Program
Thursday, September 6, 2018
09:00 - 09:15 General Welcome
(Room: Agora)09:15 - 10:30 Keynote
- Anonymity in Cryptocurrencies
Sarah Meiklejohn
10:30 - 11:00 Coffee Break
11:00 - 12:30 Session 1: Privacy Assessment and Trust
(Room: C3, Chair: Jorge Cuellar)- 11:00-11:30 Towards an Effective Privacy Impact and Risk Assessment Methodology: Risk Analysis
By Majed Alshammari and Andrew Simpson (University of Oxford) -
11:30-12:00 Privacy Risk Assessment: From Art to Science, By Metrics
By Isabel Wagner and Eerke Boiten (De Montfort University) -
12:00-12:30 Bootstrapping Online Trust: Timeline Activity Proofs
By Constantin Catalin Dragan and Mark Manulis (University of Surrey)
12:30 - 14:00 Lunch Break
14:00 - 15:30 Session 2: Private Data and Searches
(Room: C3, Chair: Javier Parra-Arnau)-
14:00-14:30 Post-processing Methods for High Quality Privacy-preserving Record Linkage
By Martin Franke, Ziad Sehili, Marcel Gladbach, and Erhard Rahm (University of Leipzig) -
14:30-15:00 δ-DOCA: Achieving Privacy in Data Streams
By Bruno C. Leal, Israel C. Vidal, Felipe T. Brito, Juvêncio S. Nobre, and Javam C. Machado (Universidade Federal do Ceara) -
15:00-15:30 Data Oblivious Genome Variants Search on Intel SGX
By Avradip Mandal (Fujitsu Laboratories of America), John C. Mitchell (Stanford University), Hart Montgomery (Fujitsu Laboratories of America), and Arnab Roy (Fujitsu Laboratories of America)
15:30 - 16:00 Coffee Break
16:00-17:20 Session 3: Internet of Things
(Room: C3, Chair: Ken Barker)-
16:00-16:30 Developing GDPR Compliant Apps For The Edge
By Tom Lodge, Andy Crabtree, and Anthony Brown (University of Nottingham) -
16:30-17:00 YaPPL - A Lightweight Privacy Preference Language for Legally Sufficient and Automated Consent Provision in IoT Scenarios
By Max-R. Ulbricht and Frank Pallas (TU Berlin) -
17:00-17:20 PrivacyGuard: Enforcing Private Data Usage with Blockchain and Attested Execution
By Ning Zhang (Virginia Polytechnic Institute and State University), Jin Li (Guangzhou University), Wenjing Lou (Virginia Polytechnic Institute and State University), and Y. Thomas Hou (Virginia Polytechnic Institute and State University)
19:00-23:00 Social Activity & Gala Dinner
Friday, September 7, 2018
09:00 - 10:30 Session 4: Privacy and Cryptography
(Room: C3, Chair: Guillermo Navarro-Arribas)-
09:00-09:30 A Performance and Resource Consumption Assessment of Secret Sharing based Secure Multiparty Computation
By Marcel von Maltitz and Georg Carle (Technical University of Munich) -
09:30-10:00 Privacy-Preserving Trade Chain Detection
By Stefan Wueller (RWTH Aachen University and Stevens Institute of Technology), Malte Breuer (RWTH Aachen University), Ulrike Meyer (RWTH Aachen University), and Susanne Wetzel (Stevens Institute of Technology) -
10:00-10:30 FHE-compatible Batch Normalization for Privacy Preserving Deep Learning
By Alberto Ibarrondo and Melek Onen (EURECOM)
10:30 - 11:00 Coffee Break
11:00 - 12:20 Session 5: Future Internet
(Room: C3, Chair: Isabel Wagner)-
11:00-11:20 On Security of Anonymous Invitation-Based System
By Naoto Yanai and Jason Paul Cruz (Osaka University) -
11:20-11:40 A general algorithm for k-anonymity on dynamic databases
By Julian Salas (Universitat Oberta de Catalunya) and Vicenc Torra (University of Skovde) - 11:40-12:00 - Probabilistic metric spaces for privacy by design machine learning algorithms: modeling database changes
By Vicenc Torra (University of Skovde) and Guillermo Navarro-Arribas (Universitat Autonoma de Barcelona) - 12:00-12:20 - Lifelogging Protection Scheme for Internet-based Personal Assistants
By David Pamies-Estrems (Universitat Rovira i Virgili), Nesrine Kaaniche (Telecom SudParis), Maryline Laurent (Telecom SudParis), Jordi Castella-Roca, (Universitat Rovira i Virgili), and Joaquin Garcia-Alfaro (Telecom SudParis)
12:20 - 12:30 Concluding Remarks
12:30 - 14:00 Lunch & Farewell
List of accepted papers:
- A general algorithm for k-anonymity on dynamic databases (Short Paper) (Julian Salas and Vicenc Torra)
- A Performance and Resource Consumption Assessment of Secure Multiparty Computation (Marcel von Maltitz and Georg Carle)
- Bootstrapping Online Trust: Timeline Activity Proofs (Constantin Catalin Dragan and Mark Manulis)
- Data Oblivious Genome Variants Search on Intel SGX (Avradip Mandal, John C. Mitchell, Hart Montgomery and Arnab Roy)
- delta-DOCA: Achieving Privacy in Data Streams (Bruno C. Leal, Israel C. Vidal, Felipe T. Brito, Juvencio S. Nobre and Javam C. Machado
- Developing GDPR Compliant Apps For The Edge (Tom Lodge, Andy Crabtree and Anthony Brown)
- FHE-compatible Batch Normalization for Privacy Preserving Deep Learning (Alberto Ibarrondo and Melek Onen)
- Lifelogging Protection Scheme for Internet-based Personal Assistants (Short Paper) (David Pamies-Estrems, Nesrine Kaaniche, Maryline Laurent, Jordi Castella-Roca and Joaquin Garcia-Alfaro)
- On Security of Anonymous Invitation-Based System (Short Paper) (Naoto Yanai and Jason Paul Cruz)
- Post-processing Methods for High Quality Privacy-preserving Record Linkage (Martin Franke, Ziad Sehili, Marcel Gladbach and Erhard Rahm)
- PrivacyGuard: Enforcing Private Data Usage with Blockchain and Attested Execution (Short Paper) (Ning Zhang, Jin Li, Wenjing Lou and Y. Thomas Hou)
- Privacy-Preserving Trade Chain Detection (Stefan Wueller, Malte Breuer, Ulrike Meyer and Susanne Wetzel)
- Privacy Risk Assessment: From Art to Science, By Metrics (Isabel Wagner and Eerke Boiten)
- Probabilistic metric spaces for privacy by design machine learning algorithms: modeling database changes (Short Paper) (Vicenc Torra and Guillermo Navarro-Arribas)
- Towards an Effective Privacy Impact and Risk Assessment Methodology: Risk Analysis (Majed Alshammari and Andrew Simpson)
- YaPPL - A Lightweight Privacy Preference Language for Legally Sufficient and Automated Consent Provision in IoT Scenarios (Max R. Ulbricht and Frank Pallas)