The 3rd International Workshop on

Privacy and Anonymity in the Information Society (PAIS)

March 22, 2010, Lausanne (Switzerland)

Collocated with EDBT/ICDT 2010

Tentative Program

9:15 AM – 9:30 AM: Welcome
9:30 AM – 10:30 AM: Keynote Talk 1
      ·  Dan Suciu. Definitions Matter: Reconciling Differential and Adversarial Privacy
10:30 AM – 11:00 AM: Coffee Break
11:00 AM – 12:30 PM: Session 1 (Privacy Risk and Utility Assessment)
      Session Chair: Dan Suciu
      · Michal Sramka, Reihaneh Safavi-Naini, Joerg Denzinger, and Mina Askari. A Practice-oriented Framework for Measuring Privacy and Utility in Data Sanitization Systems
      · Fida Dankar and Khaled Elemam. A Method for Evaluating Marketer Re-identification Risk
      · Michele Bezzi. Expressing Privacy Metrics as One-Symbol Information
12:30 PM – 2:15 PM: Lunch
2:15 PM – 3:15 PM
: Keynote Talk 2
      ·  Pierangela Samarati. Protecting Data Privacy in Outsourcing Scenarios
 3:15 PM – 4:00 PM: Session 2 (Privacy on the Web)
      Session Chair: Pierangela Samarati
      · Clemens Heidinger, Erik Buchmann, and Klemens Böhm. Collaborative Data Privacy for the Web
      · Leanne Wu, Maryam Majedi, Kambiz Ghazinour, and Ken Barker. Analysis of Social Networking Privacy Policies (short paper)
4:00 PM – 4:30 PM: Coffee Break
4:30 PM – 6:00 PM: Session 3 (Privacy Preserving Mechanisms and Applications)
      Session Chair: Traian Marius Truta
      · Daniela Ichim. Bootstrap Methods to Generate Continuous Synthetic Data
      · Esa Hyytiä, Ivan Gojmerac, Simone Teofili, and Giuseppe Bianchi. Key Escrow Schemes with Sliding Window for Privacy-Aware Anomaly Detection System
      · Amruta Mhatre and Durga Toshniwal. Hiding Co-occurring Sensitive Patterns in a Progressive Database (short paper)
      · Marzieh Ispareh, Behrouz Tork Ladani, Shirin Shariat Panahi, and Zahra Nasr Azadani. Toward A Software Development Methodology for Anonymity Applications (short paper)
6:00 PM – 6:05 PM: Concluding Remarks


Accepted Papers

Full Papers
   · Daniela Ichim: Bootstrap Methods to Generate Continuous Synthetic Data
   · Clemens Heidinger, Erik Buchmann, and Klemens Böhm: Collaborative Data Privacy for the Web
   · Esa Hyytiä, Ivan Gojmerac, Simone Teofili, and Giuseppe Bianchi: Key Escrow Schemes with Sliding Window for Privacy-Aware Anomaly Detection System
   · Michal Sramka, Reihaneh Safavi-Naini, Joerg Denzinger, and Mina Askari: A Practice-oriented Framework for Measuring Privacy and Utility in Data Sanitization Systems
   · Fida Dankar and Khaled Elemam: A Method for Evaluating Marketer Re-identification Risk
   · Michele Bezzi: Expressing Privacy Metrics as One-Symbol Information

Short Papers
   · Leanne Wu, Maryam Majedi, Kambiz Ghazinour, and Ken Barker: Analysis of Social Networking Privacy Policies
   · Amruta Mhatre and Durga Toshniwal: Hiding Co-occurring Sensitive Patterns in a Progressive Database
   · Marzieh Ispareh, Behrouz Tork Ladani, Shirin Shariat Panahi, and Zahra Nasr Azadani: Toward A Software Development Methodology for Anonymity Applications