!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Due to a number of requests the submission deadline is extended to July
14th, 2008
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Apologies for cross-postings.
---------------------------------------
*** CALL FOR PAPERS ***
International Workshop on Privacy in Location-Based Applications (PiLBA)
Thursday, October 9, 2008
Malaga, Spain
http://pilba.dico.unimi.it
In conjunction with the 13th European Symposium on Research in Computer
Security
--- http://www.isac.uma.es/esorics08/ ---
Motivation
-----------
Although data security and privacy issues have been extensively
investigated in several domains, the current available techniques are not
readily applicable for privacy protection in location based applications
(LBA). An example application is a Location Based Service, which is
typically invoked through mobile devices that can include location and
movement information in service requests. Other location based
applications use similar data, possibly stored in a moving object
database, to solve various kinds of optimization problems, to perform
statistical analysis of specific phenomena, as well as to predict
potentially critical situations. While location data can be very effective
for better services and can enable new kind of services, it poses serious
threats to the privacy of users. LBA in travel, logistics, health care,
and other industries already exist and are poised to proliferate. Examples
include the identification of resources close to the user (e.g., the
closest pharmacy), and the identification of the optimal route to reach a
destination from the user's position considering traffic conditions and
possibly other constraints.
One of the critical issues for a wide-spread deployment of these
applications is how to conciliate the effectiveness and quality of these
services with privacy concerns. They bring unique challenges mostly due to
the richness of location and time information that is necessarily
connected to location based applications. The research in this field
involves aspects of spatio-temporal reasoning, query processing, system
security, statistical inference, and anonymization techniques. Several
research groups have been working in the recent years to identify privacy
attacks and defense techniques in this domain.
Aim
---
The aim of the workshop is to bring together scientists from security and
data management to discuss the most recent advances in the field,
providing a clear picture of the state of the art.
Topics
-------
Topics of interest include everything involving privacy aspects arising in
the design, development and deployment of location-based applications.
Examples are the following:
- Formal models of attacks and defenses in LBA
- Anonymization/Pseudonymization in LBA
- Sensitive data obfuscation in LBA
- Authorization and Access Control involving spatio-temporal data
- Publication of micro-data acquired through LBA
- Privacy preserving data mining on geographically referenced data
- Statistical approaches to privacy preservation in LBA
- Trust Management in LBA
- Applied Cryptography for LBA
Workshop chairs
-------------------
Claudio Bettini, DICo - Università di Milano, Italy
Sushil Jajodia, CSIS - George Mason University, USA
Pierangela Samarati, DTI - Università di Milano, Italy
X. Sean Wang, CS - University of Vermont, USA
Publicity Chair
---------------
Linda Pareschi, DICo - Università di Milano, Italy
Paper submission
-----------------
Authors are invited to submit two kinds of full papers:
a) original, unpublished research papers that are not being considered for
publication in any other forum.
b) survey papers providing a clear overview of one or more LBA privacy
problems and comparison of related solutions.
We also encourage submitting position statement papers describing research
work in progress or lessons learned in practice.
Manuscripts will be handled through the EasyChair conference management
system; a link to the submission site will be provided on the workshop web
site.
Manuscripts should be formatted using the camera-ready templates of
Springer Lecture Notes in Computer Science (possibly using the LaTeX
templates).
Full research papers and surveys should not exceed 20 pages, while
position papers should not exceed 6 pages.
Important dates
----------------
Submission deadline: Extended to Jul 14, 2008
Notification of acceptance or rejection: Aug 15, 2008
Final versions due: Aug 31, 2008
Workshop: Oct 9, 2008
Format of the workshop and proceedings
--------------------------------------
It will be a one day workshop held in conjunction with the 13th European
Symposium on Research in Computer Security. The workshop will be opened by
an invited talk, and will continue with sessions, each consisting of 2-4
presentations followed by a panel discussion including questions to the
speakers.
The session chair will moderate the panel. Workshop proceedings will be
published as CEUR Workshop Proceedings (CEUR-WS.org is a recognized ISSN
publication series) and will be publicly accessible online with authors
holding their own copyrights.
Selected contributions will later be invited for inclusion in an edited
book on the workshop topics published by Springer in the LNCS series.
Program Committee
-----------------
- Claudio Ardagna, Università di Milano, Italy
- Vijay Atluri, Rutgers University, USA
- Ying Cai, Iowa State University, USA
- Reynold C.K. Cheng, University of Hong Kong, China
- Josep Domingo-Ferrer, Rovira i Virgili University, Spain
- Marco Gruteser, Rutgers University, USA
- Urs Hengartner, University of Waterloo, Canada
- Panos Kalnis, National University of Singapore, Singapore
- George Kollios, Boston University, USA
- Ling Liu, Georgia Institute of Technology, USA
- Sergio Mascetti, Università di Milano, Italy
- Dino Pedreschi, Università di Pisa, Italy
- Daniele Riboni, Università di Milano, Italy
- Cyrus Shahabi, University of Southern California, USA
- Heng Xu, Penn State University, USA
- Man Lung Yiu, Aalborg University, Denmark
_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers