5th VLDB Workshop on

SECURE DATA MANAGEMENT - SDM'08

- with a special session on security and privacy in healthcare -

 Motivation

In Conjunction with VLDB 2008
Auckland, New Zealand
August 24, 2008

The 5th SDM workshop builds upon the success of the first four workshops (SDM'04, SDM'05, SDM'06, and SDM'07), which were organized in conjunction with VLDB 2004 in Toronto, Canada, VLDB 2005 in Trondheim, Norway, VLDB 2006 in Seoul, Korea, and VLDB 2007 in Vienna, Austria.

Travel Grants

Thanks to support from the UNESCO Chair in Data Privacy, we are able to offer three grants to offset some of the costs associated with attending the SDM workshop for participants coming from "transition" countries", which are nations other than the USA, Canada, Western Europe, New Zealand, Australia, Japan and South Korea.

 News:

 

 Workshop program

 

 Workshop registration

 

 Workshop venue

 

Invited talk: Claudio Bettini, X. Sean Wang, Sushil Jajodia:

 How anonymous is k- anonymous? Look at your quasi-ID

 

New book! Check it!

 

Security, Privacy, and Trust in 

 Modern Data Management,

 Petkovic, Jonker (Eds.),

 Springer, 2007

 

 

 Objectives
 Topics of Interest
 Paper Submission
 Important Dates
 Organizing Committee
 Program Committee
 Contact

 

Motivation

Although cryptography and security techniques have been around for quite some time, emerging technologies such as ubiquitous computing and ambient intelligence that exploit increasingly interconnected networks, mobility and personalization, put new requirements on security with respect to data management. As data is accessible anytime anywhere, according to these new concepts, it becomes much easier to get unauthorized data access. Furthermore, it becomes simpler to collect, store, and search personal information and endanger people's privacy. Therefore, research in the area of secure data management is of growing importance, attracting attention of both the data management and security research communities The interesting problems range from traditional ones such as, access control (with all variations, like dynamic, context-aware, role-based), database security (e.g. efficient database encryption schemes, search over encrypted data, etc.), privacy preserving data mining to controlled sharing of data.

This year, we will continue with a tradition to have a special session devoted to secure data management in healthcare. Data security and privacy issue are traditionally important in the medical domain. However, recent developments and increasing deployment of IT in healthcare such as the introduction of electronic health records and extramural applications in the personal health care domain, pose new challenges towards the protection of medical data. In contrast to other domains, such as financial, which can absorb the cost of the abuse of the system, healthcare cannot. Once sensitive information about individual's health problems is uncovered and social damage is done, there is no way to revoke the information or to restitute the individual. In addition to this, the medical field has some other specific characteristics, such as long-term value of medical data and flexibility with respect to, on one hand confidentiality, and on the other hand availability of medical data in the case of emergency.


 


Objectives

The aim of the workshop is to bring together people from the security research community and data management research community in order to exchange ideas on the secure management of data. This year an additional special session will be organized with the focus on secure and private data management in healthcare. The workshop will provide forum for discussing practical experiences and theoretical research efforts that can help in solving the critical problems in secure data management. Authors from both academia and industry are invited to submit papers presenting novel research on the topics of interest (see below).
 


Workshop Format

The workshop will be organized in conjunction with the VLDB conference. It is proposed to organize the workshop in conjunction with the VLDB conference.
Also, it is the intention to publish the proceedings in the Spinger-Verlag Lecture Notes on Computer Science series as it was done for the first four workshops. Additionally, we
also want to select the best papers with the intent to publish their extended and revised versions in a special edition of a journal (as it was done for the SDM 2007 workshop with the Journal of Computer Security).


Topics of Interest

Topics of interest include (but are not limited to) the following:

- Secure Data Management
- Database Security
- Data Anonymization/Pseudonymization
- Data Hiding
- Metadata and Security
- XML Security
- Authorization and Access Control
- Data Integrity
- Privacy Preserving Data Mining
- Statistical Database Security
- Control of Data Disclosure
- Private Information Retrieval
- Secure Auditing
- Search on Encrypted Data
- Digital and Enterprise Rights Management
- Multimedia Security and Privacy
- Private Authentication
- Identity Management
- Privacy Enhancing Technologies
- Security and Semantic Web
- Security and Privacy in Ubiquitous Computing
- Security and Privacy of Health Data
- Watermarking
- Trust Management
- Policy Management
- Applied Cryptography
- Web Service Security
 


Paper Submission

Authors are invited to submit original, unpublished research papers that are not being considered for publication in any other forum. Manuscripts should 
be submitted electronically as PDF or PS files via email to  

Full papers should not exceed fifteen pages in length (formatted using the camera-ready templates of Springer Lecture Notes in Computer Science http://www.springer.de/comp/lncs/authors.html). We also encourage submitting position statement papers describing research work in progress or lessons learned in practice (max six pages). Submissions must be received no later than April 14. 

