Program
Thursday September 14
09:00 - 09:15 General Welcome
(Room: Big Time)09:15 - 10:30 Keynote
- Privacy models and disclosure risk: integral privacy
Vicenç Torra (University of Skövde)
10:30 - 11:00 Coffee Break
11:00 - 12:30 Session 1: Privacy, logics, and computational models
(Room: Big Time, Chair: Joaquin Garcia-Alfaro)- 11:00-11:30 A Proof Calculus for Attack Trees in Isabelle.
By Florian Kammueller (Middlesex University London and TU Berlin). -
11:30-12:00 Confidentiality of Interactions in Concurrent Object-Oriented Systems.
By Olaf Owe (University of Oslo), Toktam Ramezanifarkhani (University of Oslo). -
12:00-12:30 Using Oblivious RAM in Genomic Studies.
By Nikolaos Karvelas (TU Darmstadt), Andreas Peter (University of Twente), Stefan Katzenbeisser (TU Darmstadt).
12:30 - 14:00 Lunch
14:00 - 15:30 Session 2: Privacy and encrypted search
(Room: Big Time, Chair: Guillermo Navarro-Arribas)-
14:00-14:30 Towards Efficient and Secure Encrypted Databases: Extending Message-Locked Encryption in Three-Party Model.
By Yuuji Furuta (Osaka University), Naoto Yanai (Osaka University), Masashi Karasaki (Nippon Telegraph and Telephone West Corporation), Katsuhiko Eguchi (Nippon Telegraph and Telephone West Corporation), Yasunori Ishihara (Osaka University), Toru Fujiwara (Osaka University). -
14:30-15:00 Searchable Encrypted Relational Databases: Risks and Countermeasures.
By Mohamed Ahmed Abdelraheem (SICS), Tobias Andersson (SICS), Christian Gehrmann (Lund University). -
15:00-15:30 Private verification of access on medical data: an initial study
By Thais Bardini Idalino (University of Ottawa), Dayana Spagnuelo (University of Luxembourg), Jean Everson Martina (Universidade Federal de Santa Catarina).
15:30 - 16:00 Coffee Break
16:00-17:30 Session 3: Data Privacy, data mining, and applications
(Room: Big Time, Chair: Florian Kammueller)-
16:00-16:25 Default Privacy Setting Prediction by Grouping User's Attributes and Settings Preferences
By Toru Nakamura (KDDI Research, Inc.), Welderufael Berhane Tesfay (Goethe University Frankfurt), Shinsaku Kiyomoto (KDDI Research, Inc.), Jetzabel Serna (Goethe University Frankfurt). -
16:25-16:50 δ-privacy: Bounding Privacy Leaks in Privacy Preserving Data Mining.
By Zhizhou Li (The Voleon Group), Ten H. Lai (The Ohio State University). -
16:50-17:15 Threshold Single Password Authentication.
By Devriş Işler (Koç University), Alptekin Küpçü (Koç University). -
17:15-17:40 Towards A Toolkit for Utility and Privacy-Preserving Transformation of Semi-structured Data Using Data Pseudonymization.
By Saffija Kasem-Madani (University of Bonn), Michael Meier (University of Bonn), Martin Wehner (University of Bonn).
18:30-20:00 Aperitif in Gamle Museet
Friday September 15
09:00 - 10:30 Session 4: User privacy
(Room: Big Time, Chair: Jordi Herrera-Joancomarti)-
09:00-09:30 Privacy Dashcam - Towards Lawful Use of Dashcams Through Enforcement of External Anonymization.
By Paul Wagner (Karlsruhe Institute of Technology), Pascal Birnstill (Fraunhofer IOSB), Erik Krempel (Fraunhofer IOSB), Sebastian Bretthauer (Karlsruhe Institute of Technology), Jürgen Beyerer (Fraunhofer IOSB). -
09:30-10:00 DLoc: Distributed Auditing for Data Location Compliance in Cloud.
Mojtaba Eskandari (University of Trento), Bruno Crispo (University of Trento), Anderson Santana De Oliveira (SAP). -
10:00-10:30 Inonymous: Anonymous Invitation-Based System.
By Sanaz Taheri Boshrooyeh (Koç University), Alptekin Küpçü (Koç University).
10:30 - 11:00 Coffee Break
11:00 - 12:40 Session 5: Applied cryptography and privacy
(Room: Big Time, Chair: Cristina Perez-Sola)-
11:00-11:30 PCS, a privacy-preserving certification scheme.
By Nesrine Kaaniche (Telecom SudParis), Maryline Laurent (Telecom SudParis), Pierre-Olivier Rocher (Telecom SudParis), Christophe Kiennert (Telecom SudParis), Joaquin Garcia-Alfaro (Telecom SudParis). -
11:30-12:00 Order-Preserving Encryption Using Approximate Integer Common Divisors.
By James Dyer (University of Manchester), Martin Dyer (University of Leeds), and Jie Xu (University of Leeds). - 12:00-12:30 Privacy-Preserving Deterministic Automata Evaluation with Encrypted Data Blocks.
By Giovanni Di Crescenzo (Vencore Labs), Brian Coan (Vencore Labs), Jonathan Kirsch (Vencore Labs).