Call for Papers
Scope
Organizations are increasingly concerned about the privacy of information that they manage (as witnessed, for example, by lawsuits filed against organizations for violating the privacy of customer's data). Thus, the first management of privacy-sensitive information is very critical and important for every organization. This poses several challenging problems, such as how to translate the high-level business goals into system-level privacy policies, administration of privacy-sensitive data, privacy preserving data integration and engineering, privacy preserving access control mechanisms, information-oriented security, and query execution on privacy-sensitive data for partial answers.
Topics
The aim of this workshop is to discuss and exchange the ideas related to data privacy management. We invite papers from researchers and practitioners working in privacy, security, trustworthy data systems and related areas to submit their original papers in this workshop. Submissions by PhD students as well as controversial ideas are encouraged. Case studies (successful or not) are also encouraged. Topics of interest include, but are not limited to:- Privacy Information Management
- Privacy Policy-Based Infrastructures and Architectures
- Privacy-Oriented Access Control Languages and Models
- Privacy in Trust Management
- Privacy in Digital Currencies
- Privacy Risk Assessment and Assurance
- Privacy Services
- Cryptography and Cryptanalysis
- Privacy Policy Analysis
- Query Execution over Privacy-Sensitive Data
- Privacy Preserving Data Mining
- Privacy for IntegrityBased Computing
- Privacy Monitoring and Auditing
- Privacy in Social Networks
- Privacy in Ambient Intelligence (AmI) Applications
- Individual Privacy vs. Corporate/National Security
- Privacy in Computer Networks
- Privacy and RFIDs
- Privacy and Big Data
- Privacy in Sensor Networks
- Privacy and Security Management in Cloud Computing
- Privacy and Security Management in the IoT
- Privacy and Security Management in Pervasive Computing
Submission guidelines
Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings.
Papers can be submitted as Full Papers or Short Papers. Full papers should be at most 16 pages in the LNCS format (as done in previous DPM), including the bibliography and well-marked appendices. Short papers should be at most 8 pages in the LNCS format (as done in previous DPM), including the bibliography and well-marked appendices. Program Committee members are not required to read the appendices, so papers should be intelligible without them. Authors must submit their papers by the deadline indicated below, using the EasyChair web site (at easychair.org/conferences/?conf=dpm2016). Authors must indicate whether they are submitting a full or short paper by selecting the appropriate choice in the EasyChair submission form. All submissions must be written in English, and only PDF files will be accepted (a Latex source file will be required for the final version of the accepted papers).
All papers will be refereed. Accepted papers must be presented at the Workshop. At least one author of each accepted paper must register to the workshop, by the early date indicated by the organizers, and present the paper.
Accepted papers will be published in the workshop proceedings by Springer in the Lecture Notes in Computer Science (LNCS) series. The LNCS template can be found at http://www.springer.com/computer/lncs/lncs+authors. Proceedings will be made available in time for the workshop.
Committees
Program Committee Chairs
- Giovanni Livraga, Università degli Studi di Milano, Italy
- Vicenç Torra, University of Skövde, Sweden
Program Committee
- Ken Barker, University of Calgary, Canada
- Michele Bezzi, SAP, France
- Jordi Casas-Roma, Universitat Oberta de Catalunya, Spain
- Jordi Castellà-Roca, Universitat Rovira i Virgili, Spain
- Jorge Cuéllar, Siemens AG, Germany
- Frédéric Cuppens, Telecom Bretagne, France
- Nora Cuppens, Telecom Bretagne, France
- Sabrina De Capitani di Vimercati, Università degli Studi di Milano, Italy
- Josep Domingo-Ferrer, Universitat Rovira i Virgili, Spain
- Vladimir Estivill-Castro, Griffith University, Australia
- Carmen Fernandez-Gago, University of Málaga, Spain
- Simone Fischer-Hübner, Karlstad University, Sweden
- Sara Foresti, Università degli Studi di Milano, Italy
- Steven Furnell, Plymouth University, United Kingdom
- Sébastien Gambs, University of Rennes, France
- Joaquin Garcia-Alfaro, Telecom SudParis, France
- Stefanos Gritzalis, University of the Aegean, Greece
- Javier Herranz, Universitat Politècnica de Catalunya, Spain
- Jordi Herrera-Joancomarti, Universitat Autònoma de Barcelona, Spain
- Marc Juarez, Katholieke Universiteit Leuven, Belgium
- Sokratis Katsikas, Giøvik University College, Norway
- Florian Kerschbaum, SAP, Germany
- Hiroaki Kikuchi, Tokai University, Japan
- Jiguo Li, Hohai University, China
- Traian Marius-Truta, Northern Kentucky University, United States
- Fabio Martinelli, IIT-CNR, Italy
- Chris Mitchell, Royal Holloway, United Kingdom
- Atsuko Miyaji, Japan Advanced Institute of Science and Technology, Japan
- Anna Monreale, University of Pisa, Italy
- Melek Önen, EURECOM, France
- Gerardo Pelosi, Politecnico di Milano, Italy
- Cristina Pérez-Solà, Universitat Autònoma de Barcelona, Spain
- Silvio Ranise, FBK Security and Trust Unit, Italy
- Pierangela Samarati, Università degli Studi di Milano, Italy
- Andreas Schaad, Huawei, Germany
- Matthias Templ, Vienna University of Technology, Austria
- Yasuyuki Tsukada, NTT Communication Science Laboratories, Japan
- Edgar Weippl, SBA Research / TU Wien, Austria
- Lena Wiese, University of Göttingen, Germany