SDM 2011 - SDM 2011 : 8th VLDB Workshop on Secure Data Management
Topics/Call fo Papers
8th VLDB Workshop on Secure Data Management (SDM 2011)
- with special sessions on trustworthy cloud computing and trust in digital life -
http://www.hitech-projects.com/sdm-workshop/sdm11....
September 2, 2011
The Westin, Seattle, US
In conjunction with 37th International Conference on Very Large Databases
http://www.vldb.org/2011/
Call for Papers:
The 8th SDM workshop builds upon the success of the first seven workshops (SDM'04, SDM'05,
SDM'06, SDM'07, SDM'08, SDM'09, SDM'10), which were organized in conjunction with VLDB
2004 in Toronto, Canada, VLDB 2005 in Trondheim, Norway, VLDB 2006 in Seoul, Korea,
VLDB 2007 in Vienna, Austria, VLDB 2008 in Auckland, New Zealand, VLDB 2009 in Lyon,
France and VLDB 2010 in Singapore.
Motivation
Although cryptography and security techniques have been around for quite some time,
emerging technologies such as ubiquitous computing and ambient intelligence that exploit
increasingly interconnected networks, mobility and personalization, put new requirements
on security with respect to data management. As data is accessible anytime anywhere,
according to these new concepts, it becomes much easier to get unauthorized data access.
Furthermore, it becomes simpler to collect, store, and search personal information and
endanger people's privacy. Therefore, research in the area of secure data management is
of growing importance, attracting attention of both the data management and security
research communities The interesting problems range from traditional ones such as,
access control (with all variations, like dynamic, context-aware, role-based), database
security (e.g. efficient database encryption schemes, search over encrypted data, etc.),
privacy preserving data mining to controlled sharing of data.
This year, we will continue with tradition to have special sessions. We will organize a
special session on trustworthy cloud computing together with Oxford and Darmstadt
University in the context of the EU FP7 TClouds project (http://www.tclouds-project.eu/).
We also intend to organize an additional special session on trust in digital life with
the partners of this consortium (http://www.trustindigitallife.eu/).
Aim
The aim of the workshop is to bring together people from the security research community
and data management research community in order to exchange ideas on the secure management
of data. The workshop will provide forum for discussing practical experiences and
theoretical research efforts that can help in solving the critical problems in secure data
management. Authors from both academia and industry are invited to submit papers presenting
novel research on the topics of interest (see below).
Format of the Workshop and Proceedings
The workshop will be organized in conjunction with the VLDB 2011 conference.
Topics
Topics of interest include (but are not limited to) the following:
- Secure Data Management
- Database Security
- Data Anonymization/Pseudonymization
- Data Hiding
- Metadata and Security
- XML Security
- Authorization and Access Control
- Data Integrity
- Privacy Preserving Data Mining
- Statistical Database Security
- Control of Data Disclosure
- Secure Stream Processing
- Private Information Retrieval
- Secure Auditing
- Data Retention
- Search on Encrypted Data
- Digital and Enterprise Rights Management
- Multimedia Security and Privacy
- Private Authentication
- Identity Management
- Privacy Enhancing Technologies
- Security and Semantic Web
- Security and Privacy in Ubiquitous Computing
- Security and Privacy of Health Data
- Web Service Security
- Trust Management
- Policy Management
- Applied Cryptography
Format of the workshop and proceedings
The workshop is organized in conjunction with the VLDB conference.
Provisional program:
1. Presentation of papers with discussions
2. Special session on trustworthy cloud computing: Cloud computing enables
outsource of ICT services to leverage scalable shared computing, communication,
and storage infrastructures that are provided by third party enterprises.
Typical categories of cloud computing include Infrastructure as a Service (IaaS),
Platform as a Service (PaaS) and Software as a Service (SaaS). Major benefits
of cloud computing include scalability, cost reduction, data availability,
reliability and resilience. However, moving ICT infrastructure and personal
data to the cloud can pose severe threats to security and privacy. Clouds may
involve additional insider attacks or become a single point of failure.
