>
> 7th VLDB Workshop on Secure Data Management (SDM 2010)
> - with a special session on security and privacy in healthcare -
> http://www.hitech-projects.com/sdm-workshop/sdm10.html
>
> September 17, 2010
> Singapore
> In conjunction with 36th International Conference on Very Large Databases
> http://vldb2010.org/
>
> Latest news:
>
> Keynote Prof. Dr. Elisa Bertino
> Title: Assuring Data Trustworthiness - Concepts and Research Challenges
> Check the abstract at
> http://www.hitech-projects.com/sdm-workshop/sdm10.html.
>
> Workshop proceedings will be published by Springer in the LNCS series.
>
>
> Call for Papers:
>
> The 7th SDM workshop builds upon the success of the first six workshops,
> which were
> organized in conjunction with VLDB 2004 in Toronto, Canada, VLDB 2005 in
> Trondheim,
> Norway, VLDB 2006 in Seoul, Korea, VLDB 2007 in Vienna, Austria, VLDB 2008
> in
> Auckland, New Zealand, and VLDB 2009 in Lyon, France.
>
> Motivation
> Although cryptography and security techniques have been around for quite
> some time,
> emerging technologies such as ubiquitous computing and ambient intelligence
> that exploit
> increasingly interconnected networks, mobility and personalization, put new
> requirements
> on security with respect to data management. As data is accessible anytime
> anywhere,
> according to these new concepts, it becomes much easier to get unauthorized
> data
> access. Furthermore, it becomes simpler to collect, store, and search
> personal
> information and endanger people's privacy. Therefore, research in the area
> of secure
> data management is of growing importance, attracting attention of both the
> data
> management and security research communities. The interesting problems
> range from
> traditional ones such as, access control (with all variations, like
> dynamic, context-aware,
> role-based), database security (e.g. efficient database encryption schemes,
> search over
> encrypted data, etc.), privacy preserving data mining to controlled sharing
> of data.
>
> This year, we will continue with a tradition to have a special session
> devoted to secure
> data management in healthcare. Data security and privacy issue are
> traditionally
> important in the medical domain. However, recent developments and
> increasing
> deployment of IT in healthcare such as the introduction of electronic
> health records and
> extramural applications in the personal health care domain, pose new
> challenges towards
> the protection of medical data. In contrast to other domains, such as
> financial, which can
> absorb the cost of the abuse of the system, healthcare cannot. Once
> sensitive
> information about individual's health problems is uncovered and social
> damage is done,
> there is no way to revoke the information or to restitute the individual.
> In addition to this,
> the medical field has some other specific characteristics, such as
> long-term value of
> medical data and flexibility with respect to, on one hand confidentiality,
> and on the other
> hand availability of medical data in the case of emergency.
>
> Aim
> The aim of the workshop is to bring together people from the security
> research
> community and data management research community in order to exchange ideas
> on
> the secure management of data. This year an additional special session will
> be organized
> with the focus on secure and private data management in healthcare. The
> workshop will
> provide forum for discussing practical experiences and theoretical research
> efforts that
> can help in solving the critical problems in secure data management.
> Authors from both
> academia and industry are invited to submit papers presenting novel
> research on the
> topics of interest (see below).
>
> Topics
> Topics of interest include (but are not limited to) the following:
> - Secure Data Management
> - Database Security
> - Data Anonymization/Pseudonymization
> - Data Hiding
> - Metadata and Security
> - XML Security
> - Authorization and Access Control
> - Data Integrity
> - Privacy Preserving Data Mining
> - Statistical Database Security
> - Control of Data Disclosure
> - Private Information Retrieval
> - Secure Auditing
> - Search on Encrypted Data
> - Digital and Enterprise Rights Management
> - Multimedia Security and Privacy
> - Private Authentication
> - Identity Management
> - Privacy Enhancing Technologies
> - Security and Semantic Web
> - Security and Privacy in Ubiquitous Computing
> - Security and Privacy of Health Data
> - Watermarking
> - Trust Management
> - Policy Management
> - Applied Cryptography
>
> Format of the workshop and proceedings
> The workshop is organized in conjunction with the VLDB conference.
