Apologies for cross-postings.
---------------------------------------
*** FIRST CALL FOR PAPERS ***
International Workshop on Privacy in Location-Based Applications (PiLBA)
Thursday, October 9, 2008
Malaga, Spain
http://pilba.dico.unimi.it
In conjunction with the 13th European Symposium on Research in Computer
Security
--- http://www.isac.uma.es/esorics08/ ---
Motivation
-----------
Although data security and privacy issues have been extensively
investigated in several domains, the current available techniques are
not readily applicable for privacy protection in location based
applications (LBA). An example application is a Location Based Service,
which is typically invoked through mobile devices that can include
location and movement information in service requests. Other location
based applications use similar data, possibly stored in a moving object
database, to solve various kinds of optimization problems, to perform
statistical analysis of specific phenomena, as well as to predict
potentially critical situations. While location data can be very
effective for better services and can enable new kind of services, it
poses serious threats to the privacy of users. LBA in travel,
logistics, health care, and other industries already exist and are
poised to proliferate. Examples include the identification of resources
close to the user (e.g., the closest pharmacy), and the identification
of the optimal route to reach a destination from the user's position
considering traffic conditions and possibly other constraints.
One of the critical issues for a wide-spread deployment of these
applications is how to conciliate the effectiveness and quality of
these services with privacy concerns. They bring unique challenges
mostly due to the richness of location and time information that is
necessarily connected to location based applications. The research in
this field involves aspects of spatio-temporal reasoning, query
processing, system security, statistical inference, and anonymization
techniques. Several research groups have been working in the recent
years to identify privacy attacks and defense techniques in this domain.
Aim
---
The aim of the workshop is to bring together scientists from security
and data management to discuss the most recent advances in the field,
providing a clear picture of the state of the art.
Topics
-------
Topics of interest include everything involving privacy aspects arising
in the design, development and deployment of location-based applications.
Examples are the following:
- Formal models of attacks and defenses in LBA
- Anonymization/Pseudonymization in LBA
- Sensitive data obfuscation in LBA
- Authorization and Access Control involving spatio-temporal data
- Publication of micro-data acquired through LBA
- Privacy preserving data mining on geographically referenced data
- Statistical approaches to privacy preservation in LBA
- Trust Management in LBA
- Applied Cryptography for LBA
Workshop chairs
-------------------
Claudio Bettini, DICo - Universita' di Milano, Italy
Sushil Jajodia, CSIS - George Mason University, USA
Pierangela Samarati, DTI - Universita' di Milano, Italy
X. Sean Wang, CS - University of Vermont, USA
Publicity Chair
---------------
Linda Pareschi, DICo - Universita' di Milano, Italy
Paper submission
-----------------
Authors are invited to submit two kinds of full papers:
a) original, unpublished research papers that are not being considered
for publication in any other forum.
b) survey papers providing a clear overview of one or more LBA
privacy problems and comparison of related solutions.
We also encourage submitting position statement papers describing
research work in progress or lessons learned in practice.
Manuscripts will be handled through the EasyChair conference management
system; a link to the submission site will be provided on the workshop
web site.
Manuscripts should be formatted using the camera-ready templates of
Springer Lecture Notes in Computer Science (possibly using the LaTeX
templates). Full research papers and surveys should not exceed 20
pages, while position papers should not exceed 6 pages.
Important dates
----------------
Submission deadline: Jun 30, 2008
Notification of acceptance or rejection: Aug 15, 2008
Final versions due: Aug 31, 2008
Workshop: Oct 9, 2008
Format of the workshop and proceedings
--------------------------------------
It will be a one day workshop held in conjunction with the 13th European
Symposium on Research in Computer Security. The workshop will be opened
by an invited talk, and will continue with sessions, each consisting of
2-4 presentations followed by a panel discussion including questions to
the speakers. The session chair will moderate the panel. Workshop
proceedings will be published as CEUR Workshop Proceedings (CEUR-WS.org
is a recognized ISSN publication series) and will be publicly
accessible online with authors holding their own copyrights.
Selected contributions will later be invited for inclusion in an edited
book on the workshop topics.
Program Committee
-----------------
- Claudio Ardagna, Università di Milano, Italy
- Vijay Atluri, Rutgers University, USA
- Ying Cai, Iowa State University, USA
- Reynold C.K. Cheng, Hong Kong Polytechnic University, China
- Josep Domingo-Ferrer, Rovira i Virgili University, Spain
- Marco Gruteser, Rutgers University, USA
- Urs Hengartner, University of Waterloo, Canada
- Panos Kalnis, National University of Singapore, Singapore
- George Kollios, Boston University, USA
- Ling Liu, Georgia Institute of Technology, USA
- Sergio Mascetti, Università di Milano, Italy
- Dino Pedreschi, Università di Pisa, Italy
- Daniele Riboni, Università di Milano, Italy
- Cyrus Shahabi, University of Southern California, USA
- Heng Xu, Penn State University, USA
- Man Lung Yiu, Aalborg University, Denmark
_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers