HOME > °Ô½ÃÆÇ > ÇмúÇà»ç¹× ³í¹®¸ðÁý
 
 
SDM 2010, Deadlne: May 31, 2010 ·ù±ÙÈ£
  2010-05-04

7th VLDB Workshop on Secure Data Management (SDM 2010)


- with a special session on security and privacy in healthcare - http://www.hitech-projects.com/sdm-workshop/sdm10.html


 


September 17, 2010


Singapore


In conjunction with 36th International Conference on Very Large Databases http://vldb2010.org/


 


Latest news:


 


Dealine extended: May 31, 2010


 


Keynote Prof. Dr. Elisa Bertino


Title: Assuring Data Trustworthiness - Concepts and Research Challenges See abstract at http://www.hitech-projects.com/sdm-workshop/sdm10.html.


 


Workshop proceedings will be published by Springer in the LNCS series.


 


 


Call for Papers:


 


The 7th SDM workshop builds upon the success of the first six workshops, which were organized in conjunction with VLDB 2004 in Toronto, Canada, VLDB 2005 in Trondheim, Norway, VLDB 2006 in Seoul, Korea, VLDB 2007 in Vienna, Austria, VLDB 2008 in Auckland, New Zealand, and VLDB 2009 in Lyon, France.


 


Motivation


Although cryptography and security techniques have been around for quite some time, emerging technologies such as ubiquitous computing and ambient intelligence that exploit increasingly interconnected networks, mobility and personalization, put new requirements on security with respect to data management. As data is accessible anytime anywhere, according to these new concepts, it becomes much easier to get unauthorized data access. Furthermore, it becomes simpler to collect, store, and search personal information and endanger people¡¯s privacy. Therefore, research in the area of secure data management is of growing importance, attracting attention of both the data management and security research communities. The interesting problems range from traditional ones such as, access control (with all variations, like dynamic, context-aware, role-based), database security (e.g. efficient database encryption schemes, search over encrypted data, etc.), privacy preserving data mining to controlled sharing of data.


 


This year, we will continue with a tradition to have a special session devoted to secure data management in healthcare. Data security and privacy issue are traditionally important in the medical domain. However, recent developments and increasing deployment of IT in healthcare such as the introduction of electronic health records and extramural applications in the personal health care domain, pose new challenges towards the protection of medical data. In contrast to other domains, such as financial, which can absorb the cost of the abuse of the system, healthcare cannot. Once sensitive information about individual¡¯s health problems is uncovered and social damage is done, there is no way to revoke the information or to restitute the individual. In addition to this, the medical field has some other specific characteristics, such as long-term value of medical data and flexibility with respect to, on one hand confidentiality, and on the other hand availability of medical data in the case of emergency.


 


Aim


The aim of the workshop is to bring together people from the security research community and data management research community in order to exchange ideas on the secure management of data. This year an additional special session will be organized with the focus on secure and private data management in healthcare. The workshop will provide forum for discussing practical experiences and theoretical research efforts that can help in solving the critical problems in secure data management. Authors from both academia and industry are invited to submit papers presenting novel research on the topics of interest (see below).


 


Topics


Topics of interest include (but are not limited to) the following:


- Secure Data Management


- Database Security


- Data Anonymization/Pseudonymization


- Data Hiding


- Metadata and Security


- XML Security


- Authorization and Access Control


- Data Integrity


- Privacy Preserving Data Mining


- Statistical Database Security


- Control of Data Disclosure


- Private Information Retrieval


- Secure Auditing


- Search on Encrypted Data


- Digital and Enterprise Rights Management


- Multimedia Security and Privacy


- Private Authentication


- Identity Management


- Privacy Enhancing Technologies


- Security and Semantic Web


- Security and Privacy in Ubiquitous Computing


- Security and Privacy of Health Data


- Watermarking


- Trust Management


- Policy Management


- Applied Cryptography


 


Format of the workshop and proceedings


The workshop is organized in conjunction with the VLDB conference.


Provisional program:


1. Invited talk Elisa Bertino: Assuring Data Trustworthiness - Concepts and Research Challenges


2. Presentation of papers with discussions


3. Special session on secure data management in healthcare


4. Panel discussion


The proceedings will b epublished in the Spinger-Verlag Lecture Notes on


Computer Science series as it was done for the first six workshops.


 


Paper submission


Authors are invited to submit original, unpublished research papers that are not being


considered for publication in any other forum. Manuscripts should be submitted


electronically as PDF or PS files via email to al_sdm05@natlab.research.philips.com


Full papers should not exceed fifteen pages in length (formatted using the camera-ready


templates of Springer Lecture Notes in Computer Science).


 


We also encourage submitting position statement papers describing research work in


progress or lessons learned in practice (max six pages). Submissions must be received


no later than May 31, 2010. Please check the workshop page for further information and


submission instructions: http://www.extra.research.philips.com/sdm-workshop/


 


Duration: 1-day workshop


 


Important dates


Submission deadline: May 31, 2010


Notification of acceptance or rejection: June 20, 2010


Final versions due: July 10, 2010


Workshop: September 17, 2010


VLDB conference: September 13-17, 2010


 


Program Committee


Gerrit Bleumer, Francotyp-Postalia, Germany


Ljiljana Brankovic, University of Newcastle, Australia


Sabrina De Capitani di Vimercati, University of Milan, Italy


Ernesto Damiani, University of Milan, Italy


Eric Diehl, Tecnicolor, France


Jeroen Doumen, Irdeto, The Netherlands


Csilla Farkas, University of South Carolina, USA


Elena Ferrari, Universit? degli Studi dell'Insubria, Italy


Simone Fischer-Hubner, Karlstad University, Sweden


Tyrone Grandison, IBM Almaden Research Center, USA


Dieter Gollmann, Technische Universit?t Hamburg-Harburg, Germany


Marit Hansen, Independent Centre for Privacy Protection, Germany


Min-Shiang Hwang, National Chung Hsing University, Taiwan


Mizuho Iwaihara, Waseda University, Japan


Sushil Jajodia, George Mason University, USA


Ton Kalker, HP Labs, USA


Marc Langheinrich, University of Lugano (USI), Switzerland


Nguyen Manh Tho, Vienna University of Technology, Austria


Nick Mankovich, Philips Medical Systems, USA


Sharad Mehrotra, University of California at Irvine, USA


Stig Frode Mjaolsnes, Norwegian University of Science and Technology, Norway


Eiji Okamoto, University of Tsukuba, Japan


Sylvia Osborn, University of Western Ontario, Canada


Gunther Pernul, University of Regensburg. Germany


Birgit Pfitzmann, IBM Watson Research Lab, Switzerland


Bart Preneel, KU Leuven, Belgium


Kai Rannenberg, Goethe University Frankfurt, Germany


Andreas Schaad, SAP Labs, France


Jason Smith, Queensland University of Technology, Australia


Morton Swimmer, John Jay College of Criminal Justice/CUNY, USA


Clark Thomborson, University of Auckland, New Zealand


Sheng Zhong, State University of New York at Buffalo, USA


 


 


Workshop organizers


Willem Jonker Philips Research / Twente University, Netherlands


Milan Petkovic Philips Research / Eindhoven University, Netherlands

PersDB 2010, Deadline-June 21, 2010 2010-05-04
IDC 2010, Deadline-May 15, MS and Part time only 2010-05-01