Consequently, secure data management solutions need to be promoted to address
the emerging security and privacy risks.
Organizers: Ahmad-Reza Sadeghi, Darmstadt University; Imad Abbadi, Oxford University;
Deng Mina, Philips Research
3. Special session on Trust in Digital Life followed by a short panel discussion of
the speakers
Our intention is to publish the proceedings in the Springer-Verlag Lecture Notes on Computer
Science series as it was done for the first seven workshops. Additionally, we
also would like to select the best papers with the intent to publish their extended and
revised versions in a special edition of a journal (as it was done for the SDM 2006&2007
workshop with the Journal of Computer Security).
Paper submission
Authors are invited to submit original, unpublished research papers that are not being
considered for publication in any other forum. Manuscripts should be submitted
electronically as PDF or PS files via email to al_sdm05-AT-natlab.research.philips.com
Full papers should not exceed fifteen pages in length (formatted using the camera-ready
templates of Springer Lecture Notes in Computer Science).
We also encourage submitting position statement papers describing research work in
progress or lessons learned in practice (max six pages). Submissions must be received
no later than May 1, 2011. Please check the workshop page for further information and
submission instructions: http://www.extra.research.philips.com/sdm-workshop...
Duration: 1-day workshop
Important dates
Submission deadline: May 1, 2011
Notification of acceptance or rejection: June 1, 2011
Final versions due: July 1, 2011
Workshop: September 2, 2011
VLDB conference: August 29 - September 3, 2011
Program Committee
Imad Abbadi, Oxford University, UK
Gerrit Bleumer, Francotyp-Postalia, Germany
Ljiljana Brankovic, University of Newcastle, Australia
Sabrina De Capitani di Vimercati, University of Milan, Italy
Ernesto Damiani, University of Milan, Italy
Deng Mina, Philips Research, Netherlands
Eric Diehl, Techicolor, France
Jeroen Doumen, Irdeto, The Netherlands
Csilla Farkas, University of South Carolina, USA
Eduardo Fern?ndez-Medina Pat?n, Universidad de Castilla-La Mancha, Spain
Elena Ferrari, Universita degli Studi dell'Insubria, Italy
Simone Fischer-Hubner, Karlstad University, Sweden
Tyrone Grandison, IBM Research, USA
Dieter Gollmann, Technische Universitat Hamburg-Harburg, Germany
Marit Hansen, Independent Centre for Privacy Protection, Germany
Min-Shiang Hwang, National Chung Hsing University, Taiwan
Mizuho Iwaihara, Waseda University, Japan
Sushil Jajodia, George Mason University, USA
Ton Kalker, Huawei, USA
Marc Langheinrich, University of Lugano (USI), Switzerland
Nguyen Manh Tho, Vienna University of Technology, Austria
Sharad Mehrotra, University of California at Irvine, USA
Stig Frode Mjolsnes, Norwegian University of Science and Technology, Norway
Eiji Okamoto, University of Tsukuba, Japan
Sylvia Osborn, University of Western Ontario, Canada
Guenther Pernul, University of Regensburg. Germany
Birgit Pfitzmann, IBM Watson Research Lab, USA
Bart Preneel, KU Leuven, Belgium
Kai Rannenberg, Goethe University Frankfurt, Germany
Ahmad-Reza Sadeghi, Darmstadt University, Germany
Andreas Schaad, SAP Labs, France
Nicholas Sheppard, Queensland University of Technology, Australia
Jason Smith, Queensland University of Technology, Australia
Morton Swimmer, Forward-looking Threat Research, Trend Micro, Germany
Clark Thomborson, University of Auckland, New Zealand
Sheng Zhong, State University of New York at Buffalo, USA
Workshop organizers
Willem Jonker EIT ICT Labs / Twente University, Netherlands
Milan Petkovic Philips Research / Eindhoven University, Netherlands
- with special sessions on trustworthy cloud computing and trust in digital life -
http://www.hitech-projects.com/sdm-workshop/sdm11....
