posted by user: gnav || 7440 views || tracked by 10 users: [display]

DPM 2015 : Data Privacy Management, 10th Internation Workshop

FacebookTwitterLinkedInGoogle

Link: http://deic.uab.cat/conferences/dpm/dpm2015/
 
When Sep 21, 2015 - Sep 22, 2015
Where Vienna, Austria
Submission Deadline Jun 1, 2015
Notification Due Aug 15, 2015
Final Version Due Sep 5, 2015
Categories    privacy   security
 

Call For Papers

========================================================================
Call for Papers

DPM 2015, 10th International Workshop on
DATA PRIVACY MANAGEMENT,

http://deic.uab.cat/conferences/dpm/dpm2015/

Vienna, Austria, September 21-22, 2015
(co-located with ESORICS'2015)
Springer LNCS Proceedings

========================================================================

========================================================================
Important Dates

* Paper Submission Deadline: June 1, 2015
* Acceptance Notification: August 15, 2015
* Camera Ready Version: September 5, 2015

========================================================================

Scope: Organizations are increasingly concerned about the privacy of
information that they manage (several people have filed lawsuits
against organizations violating the privacy of customer's data). Thus,
the management of privacy-sensitive information is very critical and
important for every organization. This poses several challenging
problems, such as how to translate the high-level business goals into
system-level privacy policies, administration of privacy-sensitive
data, privacy data integration and engineering, privacy access control
mechanisms, information-oriented security, and query execution on
privacy-sensitive data for partial answers.

Topics: The aim of this workshop is to discuss and exchange the ideas
related to privacy data management. We invite papers from researchers
and practitioners working in privacy, security, trustworthy data
systems and related areas to submit their original papers in this
workshop. The main topics, but not limited to, include:

* Privacy Information Management
* Privacy Policy-based Infrastructures and Architectures
* Privacy-oriented Access Control Languages and Models
* Privacy in Trust Management
* Privacy in Digital Currencies
* Privacy Data Integration
* Privacy Risk Assessment and Assurance
* Privacy Services
* Cryptography and Cryptanalysis
* Privacy Policy Analysis
* Query Execution over Privacy Sensitive Data
* Privacy Preserving Data Mining
* Hippocratic and Water-marking Databases
* Privacy for Integrity-based Computing
* Privacy Monitoring and Auditing
* Privacy in Social Networks
* Privacy in Ambient Intelligence (AmI) Applications
* Individual Privacy vs. Corporate/National Security
* Privacy in computer networks
* Privacy and RFIDs
* Privacy and Big Data
* Privacy in sensor networks

========================================================================

Submission guidelines: Full papers should be at most 16
pages (using 11-point font), including the bibliography. Position
papers, as well as shoort papers, should be at most 8
pages (using 11-point font), including the bibliography. Authors
should indicate whether their paper is a position paper to
differentiate them from regular ones (just mention /position paper/
in the title). Program Committee members are not required to read
the appendices, so the paper should be intelligible without them.
All submissions must be written in English.

Authors must submit their papers by the deadline indicated below,
using the EasyChair web site (at easychair.org/conferences/?conf=dpm2015)
and following the requirements stated there.

The submitted paper (in PDF format) should follow the template
indicated by Springer (see http://springer.de/comp/lncs/authors.html).
It must start with a title, a short abstract, names and affiliations
of the authors, and a list of keywords.

All papers will be refereed. Accepted papers should be presented at
the Workshop. At least one author of each accepted paper must register
to the workshop, by the early date indicated by the organizers, and
present the paper.

As in previous editions, the proceedings are expected to be published
in a volume of the Lecture Notes in Computer Science series of Springer.

Submissions by PhD students as well as controversial ideas are
encouraged. Case studies (successful or not) are also encouraged.

========================================================================

General Chairs:

* Josep Domingo-Ferrer (Universitat Rovira i Virgili)
* Vicenc Torra (University of Skovde)

Program Committee Chairs:

* Joaquin Garcia-Alfaro (Telecom SudParis)
* Guillermo Navarro-Arribas (Autonomous University of Barcelona)

Program Committee:

* Rainer Bohme (University of Munster)
* Jordi Castella-Roca (Universitat Rovira i Virgili)
* Frederic Cuppens (Telecom Bretagne)
* Nora Cuppens (Telecom Bretagne)
* David Evans (University of Derby)
* Sara Foresti (University of Milan)
* Sebastien Gambs (University of Rennes)
* Paolo Gasti (New York Institute of Technology)
* Stefanos Gritzalis (University of the Aegean)
* Marit Hansen (Unabhangiges Landeszentrum fur Datenschutz)
* Jordi Herrera-Joancomarti (Universitat Autonoma de Barcelona)
* Sokratis Katsikas (University of Piraeus)
* Evangelos Kranakis (Carleton University)
* Fabio Martinelli (IIT-CNR)
* Chris Mitchell (Royal Holloway)
* Anna Monreale (University of Pisa)
* Maryline Laurent (Telecom SudParis)
* Georgios Lioudakis (National Technical University of Athens)
* Giovanni Livraga (University of Milan)
* Javier Lopez (University of Malaga)
* Sotirios Maniatis (Hellenic Authority for Communications Privacy)
* Melek Onen (EURECOM)
* Cristina Perez-Sola (Autonomous University of Barcelona)
* Silvio Ranise (FBK, Security and Trust Unit, Trento)
* Kai Rannenberg (Goethe University)
* Pierangela Samarati (University of Milan)
* David Sanchez (Universitat Rovira i Virgili)
* Claudio Soriente (ETH Zurich)
* Alessandro Sorniotti (IBM Research)
* Traian Marius-Truta (Northern Kentucky University)
* Yasuyuki Tsukada (NTT Communication Science Laboratories)
* Alexandre Viejo (Universitat Rovira i Virgili)
* Jens Weber (University of Victoria)
* Lena Wiese (University of Gottingen)
* Nicola Zannone (Eindhoven University of Technology)

=======================================
FURTHER INFORMATION
=======================================

Additional information about paper submission and conference topics and
events can be found at the DPM 2015 web site:
http://deic.uab.cat/conferences/dpm/dpm2015/

Related Resources

ICTC--SCI 2025   2025 6th Information Communication Technologies Conference (ICTC 2025)--SCI
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ICIME--EI 2025   2025 13th International Conference on Information Management and Engineering (ICIME 2025)
BIBC 2024   5th International Conference on Big Data, IOT and Blockchain
ICIME 2025   2025 13th International Conference on Information Management and Engineering (ICIME 2025)
EEI 2024   10th International Conference on Emerging Trends in Electrical, Electronics & Instrumentation Engineering
BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
BDE--EI 2025   2025 7th International Conference on Big Data Engineering (BDE 2025)
MATHCS 2024   2nd International Conference on Mathematics, Computer Science & Engineering