[Tccc] New Submission Deadline - May 22nd!

Luan Ibraimi luan.ibraimi
Wed May 4 09:56:42 EDT 2011


8th VLDB Workshop on Secure Data Management (SDM 2011)

- with a special session on trustworthy cloud computing and trust in digital
life -

http://www.hitech-projects.com/sdm-workshop/sdm11.html






September 2, 2011


The Westin, Seattle, US


In conjunction with 37th International Conference on Very Large Databases


http://www.vldb.org/2011/










Call for Papers:






The 8th SDM workshop builds upon the success of the first seven workshops
(SDM'04, SDM'05,


SDM'06, SDM'07, SDM'08, SDM'09, SDM'10), which were organized in conjunction
with VLDB


2004 in Toronto, Canada, VLDB 2005 in Trondheim, Norway, VLDB 2006 in Seoul,
Korea,


VLDB 2007 in Vienna, Austria, VLDB 2008 in Auckland, New Zealand, VLDB 2009
in Lyon,


France and VLDB 2010 in Singapore.






Motivation


Although cryptography and security techniques have been around for quite
some time,


emerging technologies such as ubiquitous computing and ambient intelligence
that exploit


increasingly interconnected networks, mobility and personalization, put new
requirements


on security with respect to data management. As data is accessible anytime
anywhere,


according to these new concepts, it becomes much easier to get unauthorized
data access.


Furthermore, it becomes simpler to collect, store, and search personal
information and


endanger people's privacy. Therefore, research in the area of secure data
management is


of growing importance, attracting attention of both the data management and
security


research communities The interesting problems range from traditional ones
such as,


access control (with all variations, like dynamic, context-aware,
role-based), database


security (e.g. efficient database encryption schemes, search over encrypted
data, etc.),


privacy preserving data mining to controlled sharing of data.






This year, we will continue with tradition to have special sessions. We will
organize a


special session on trustworthy cloud computing together with Oxford and
Darmstadt


University in the context of the EU FP7 TClouds project (
http://www.tclouds-project.eu/).


We also intend to organize an additional special session on trust in digital
life with


the partners of this consortium (http://www.trustindigitallife.eu/).






Aim


The aim of the workshop is to bring together people from the security
research community and data management research community in order to


 exchange ideas on the secure management of data. The workshop will provide
forum for discussing practical experiences and


theoretical research efforts that can help in solving the critical problems
in secure data management. Authors from both academia and industry


are invited to submit papers presenting novel research on the topics of
interest (see below).






Format of the Workshop and Proceedings


The workshop will be organized in conjunction with the VLDB 2011 conference.











Topics


Topics of interest include (but are not limited to) the following:


- Secure Data Management


- Database Security


- Data Anonymization/Pseudonymization


- Data Hiding


- Metadata and Security


- XML Security


- Authorization and Access Control


- Data Integrity


- Privacy Preserving Data Mining


- Statistical Database Security


- Control of Data Disclosure


- Secure Stream Processing
- Private Information Retrieval


- Secure Auditing


- Data Retention


- Search on Encrypted Data


- Digital and Enterprise Rights Management


- Multimedia Security and Privacy


- Private Authentication


- Identity Management


- Privacy Enhancing Technologies


- Security and Semantic Web


- Security and Privacy in Ubiquitous Computing


- Security and Privacy of Health Data


- Web Service Security


- Trust Management


- Policy Management


- Applied Cryptography










Format of the workshop and proceedings


The workshop is organized in conjunction with the VLDB conference.