September 2, 2011
The Westin, Seattle, US
In conjunction with 37th International Conference on Very Large Databases
http://www.vldb.org/2011/
Call for Papers:
The 8th SDM workshop builds upon the success of the first seven workshops (SDM'04, SDM'05,
SDM'06, SDM'07, SDM'08, SDM'09, SDM'10), which were organized in conjunction with VLDB
2004 in Toronto, Canada, VLDB 2005 in Trondheim, Norway, VLDB 2006 in Seoul, Korea,
VLDB 2007 in Vienna, Austria, VLDB 2008 in Auckland, New Zealand, VLDB 2009 in Lyon,
France and VLDB 2010 in Singapore.
Motivation
Although cryptography and security techniques have been around for quite some time,
emerging technologies such as ubiquitous computing and ambient intelligence that exploit
increasingly interconnected networks, mobility and personalization, put new requirements
on security with respect to data management. As data is accessible anytime anywhere,
according to these new concepts, it becomes much easier to get unauthorized data access.
Furthermore, it becomes simpler to collect, store, and search personal information and
endanger people's privacy. Therefore, research in the area of secure data management is
of growing importance, attracting attention of both the data management and security
research communities The interesting problems range from traditional ones such as,
access control (with all variations, like dynamic, context-aware, role-based), database
security (e.g. efficient database encryption schemes, search over encrypted data, etc.),
privacy preserving data mining to controlled sharing of data.
This year, we will continue with tradition to have special sessions. We will organize a
special session on trustworthy cloud computing together with Oxford and Darmstadt
University in the context of the EU FP7 TClouds project (http://www.tclouds-project.eu/).
We also intend to organize an additional special session on trust in digital life with
the partners of this consortium (http://www.trustindigitallife.eu/).
Aim
The aim of the workshop is to bring together people from the security research community
and data management research community in order to exchange ideas on the secure management
of data. The workshop will provide forum for discussing practical experiences and
theoretical research efforts that can help in solving the critical problems in secure data
management. Authors from both academia and industry are invited to submit papers presenting
novel research on the topics of interest (see below).
Format of the Workshop and Proceedings
The workshop will be organized in conjunction with the VLDB 2011 conference.
Topics
Topics of interest include (but are not limited to) the following:
- Secure Data Management
- Database Security
- Data Anonymization/Pseudonymization
- Data Hiding
- Metadata and Security
- XML Security
- Authorization and Access Control
- Data Integrity
- Privacy Preserving Data Mining
- Statistical Database Security
- Control of Data Disclosure
- Secure Stream Processing
- Private Information Retrieval
- Secure Auditing
- Data Retention
- Search on Encrypted Data
- Digital and Enterprise Rights Management
- Multimedia Security and Privacy
- Private Authentication
- Identity Management
- Privacy Enhancing Technologies
- Security and Semantic Web
- Security and Privacy in Ubiquitous Computing
- Security and Privacy of Health Data
- Web Service Security
- Trust Management
- Policy Management
- Applied Cryptography
Format of the workshop and proceedings
The workshop is organized in conjunction with the VLDB conference.
Provisional program:
1. Presentation of papers with discussions
2. Special session on trustworthy cloud computing: Cloud computing enables
outsource of ICT services to leverage scalable shared computing, communication,
and storage infrastructures that are provided by third party enterprises.
Typical categories of cloud computing include Infrastructure as a Service (IaaS),
Platform as a Service (PaaS) and Software as a Service (SaaS). Major benefits
of cloud computing include scalability, cost reduction, data availability,
reliability and resilience. However, moving ICT infrastructure and personal
data to the cloud can pose severe threats to security and privacy. Clouds may
involve additional insider attacks or become a single point of failure.
Consequently, secure data management solutions need to be promoted to address
the emerging security and privacy risks.
