Call for Participation: DPM 2017 -- 12th International Workshop on Data Privacy Management, held in conjunction with ESORICS 2017, Oslo, Norway, September 14-15, 2017

(apologies for cross-posting)

=======================================================================
DPM 2017:   CALL FOR PARTICIPATION
12th International Workshop on Data Privacy Management,

co-located with ESORICS 2017, Oslo, Norway, September 14-15, 2017.

http://deic.uab.cat/conferences/dpm/dpm2017/
=======================================================================


SCOPE
======

Organizations are increasingly concerned about the privacy of
information that they manage (several people have filed lawsuits
against organizations violating the privacy of customer's data). Thus,
the management of privacy-sensitive information is very critical and
important for every organization. This poses several challenging
problems, such as how to translate the high-level business goals into
system-level privacy policies, administration of privacy-sensitive
data, privacy data integration and engineering, privacy access control
mechanisms, information-oriented security, and query execution on
privacy-sensitive data for partial answers.


PROGRAM
=======

Thursday September 14

09:15-09:15 General Welcome

09:15-10:30  Keynote: Privacy models and disclosure risk: integral privacy
by Vicenc Torra (University of Skovde, Sweden)

11:00-12:30 Session 1: Privacy, logics, and computational models

   - A Proof Calculus for Attack Trees in Isabelle
     By Florian Kammueller (Middlesex University London and TU Berlin)

   - Confidentiality of Interactions in Concurrent Object-Oriented Systems
     By Olaf Owe (University of Oslo), Toktam Ramezanifarkhani
(University of Oslo)

   - Using Oblivious RAM in Genomic Studies.
     By Nikolaos Karvelas (TU Darmstadt), Andreas Peter (University of
Twente),
        Stefan Katzenbeisser (TU Darmstadt)

14:00-15:30 Session 2: Privacy and encrypted search

   - Towards Efficient and Secure Encrypted Databases: Extending
     Message-Locked Encryption in Three-Party Model.
     By Yuuji Furuta (Osaka University), Naoto Yanai (Osaka University),
        Masashi Karasaki (Nippon Telegraph and Telephone West Corporation),
        Katsuhiko Eguchi (Nippon Telegraph and Telephone West Corporation),
        Yasunori Ishihara (Osaka University), Toru Fujiwara (Osaka
University)

   - Searchable Encrypted Relational Databases: Risks and Countermeasures
     By Mohamed Ahmed Abdelraheem (SICS), Tobias Andersson (SICS), Christian
        Gehrmann (Lund University)

   - Private verification of access on medical data: an initial study
     By Thais Bardini Idalino (University of Ottawa), Dayana Spagnuelo
(University of Luxembourg),
        Jean Everson Martina (Universidade Federal de Santa Catarina)


16:00-17:30 Session 3: Data Privacy, data mining, and applications

   - Default Privacy Setting Prediction by Grouping User's Attributes
     and Settings Preferences
     By Toru Nakamura (KDDI Research, Inc.), Welderufael Berhane Tesfay
(Goethe University Frankfurt),
        Shinsaku Kiyomoto (KDDI Research, Inc.), Jetzabel Serna (Goethe
University Frankfurt)

   - Bounding Privacy Leaks in Privacy Preserving Data Mining.
     By Zhizhou Li (The Voleon Group), Ten H. Lai (The Ohio State
University)

   - Threshold Single Password Authentication
     By Devris Isler (Koc University), Alptekin Kupcu (Koc University)

   - Towards A Toolkit for Utility and Privacy-Preserving Transformation of
     Semi-structured Data Using Data Pseudonymization
     By Saffija Kasem-Madani (University of Bonn), Michael Meier
(University of Bonn),
        Martin Wehner (University of Bonn)

18:30-20:00 Aperitif in Gamle Museet


Friday September 15

09:00-10:30  Session 4: User privacy

   - Privacy Dashcam - Towards Lawful Use of Dashcams Through Enforcement
     of External Anonymization
     By Paul Wagner (Karlsruhe Institute of Technology), Pascal
        Birnstill (Fraunhofer IOSB), Erik Krempel (Fraunhofer IOSB),
        Sebastian Bretthauer (Karlsruhe Institute of Technology),
        Jurgen Beyerer (Fraunhofer IOSB).

   - DLoc: Distributed Auditing for Data Location Compliance in Cloud
     By Mojtaba Eskandari (University of Trento), Bruno Crispo
(University of Trento),
        Anderson Santana De Oliveira (SAP).

   - Inonymous: Anonymous Invitation-Based System
     By Sanaz Taheri Boshrooyeh (Koc University), Alptekin Kupcu (Koc
University)


11:00-12:40 Session 5: Applied Cryptography and Privacy

   - PCS, a privacy-preserving certification scheme
     By Nesrine Kaaniche (Telecom SudParis), Maryline Laurent (Telecom
SudParis),
        Pierre-Olivier Rocher (Telecom SudParis), Christophe Kiennert
(Telecom SudParis),
        Joaquin Garcia-Alfaro (Telecom SudParis)

   - Order-Preserving Encryption Using Approximate Integer Common Divisors
     By James Dyer (University of Manchester), Martin Dyer (University
of Leeds),
        Jie Xu (University of Leeds).

   - Privacy-Preserving Deterministic Automata Evaluation with Encrypted
Data Blocks
     By Giovanni Di Crescenzo (Vencore Labs), Brian Coan (Vencore Labs),
        Jonathan Kirsch (Vencore Labs)


12:40-14:00 Lunch & Farewell



REGISTRATION
============

Registration information is available at:

https://ntnu.eventsair.com/esorics/esorics2017/Site/Register


HOTEL AND TRAVEL
================

The workshop will be held in Oslo, Norway, in conjunction with
the 22nd annual European research event in Computer Security
(ESORICS 2017) symposium.

More information about travel and registration is available on
the ESORICS 2017 website at http://www.ntnu.edu/esorics2017/.

Accommodation and venue information is also available from the
ESORICS 2017 website at:

  - http://www.ntnu.edu/web/esorics2017/travel-accomodation/


MORE INFORMATION
================

Additional information is available at:

http://deic.uab.cat/conferences/dpm/dpm2017/

Received on Wednesday, 6 September 2017 16:52:33 UTC