Each submission must be accompanied by a separate submission overview specifying the title, three keywords, author names with organizational affiliations, and must specify a contact author along with corresponding phone number, fax number, postal address and email address. The submission overview can be included in the body of the email. Each submission will be acknowledged by e-mail. If acknowledgment is not received within 3 days, please contact the organizers. It is intended to publish teh proceedings in in the Spinger Lecture Notes on Computer Science series. Additionally, we also want to select the best papers with the intent to publish their extended and revised versions in a special edition of a journal (as it was done for the SDM 2007 workshop with the Journal of Computer Security).

 

Travel Grants

Thanks to support from the UNESCO Chair in Data Privacy, we are able to offer three travel grants of up to 500 euro each to offset some of the costs associated with attending the SDM workshop for participants coming from "transition" countries", which are nations other than the USA, Canada, Western Europe, New Zealand, Australia, Japan and South Korea.

Travel grants will be provided according to this priority order:

  1. student author of an accepted paper;

  2. author of an accepted paper;

  3. student author of a submitted but rejected paper;

  4. author of a submitted but rejected paper.

To apply for support, send an email to  after your paper has been submitted to the SDM workshop, including the following information: (1) Name, (2) affiliation, (3) contact information, (4) if you are currently a student, and (5) the title of your paper.


Important Dates

Important Dates
Paper Submission Deadline April 14, 2008
Notification of Acceptance May 26, 2008
Camera Ready Copy June 6, 2008
Workshop August 24, 2008

Organizing Committee

Willem Jonker, Philips Research / Twente University, Netherlands
Milan Petkovic, Philips Research, Netherlands


Program Committee

Gerrit Bleumer, Francotyp-Postalia, Germany
Ljiljana Brankovic, University of Newcastle, Australia 
Sabrina De Capitani di Vimercati, University of Milan, Italy 

Andrew Clark, Queensland University of Technology, Australia
Ernesto Damiani, University of Milan, Italy 
Eric Diehl, Thomson Research, France 
Lee Dong Hoon, Korea university, Korea
Jeroen Doumen, Twente University, The Netherlands

Jan Eloff, University of Pretoria, South Africa

Csilla Farkas, University of South Carolina, USA 
Eduardo Fernández-Medina, University of Castilla-La Mancha, Spain 
Elena Ferrari, Università degli Studi dell'Insubria, Italy 
Simone Fischer-Hübner, Karlstad University, Sweden
Tyrone Grandison, IBM Almaden Research Center, USA 
Dieter Gollmann, Technische Universität Hamburg-Harburg, Germany

Hakan Hacigumus, IBM Almaden Research Center, USA
Marit Hansen, Independent Centre for Privacy Protection, Germany
Min-Shiang Hwang, National Chung Hsing University, Taiwan
Mizuho Iwaihara, Kyoto University, Japan
Sushil Jajodia, George Mason University, USA
Ton Kalker, HP Labs, USA 
Marc Langheinrich, Institute for Pervasive Computing ETH Zurich, Switzerland
Nguyen Manh Tho, Vienna University of Technology, Austria

Nick Mankovich, Philips Medical Systems, USA
Sharad Mehrotra, University of California at Irvine, USA

Stig Frode Mjølsnes, Norwegian University of Science and Technology, Norway
Eiji Okamoto, University of Tsukuba, Japan
Sylvia Osborn, University of Western Ontario, Canada 
Günther Pernul, University of Regensburg. Germany
Birgit Pfitzmann, IBM Zurich Research Lab, Switzerland
Bart Preneel, KU Leuven, Belgium 
Kai Rannenberg, Goethe University Frankfurt, Germany
Andreas Schaad, SAP Labs, France

Nicholas Sheppard, The University of Wollongong, Australia
Morton Swimmer, John Jay College of Criminal Justice/CUNY, USA
Clark Thomborson, University of Auckland, New Zealand

Sheng Zhong, State University of New York at Buffalo, USA
 


Contact SDM

Milan Petkovic

Emial:

Phone: +31 40 2747631
Fax: +31 40 2746321


Webmaster Milan[dot]Petkovic[at]philips[dot]com - page last updated on March 11, 2008