Organizers: Ahmad-Reza Sadeghi, Darmstadt University; Imad Abbadi, Oxford University;
Deng Mina, Philips Research
3. Special session on Trust in Digital Life followed by a short panel discussion of
the speakers
Our intention is to publish the proceedings in the Springer-Verlag Lecture Notes on Computer
Science series as it was done for the first seven workshops. Additionally, we
also would like to select the best papers with the intent to publish their extended and
revised versions in a special edition of a journal (as it was done for the SDM 2006&2007
workshop with the Journal of Computer Security).
Paper submission
Authors are invited to submit original, unpublished research papers that are not being
considered for publication in any other forum. Manuscripts should be submitted
electronically as PDF or PS files via email to al_sdm05-AT-natlab.research.philips.com
Full papers should not exceed fifteen pages in length (formatted using the camera-ready
templates of Springer Lecture Notes in Computer Science).
We also encourage submitting position statement papers describing research work in
progress or lessons learned in practice (max six pages). Submissions must be received
no later than May 1, 2011. Please check the workshop page for further information and
submission instructions: http://www.extra.research.philips.com/sdm-workshop...
Duration: 1-day workshop
Important dates
Submission deadline: May 1, 2011
Notification of acceptance or rejection: June 1, 2011
Final versions due: July 1, 2011
Workshop: September 2, 2011
VLDB conference: August 29 - September 3, 2011
Program Committee
Imad Abbadi, Oxford University, UK
Gerrit Bleumer, Francotyp-Postalia, Germany
Ljiljana Brankovic, University of Newcastle, Australia
Sabrina De Capitani di Vimercati, University of Milan, Italy
Ernesto Damiani, University of Milan, Italy
Deng Mina, Philips Research, Netherlands
Eric Diehl, Techicolor, France
Jeroen Doumen, Irdeto, The Netherlands
Csilla Farkas, University of South Carolina, USA
Eduardo Fern?ndez-Medina Pat?n, Universidad de Castilla-La Mancha, Spain
Elena Ferrari, Universita degli Studi dell'Insubria, Italy
Simone Fischer-Hubner, Karlstad University, Sweden
Tyrone Grandison, IBM Research, USA
Dieter Gollmann, Technische Universitat Hamburg-Harburg, Germany
Marit Hansen, Independent Centre for Privacy Protection, Germany
Min-Shiang Hwang, National Chung Hsing University, Taiwan
Mizuho Iwaihara, Waseda University, Japan
Sushil Jajodia, George Mason University, USA
Ton Kalker, Huawei, USA
Marc Langheinrich, University of Lugano (USI), Switzerland
Nguyen Manh Tho, Vienna University of Technology, Austria
Sharad Mehrotra, University of California at Irvine, USA
Stig Frode Mjolsnes, Norwegian University of Science and Technology, Norway
Eiji Okamoto, University of Tsukuba, Japan
Sylvia Osborn, University of Western Ontario, Canada
Guenther Pernul, University of Regensburg. Germany
Birgit Pfitzmann, IBM Watson Research Lab, USA
Bart Preneel, KU Leuven, Belgium
Kai Rannenberg, Goethe University Frankfurt, Germany
Ahmad-Reza Sadeghi, Darmstadt University, Germany
Andreas Schaad, SAP Labs, France
Nicholas Sheppard, Queensland University of Technology, Australia
Jason Smith, Queensland University of Technology, Australia
Morton Swimmer, Forward-looking Threat Research, Trend Micro, Germany
Clark Thomborson, University of Auckland, New Zealand
Sheng Zhong, State University of New York at Buffalo, USA
Workshop organizers
Willem Jonker EIT ICT Labs / Twente University, Netherlands
Milan Petkovic Philips Research / Eindhoven University, Netherlands
Other CFPs
- QWE 2011 : The 2nd International Workshop on Quality in Web Engineering
- The 2012 FTRA International Workshop on Human centric computing, P2P, Grid and Cloud computing
- The International Workshop on Multimedia and Enjoyable Requirements Engineering (MERE)
- The International Workshop on Requirements Engineering for Systems and Systems-of-Systems (RESS)
- The International Workshop on Empirical Requirements Engineering (EmpiRE)
Last modified: 2011-04-04 11:08:50