Apologies for cross-postings.

---------------------------------------

           *** FIRST CALL FOR PAPERS ***

International Workshop on Privacy in Location-Based Applications (PiLBA)
                         Thursday, October 9, 2008
                            Malaga, Spain
                      http://pilba.dico.unimi.it

In conjunction with the 13th European Symposium on Research in Computer 
Security
        --- http://www.isac.uma.es/esorics08/ ---


Motivation
-----------

Although data security and privacy issues have been extensively 
investigated in  several domains, the current available techniques are 
not readily applicable for  privacy protection in location based 
applications (LBA). An example application  is a Location Based Service, 
which is typically invoked through mobile devices  that can include 
location and movement information in service requests.  Other location 
based applications use similar data, possibly stored in a moving  object 
database, to solve various kinds of optimization problems, to perform  
statistical analysis of specific phenomena, as well as to predict 
potentially  critical situations. While location data can be very 
effective for better  services and can enable new kind of services, it 
poses serious threats to the  privacy of users. LBA in travel, 
logistics, health care, and other industries  already exist and are 
poised to proliferate. Examples include the identification  of resources 
close to the user (e.g., the closest pharmacy), and the identification  
of the optimal route to reach a destination from the user's position 
considering  traffic conditions and possibly other constraints.

One of the critical issues for a wide-spread deployment of these 
applications  is how to conciliate the effectiveness and quality of 
these services with privacy  concerns. They bring unique challenges 
mostly due to the richness of location  and time information that is 
necessarily connected to location based applications.  The research in 
this field involves aspects of spatio-temporal reasoning,  query 
processing, system security, statistical inference, and anonymization 
techniques.  Several research groups have been working in the recent 
years to identify privacy  attacks and defense techniques in this domain.


Aim
---

The aim of the workshop is to bring together scientists from security 
and data  management to discuss the most recent advances in the field, 
providing a clear  picture of the state of the art.


Topics
-------

Topics of interest include everything involving privacy aspects arising 
in  the design, development and deployment of location-based applications.

Examples are the following:
- Formal models of attacks and defenses in LBA
- Anonymization/Pseudonymization in LBA
- Sensitive data obfuscation in LBA
- Authorization and Access Control involving spatio-temporal data
- Publication of micro-data acquired through LBA
- Privacy preserving data mining on geographically referenced data
- Statistical approaches to privacy preservation in LBA
- Trust Management in LBA
- Applied Cryptography for LBA


Workshop chairs
-------------------

Claudio Bettini, DICo - Universita' di Milano, Italy
Sushil Jajodia, CSIS - George Mason University, USA
Pierangela Samarati, DTI - Universita' di Milano, Italy
X. Sean Wang, CS - University of Vermont, USA


Publicity Chair
---------------

Linda Pareschi, DICo - Universita' di Milano, Italy


Paper submission
-----------------
Authors are invited to submit two kinds of full papers:

a) original, unpublished research papers that are not being considered  
  for publication in any other forum.

b) survey papers providing a clear overview of one or more LBA    
privacy problems and comparison of related solutions.

We also encourage submitting position statement papers describing  
research work in progress or lessons learned in practice.

Manuscripts will be handled through the EasyChair conference management  
system; a link to the submission site will be provided on the workshop 
web site.
Manuscripts should be formatted using the camera-ready templates of  
Springer Lecture Notes in Computer Science (possibly using the LaTeX 
templates).  Full research papers and surveys should not exceed 20 
pages,  while position papers should not exceed 6 pages.


Important dates
----------------

Submission deadline: Jun 30, 2008
Notification of acceptance or rejection: Aug 15, 2008
Final versions due: Aug 31, 2008
Workshop: Oct 9, 2008


Format of the workshop and proceedings
--------------------------------------

It will be a one day workshop held in conjunction with the 13th European 
Symposium  on Research in Computer Security. The workshop will be opened 
by an invited talk,  and will continue with sessions, each consisting of 
2-4 presentations followed  by a panel discussion including questions to 
the speakers.  The session chair will moderate the panel.  Workshop 
proceedings will be published as CEUR Workshop Proceedings  (CEUR-WS.org 
is a recognized ISSN publication series) and will be publicly  
accessible online with authors holding their own copyrights.

Selected contributions will later be invited for inclusion in an edited 
book  on the workshop topics.


Program Committee
-----------------
- Claudio Ardagna, Università di Milano, Italy
- Vijay Atluri, Rutgers University, USA
- Ying Cai, Iowa State University, USA
- Reynold C.K. Cheng, Hong Kong Polytechnic University, China
- Josep Domingo-Ferrer, Rovira i Virgili University, Spain
- Marco Gruteser, Rutgers University, USA
- Urs Hengartner, University of Waterloo, Canada
- Panos Kalnis, National University of Singapore, Singapore
- George Kollios, Boston University, USA
- Ling Liu, Georgia Institute of Technology, USA
- Sergio Mascetti, Università di Milano, Italy
- Dino Pedreschi, Università di Pisa, Italy
- Daniele Riboni, Università di Milano, Italy
- Cyrus Shahabi, University of Southern California, USA
- Heng Xu, Penn State University, USA
- Man Lung Yiu, Aalborg University, Denmark

_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to