2. Achieving Privacy Preservation When Sharing Data For Clustering,
Stanley Oliveira, Osmar Zaiane (University of Alberta, Canada)
3. Privacy Preserving Digital Rights Management,
Claudine Conrado, Milan Petkovic, Willem Jonker (Philips Research,
The Netherlands)
4. Management of Private Data: Addressing User Privacy and Economic,
Social, and Ethical Concerns,
Dawn Jutla (Saint Mary University, Canada)
Peter Bodorik, Deyun Gao (Dalhousie University, Canada)
12.40 - 13.40 Lunch
13.40 - 15.40 Research Session 3: Access Control (5 papers)
1. PeerTrust: Automated Trust Negotiation for Peers on the Semantic Web,
Wolfgang Nejdl, Daniel Olmedilla (University of Hannover, Germany),
Marianne Winslett (University of Illinois at Urbana-Champaign, USA)
2. A Flexible Framework for Architecting XML Access Control Enforcement
Mechanisms,
Bo Luo, Dongwon Lee, Wang-Chien Lee, Peng Liu, (The Pennsylvania State
University, USA)
3. Abstracting and Refining Authorization in SQL,
Arnon Rosenthal (The MITRE Corporation, USA), Edward Sciore (Boston
College, USA)
4. A Classifier-based Approach to User-Role Assignment for Web
Applications,
Shengli Sheng, Sylvia L. Osborn (The University of Western Ontario,
Canada)
5. LTAM: A location-temporal authorization model,
Hai Yu, Ee-Peng Lim (Nanyang Technological University, Singapore)
15.40 - 16.00 Break
16.00 - 17.00 Research Session 4: Database Security (2 papers)
1. Identifying Sensitive Associations in Databases for Release
Control,
Claudio Bettini (Universit`a di Milano Italy), X. Sean Wang (University
of Vermont, USA), Sushil Jajodia (George Mason University, USA)
2. Using Delay to Defend Against Database Extraction,
Magesh Jayapandian, Brian Noble, H. V. Jagadish, James Mickens
(University of Michigan, USA)
17.00 - 18.00 Panel Session
- ---------------------------------------------------------------------------
Prof.dr. Willem Jonker
Department Head Information & System Security
Philips Research Eindhoven
Building WY-7.39
Prof.Holstlaan 4
5656 AA Eindhoven - The Netherlands
t. (+31 40 27) 42831
f. (+31 40 27) 46622
- ---------------------------------------------------------------------------
------- End of forwarded message -------