Provisional program:


1. Presentation of papers with discussions


2. Special session on trustworthy cloud computing: Cloud computing enables
outsource of ICT services to leverage scalable shared computing,
communication,
and storage infrastructures that are provided by third party enterprises.
Typical categories of cloud computing include Infrastructure as a Service
(IaaS),
Platform as a Service (PaaS) and Software as a Service (SaaS).  Major
benefits
of cloud computing include scalability, cost reduction, data availability,
reliability and resilience.  However, moving ICT infrastructure and personal

data to the cloud can pose severe threats to security and privacy. Clouds
may
involve additional insider attacks or become a single point of failure.
Consequently, secure data management solutions need to be promoted to
address
the emerging security and privacy risks.
Organizers: Ahmad-Reza Sadeghi, Darmstadt University; Imad Abbadi, Oxford
University;
Deng Mina, Philips Research


3. Special session on Trust in Digital Life followed by a short panel
discussion of
the speakers




Our intention is to publish the proceedings in the Springer-Verlag Lecture
Notes on Computer


Science series as it was done for the first seven workshops. Additionally,
we


also would like to select the best papers with the intent to publish their
extended and


revised versions in a special edition of a journal (as it was done for the
SDM 2006&2007


workshop with the Journal of Computer Security).






Paper submission


Authors are invited to submit original, unpublished research papers that are
not being


considered for publication in any other forum. Manuscripts should be
submitted


electronically as PDF or PS files via email to
al_sdm05 at natlab.research.philips.com


Full papers should not exceed fifteen pages in length (formatted using the
camera-ready


templates of Springer Lecture Notes in Computer Science).






We also encourage submitting position statement papers describing research
work in


progress or lessons learned in practice (max six pages). Submissions must be
received


no later than May 22, 2011. Please check the workshop page for further
information and


submission instructions: http://www.extra.research.philips.com/sdm-workshop/






Duration: 1-day workshop






Important dates


Extended Submission deadline: May 22, 2011


Notification of acceptance or rejection: June 1, 2011


Final versions due: July 1, 2011


Workshop: September 2, 2011


VLDB conference: August 29 - September 3, 2011






Program Committee






Imad Abbadi, Oxford University, UK


Gerrit Bleumer, Francotyp-Postalia, Germany


Ljiljana Brankovic, University of Newcastle, Australia


Sabrina De Capitani di Vimercati, University of Milan, Italy


Ernesto Damiani, University of Milan, Italy


Deng Mina, Philips Research, Netherlands


Eric Diehl, Techicolor, France


Jeroen Doumen, Irdeto, The Netherlands


Csilla Farkas, University of South Carolina, USA


Eduardo Fern?ndez-Medina Pat?n, Universidad de Castilla-La Mancha, Spain
Elena Ferrari, Universita degli Studi dell'Insubria, Italy


Simone Fischer-Hubner, Karlstad University, Sweden


Tyrone Grandison, IBM Research, USA


Dieter Gollmann,  Technische Universitat Hamburg-Harburg, Germany


Marit Hansen, Independent Centre for Privacy Protection, Germany


Min-Shiang Hwang, National Chung Hsing University, Taiwan


Mizuho Iwaihara, Waseda University, Japan


Sushil Jajodia, George Mason University, USA


Ton Kalker, Huawei, USA


Marc Langheinrich, University of Lugano (USI), Switzerland


Nguyen Manh Tho, Vienna University of Technology, Austria


Sharad Mehrotra, University of California at Irvine, USA


Stig Frode Mjolsnes, Norwegian University of Science and Technology, Norway


Eiji Okamoto, University of Tsukuba, Japan


Sylvia Osborn, University of Western Ontario, Canada


Guenther Pernul, University of Regensburg. Germany


Birgit Pfitzmann, IBM Watson Research Lab, USA


Bart Preneel, KU Leuven, Belgium


Kai Rannenberg, Goethe University Frankfurt, Germany


Ahmad-Reza Sadeghi, Darmstadt University, Germany


Andreas Schaad, SAP Labs, France


Nicholas Sheppard, Queensland University of Technology, Australia


Jason Smith, Queensland University of Technology, Australia


Morton Swimmer, Forward-looking Threat Research, Trend Micro, Germany
Clark Thomborson, University of Auckland, New Zealand


Sheng Zhong, State University of New York at Buffalo, USA






Workshop organizers


Willem Jonker EIT ICT Labs / Twente University, Netherlands


Milan Petkovic Philips Research / Eindhoven University, Netherlands



More information about the TCCC mailing list