> Provisional program:
> 1. Invited talk Elisa Bertino: Assuring Data Trustworthiness - Concepts and
> Research Challenges
> 2. Presentation of papers with discussions
> 3. Special session on secure data management in healthcare
> 4. Panel discussion
> The proceedings will b epublished in the Spinger-Verlag Lecture Notes on
> Computer Science series as it was done for the first six workshops.
>
> Paper submission
> Authors are invited to submit original, unpublished research papers that
> are not being
> considered for publication in any other forum. Manuscripts should be
> submitted
> electronically as PDF or PS files via email to
> al_sdm05@natlab.research.philips.com
> Full papers should not exceed fifteen pages in length (formatted using the
> camera-ready
> templates of Springer Lecture Notes in Computer Science).
>
> We also encourage submitting position statement papers describing research
> work in
> progress or lessons learned in practice (max six pages). Submissions must
> be received
> no later than May 1, 2010. Please check the workshop page for further
> information and
> submission instructions:
> http://www.extra.research.philips.com/sdm-workshop/
>
> Duration: 1-day workshop
>
> Important dates
> Submission deadline: May 1, 2010
> Notification of acceptance or rejection: June 15, 2010
> Final versions due: July 15, 2010
> Workshop: September 17, 2010
> VLDB conference: September 13-17, 2010
>
> Program Committee
> Gerrit Bleumer, Francotyp-Postalia, Germany
> Ljiljana Brankovic, University of Newcastle, Australia
> Sabrina De Capitani di Vimercati, University of Milan, Italy
> Ernesto Damiani, University of Milan, Italy
> Eric Diehl, Tecnicolor, France
> Jeroen Doumen, Irdeto, The Netherlands
> Csilla Farkas, University of South Carolina, USA
> Elena Ferrari, Universit? degli Studi dell'Insubria, Italy
> Simone Fischer-Hubner, Karlstad University, Sweden
> Tyrone Grandison, IBM Almaden Research Center, USA
> Dieter Gollmann, Technische Universit?t Hamburg-Harburg, Germany
> Marit Hansen, Independent Centre for Privacy Protection, Germany
> Min-Shiang Hwang, National Chung Hsing University, Taiwan
> Mizuho Iwaihara, Waseda University, Japan
> Sushil Jajodia, George Mason University, USA
> Ton Kalker, HP Labs, USA
> Marc Langheinrich, University of Lugano (USI), Switzerland
> Nguyen Manh Tho, Vienna University of Technology, Austria
> Nick Mankovich, Philips Medical Systems, USA
> Sharad Mehrotra, University of California at Irvine, USA
> Stig Frode Mjaolsnes, Norwegian University of Science and Technology,
> Norway
> Eiji Okamoto, University of Tsukuba, Japan
> Sylvia Osborn, University of Western Ontario, Canada
> Gunther Pernul, University of Regensburg. Germany
> Birgit Pfitzmann, IBM Watson Research Lab, Switzerland
> Bart Preneel, KU Leuven, Belgium
> Kai Rannenberg, Goethe University Frankfurt, Germany
> Andreas Schaad, SAP Labs, France
> Jason Smith, Queensland University of Technology, Australia
> Morton Swimmer, John Jay College of Criminal Justice/CUNY, USA
> Clark Thomborson, University of Auckland, New Zealand
> Sheng Zhong, State University of New York at Buffalo, USA
>
>
> Workshop organizers
> Willem Jonker Philips Research / Twente University, Netherlands
> Milan Petkovic Philips Research / Eindhoven University, Netherlands
>
>
> The information contained in this message may be confidential and legally
> protected under applicable law. The message is intended solely for the
> addressee(s). If you are not the intended recipient, you are hereby notified
> that any use, forwarding, dissemination, or reproduction of this message is
> strictly prohibited and may be unlawful. If you are not the intended
> recipient, please contact the sender by return e-mail and destroy all copies
> of the original message.
>
_______________________________________________
Tccc mailing list
Tccc@lists.cs.columbia.edu
https://lists.cs.columbia.edu/cucslists/listinfo/tccc
2010-04-26
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment