posted by user: tell || 4367 views || tracked by 9 users: [display]

DPM 2013 : The 8th DPM International Workshop on Data Privacy Management

FacebookTwitterLinkedInGoogle

Link: http://research.icbnet.ntua.gr/DPM2013/
 
When Sep 12, 2013 - Sep 13, 2013
Where Egham, UK, at Royal Holloway, University
Submission Deadline Jun 14, 2013
Notification Due Jul 15, 2013
Final Version Due Aug 12, 2013
Categories    privacy   management   cryptography
 

Call For Papers

Welcome to the 8th DPM International Workshop on Data Privacy Management

Scope

Organizations are increasingly concerned about the privacy of information that they manage (several people have filed lawsuits against organizations violating the privacy of customer's data). Thus, the management of privacy-sensitive information is very critical and important for every organization. This poses several challenging problems, such as how to translate the high-level business goals into system-level privacy policies, administration of privacy-sensitive data, privacy data integration and engineering, privacy access control mechanisms, information-oriented security, and query execution on privacy-sensitive data for partial answers.
Topics

The aim of this workshop is to discuss and exchange the ideas related to privacy data management. We invite papers from researchers and practitioners working in privacy, security, trustworthy data systems and related areas to submit their original papers in this workshop. The main topics, but not limited to, include:

Privacy Information Management
Privacy Policy-based Infrastructures and Architectures
Privacy-oriented Access Control Languages and Models
Privacy in Trust Management
Privacy Data Integration
Privacy Risk Assessment and Assurance
Privacy Services
Privacy Policy Analysis
Cryptography
Cryptanalysis
Query Execution over Privacy Sensitive Data
Privacy Preserving Data Mining
Hippocratic and Water-marking Databases
Privacy for Integrity-based Computing
Privacy Monitoring and Auditing
Privacy in Social Networks
Privacy in Ambient Intelligence (AmI) Applications
Individual Privacy vs. Corporate/National Security
Code-based Cryptology
Privacy in computer networks
Privacy and RFIDs
Privacy in sensor networks

Previous Editions

7th International DPM Workshop on Data Privacy Management, co-located with ESORICS 2012 in Pisa, Italy, September 2012.
6th International DPM Workshop on Data Privacy Management, co-located with ESORICS 2011 in Leuven, Belgium, September 2011.
5th International DPM Workshop on Data Privacy Management, co-located with ESORICS 2010 in Athens, Greece, September 2010.
4th International DPM Workshop on Data Privacy Management, co-located with ESORICS 2009 in Saint Malo, France, September 2009.


Venue

This eight edition of the DPM workshop will be held in Egham, UK, at Royal Holloway, University of London, the 12th and 13th of September 2013, in conjunction with the 18th annual European research event in Computer Security (ESORICS 2013) symposium.

In the ESORICS 2013 website, you can find all the information regarding the venue, accomodation, and travel. If you have any questions do not heasitate to contact us.

Related Resources

DPM 2020   Discriminative Pattern Mining Workshop
SPIoT 2020   9th International Symposium on Security and Privacy on the Internet of Things
DPM 2020   15th International Workshop on Data Privacy Management
MathSJ 2020   Applied Mathematics and Sciences: An International Journal
ITAS--EI Compendex, Scopus 2021   2021 Information Technology & Applications Symposium (ITAS 2021)--EI Compendex, Scopus
ACNS 2021   19th International Conference on Applied Cryptography and Network Security
AI, Data Analytics and Blockchain JIEM 2020   Emerging Trends and Impacts of the rise of AI, Data Analytics and Blockchain, Journal of Enterprise Information Management (JIEM, Q1)
IJCIS 2020   International Journal on Cryptography and Information Security
WSIM--Ei, Scopus 2021   2021 International Workshop on Information Management (WSIM 2021)--Ei Compendex, Scopus
JISA-CYBER-SEC 2020   Special Issue on Trends in Cybersecurity, Journal of Information Security and Applications, Elsevier