posted by organizer: glivraga || 974 views || tracked by 6 users: [display]

DPM 2016 : 11th International Workshop on Data Privacy Management


When Sep 26, 2016 - Sep 27, 2016
Where Heraklion, Crete, Greece
Submission Deadline Jul 8, 2016
Notification Due Jul 29, 2016
Final Version Due Aug 7, 2016
Categories    privacy   data privacy management

Call For Papers


*** Submission deadline extended to July 08, 2016 - 11:59PM American Samoa time ***

11th International Workshop on Data Privacy Management (DPM 2016)
co-located with ESORICS 2016
Heraklion, Crete, Greece - September 26-27, 2016

DPM is an annual international workshop covering research in data privacy management.
DPM 2016, the 11th International Workshop on Data Privacy Management, will be
held in Heraklion, Crete, Greece, in conjunction with the 21st European Symposium
on Research in Computer Security (ESORICS 2016).

Organizations are increasingly concerned about the privacy of information that
they manage (as witnessed, for example, by lawsuits filed against organizations
for violating the privacy of customer's data). Thus, the first management of
privacy-sensitive information is very critical and important for every organization.
This poses several challenging problems, such as how to translate the high-level
business goals into system-level privacy policies, administration of
privacy-sensitive data, privacy preserving data integration and engineering,
privacy preserving access control mechanisms, information-oriented security,
and query execution on privacy-sensitive data for partial answers.

The aim of this workshop is to discuss and exchange the ideas
related to data privacy management. We invite papers from researchers
and practitioners working in privacy, security, trustworthy data
systems and related areas to submit their original papers in this
workshop. Submissions by PhD students as well as controversial ideas
are encouraged. Case studies (successful or not) are also encouraged.
Topics of interest include, but are not limited to:

* Privacy Information Management
* Privacy Policy-Based Infrastructures and Architectures
* Privacy-Oriented Access Control Languages and Models
* Privacy in Trust Management
* Privacy in Digital Currencies
* Privacy Risk Assessment and Assurance
* Privacy Services
* Cryptography and Cryptanalysis
* Privacy Policy Analysis
* Query Execution over Privacy-Sensitive Data
* Privacy Preserving Data Mining
* Privacy for IntegrityBased Computing
* Privacy Monitoring and Auditing
* Privacy in Social Networks
* Privacy in Ambient Intelligence (AmI) Applications
* Individual Privacy vs. Corporate/National Security
* Privacy in Computer Networks
* Privacy and RFIDs
* Privacy and Big Data
* Privacy in Sensor Networks
* Privacy and Security Management in Cloud Computing
* Privacy and Security Management in the IoT
* Privacy and Security Management in Pervasive Computing

Submitted papers must not substantially overlap papers that have
been published or that are simultaneously submitted to a journal
or a conference with proceedings.
Papers can be submitted as Full Papers or Short Papers.
Full papers should be at most 16 pages in the LNCS format
(as done in previous DPM), including the bibliography and
well-marked appendices.
Short papers should be at most 8 pages in the LNCS format
(as done in previous DPM), including the bibliography and
well-marked appendices.
Program Committee members are not required to read the
appendices, so papers should be intelligible without them.
Authors must submit their papers by the deadline indicated below,
using the EasyChair web site (at
Authors must indicate whether they are submitting a full or short paper
by selecting the appropriate choice in the EasyChair submission form.
All submissions must be written in English, and only PDF files will
be accepted (a Latex source file will be required for the final
version of the accepted papers).
All papers will be refereed. Accepted papers must be presented at
the Workshop. At least one author of each accepted paper must register
to the workshop, by the early date indicated by the organizers, and
present the paper.
Accepted papers will be published in the workshop proceedings by Springer in
the Lecture Notes in Computer Science (LNCS) series. The LNCS template
can be found at .
Proceedings will be made available in time for the workshop.

Paper Submission: July 08, 2016 (11:59PM American Samoa time) [extended]
Notification to authors: July 29, 2016
Camera ready: August 07, 2016

Giovanni Livraga (Universita' degli Studi di Milano, Italy)
Vicenc Torra (University of Skovde, Sweden)

Ken Barker, University of Calgary, Canada
Michele Bezzi, SAP, France
Jordi Casas-Roma, Universitat Oberta de Catalunya, Spain
Jordi Castella-Roca, Universitat Rovira i Virgili, Spain
Jorge Cuellar, Siemens AG, Germany
Frederic Cuppens, Telecom Bretagne, France
Nora Cuppens, Telecom Bretagne, France
Sabrina De Capitani di Vimercati, Universita' degli Studi di Milano, Italy
Josep Domingo-Ferrer, Universitat Rovira i Virgili, Spain
Vladimir Estivill-Castro, Griffith University, Australia
Carmen Fernandez-Gago, University of Malaga, Spain
Simone Fischer-Hubner, Karlstad University, Sweden
Sara Foresti, Universita' degli Studi di Milano, Italy
Steven Furnell, Plymouth University, United Kingdom
Sebastien Gambs, University of Rennes, France
Joaquin Garcia-Alfaro, Telecom SudParis, France
Stefanos Gritzalis, University of the Aegean, Greece
Javier Herranz, Universitat Politecnica de Catalunya, Spain
Jordi Herrera-Joancomarti, Universitat Autonoma de Barcelona, Spain
Marc Juarez, Katholieke Universiteit Leuven, Belgium
Sokratis Katsikas, Giovik University College, Norway
Florian Kerschbaum, SAP, Germany
Hiroaki Kikuchi, Tokai University, Japan
Jiguo Li, Hohai University, China
Traian Marius-Truta, Northern Kentucky University, United States
Fabio Martinelli, IIT-CNR, Italy
Chris Mitchell, Royal Holloway, United Kingdom
Atsuko Miyaji, Japan Advanced Institute of Science and Technology, Japan
Anna Monreale, University of Pisa, Italy
Melek Onen, EURECOM, France
Gerardo Pelosi, Politecnico di Milano, Italy
Cristina Perez-Sola, Universitat Autonoma de Barcelona, Spain
Silvio Ranise, FBK Security and Trust Unit, Italy
Pierangela Samarati, Universita' degli Studi di Milano, Italy
Andreas Schaad, Huawei, Germany
Matthias Templ, Vienna University of Technology, Austria
Yasuyuki Tsukada, NTT Communication Science Laboratories, Japan
Edgar Weippl, SBA Research / TU Wien, Austria
Lena Wiese, University of Gottingen, Germany

This call for papers and additional information about the workshop
can be found at

Related Resources

ADAH 2017   Advanced Data Analytics in Health
Future_Internet-SI 2017   Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
IEEE - ICBDA 2018   2018 IEEE 3rd International Conference on Big Data Analysis (ICBDA 2018)--IEEE Xplore and Ei Compendex
MathSJ 2017   Applied Mathematics and Sciences: An International Journal
CODASPY 2018   Conference on Data and Application Security and Privacy
Ei - ICBDA - IEEE 2018   2018 IEEE 3rd International Conference on Big Data Analysis (ICBDA 2018)--IEEE Xplore and Ei Compendex
MobileCloud MMBDHS 2017   Special Issue on Mobile Cloud-Assisted Paradigms for Management of Multimedia Big Data in Healthcare Systems
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
ICISS 2017   International Conference on Information Systems Security
WICSPIT 2018   Workshop on Innovative CyberSecurity and Privacy for Internet of Things