![]() |
2nd VLDB Workshop on SECURE DATA MANAGEMENT SDM'05 |
|
- with special session on security and privacy in healthcare -
In Conjunction with VLDB 2005 Radisson SAS Royal Garden Hotel Trondheim, Norway September 2-3, 2005
|
![]() |
The 2nd SDM workshop builds upon the success of the 1st SDM workshop, which
was organized last year in Toronto, Canada.
Proceedings
Motivation | Objectives | Workshop Format |
Topics of Interest | Paper Submission | Important Dates |
Organizing Committee | Program Committee | Contact |
Although cryptography and security techniques are around for quite some time, emerging technologies such as ubiquitous computing and ambient intelligence that exploit increasingly interconnected networks, mobility and personalization, put new requirements on security with respect to data management. As data is accessible anytime anywhere, according to these new concepts, it becomes much easier to get unauthorized data access. Furthermore, it becomes simpler to collect, store, and search personal information and endanger people's privacy. Therefore, research in the area of secure data management is of growing importance, attracting attention of both the data management and security research communities The interesting problems range from traditional ones such as, access control (with all variations, like dynamic, context-aware, role-based), database security (e.g. efficient database encryption schemes, search over encrypted data, etc.), privacy preserving data mining to controlled sharing of data.
In this year's workshop, a special session will be devoted to secure data management in healthcare. Data security and privacy issue are traditionally important in the medical domain. However, recent developments such as digitization of medical dossiers, the creation of central health record databases, and extramural applications in the personal health care domain, pose new challenges towards the protection of medical data. In contrast to other domains, such as financial, which can absorb the cost of the abuse of the system, healthcare cannot. Once sensitive information about individual's health problems is uncovered and social damage is done, there is no way to revoke the information or to restitute the individual. In addition to this, the medical field has some other specific characteristics, such as long-term value of medical data and flexibility with respect to, on one hand confidentiality, and on the other hand availability of medical data in the case of emergency.
Aim of the workshop is to bring together people from the security research community and data management research community in order to exchange ideas on the secure management of data. This year an additional special session will be organized with the focus on secure and private data management in healthcare. The workshop will provide forum for discussing practical experiences and theoretical research efforts that can help in solving the critical problems in secure data management. Authors from both academia and industry are invited to submit papers presenting novel research on the topics of interest (see below).
The workshop will be organized in conjunction with the VLDB conference.
Provisional program:
- Invited Talk
- Presentation of papers with discussions
- Special session on secure data management in healthcare
- Panel discussion
The proceedings will be published in the Spinger Lecture Notes on Computer Science series.
Topics of interest include (but are not limited to) the following:
- Secure Data Management
- Database Security
- Secure Storage
- Data Integrity
- Data Anonymization
- Data Hiding
- Search on Encrypted Data
- Metadata and Security
- XML Security
- Privacy Preserving Data Mining
- Statistical Database Security
- Digital and Enterprise Rights Management
- Healthcare Security
- Multimedia Security and Privacy
- Authorization and Access Control
- Private Authentication
- Identity Management
- Privacy Enhancing Technologies
- Private Information Retrieval
- User Profiling and Privacy
- Security, Privacy and Ubiquitous Computing
- Information Dissemination Control
- Protection of Personally Identifiable Information
- Applied Cryptography
- Web services security
- Secure Semantic Web
- Privacy and Security with RFID
- Private Watermarking
- Trust Management
- Security and Privacy Management
Authors are invited to submit original, unpublished research papers that are not being considered for publication in any other forum. Manuscripts should be submitted electronically as PDF or PS files via email to
Full papers should not exceed fifteen pages in length (formatted using the camera-ready templates of Springer Lecture Notes in Computer Science (http://www.springer.de/comp/lncs/authors.html). We also encourage submitting position statement papers describing research work in progress or lessons learned in practice (max six pages). Submissions must be received no later than May 9. Each submission must be accompanied by a separate submission overview specifying the title, three keywords, author names with organizational affiliations, and must specify a contact author along with corresponding phone number, fax number, postal address and email address. The submission overview can be included in the body of the email. Each submission will be acknowledged by e-mail. If acknowledgment is not received within 3 days, please contact the organizers. The proceedings will be published in the Spinger Lecture Notes on Computer Science series.
Important Dates | |
Paper Submission Deadline | May 9, 2005 |
Notification of Acceptance | June 14, 2005 |
Camera Ready Copy | June 28, 2005 |
Workshop | September 2-3, 2005 |
Prof. Dr. Willem Jonker, Philips Research / Twente University, Netherlands
Dr. Milan Petkovic, Philips Research, Netherlands
Peter Apers, Twente University, Netherlands
Gerrit Bleumer, Francotyp-Postalia, Germany
Ljiljana Brankovic, University of Newcastle, Australia
Sabrina De Capitani di Vimercati, University of Milan, Italy
Ernesto Damiani, University of Milan, Italy
Eric Diehl, Thomson Research, France
Csilla Farkas, University of South Carolina, USA
Eduardo Fernández-Medina, University of Castilla-La Mancha, Spain
Simone Fischer-Hübner, Karlstad University, Sweden
Tyrone Grandison, IBM Almaden Research Center, USA
Ehud Gudes Ben-Gurion University, Israel
Marit Hansen, Independent Centre for Privacy Protection, Kiel, Germany
Pieter Hartel, Twente University, Netherlands
Sushil Jajodia George Mason University, USA
Ton Kalker, HP Labs, USA
Marc Langheinrich, Institute for Pervasive Computing ETH Zurich, Switzerland
Nick Mankovich, Philips Medical Systems, USA
Stig Frode Mjølsnes, Norwegian University of Science and Technology, Norway
Eiji Okamoto, University of Tsukuba, Japan
Sylvia Osborn, University of Western Ontario, Canada
Günther Pernul. University of Regensburg. Germany
Birgit Pfitzmann, IBM Zurich Research Lab, Switzerland
Bart Preneel, KU Leuven, Belgium
Jean-Jacques Quisquater, Université Catholique de Louvain, Belgium
Kai Rannenberg, Goethe University Frankfurt, Germany
Morton Swimmer, IBM Zurich Research Lab, Switzerland
Bhavani Thuraisingham, The National Science Foundation USA
Sheng Zhong, Stevens Institute of Technology, USA
Josip Zoric, Norwegian Telecom, Norway
Phone: +31 40 2744582
Fax: +31 40 2746622
Page Last Updated on August 18, 2005