MM-INTEREST Archives

ACM SIGMM Interest List

MM-INTEREST@LISTSERV.ACM.ORG

Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Mikaël Ates <[log in to unmask]>
Reply To:
Mikaël Ates <[log in to unmask]>
Date:
Mon, 22 Mar 2010 11:32:40 +0100
Content-Type:
multipart/mixed
Parts/Attachments:
text/plain (6 kB) , CFP_PIIPES.txt (6 kB)
The PIIPES'10 paper deadline is postponed to the 11th of April. Please
note the new submission URL:
http://www.mucoms.org/script/a_login.php?ci=ci13

==========================================================================



                                CALL FOR PAPERS
                      14th East-European Conference on
                Advances in Databases and Information Systems
                      Novi Sad, September 20 - 24, 2010
                               ADBIS 2010 TRACK
                      Personal Identifiable Information:
                   Privacy, Ethics, and Security (PIIPES)
                                     ____


= PIIPES =
Personal Identifiable Information:  Privacy, Ethics, and Security 
Breaches of personally identifiable information (PII) have increased
dramatically over the past few years and have resulted in the loss of
millions of records. Breaches of PII are hazardous to both individuals
and organizations. Individual harms may include identity theft,
embarrassment, or blackmail. Organizational harms may include a loss of
public trust, legal liability, or high costs to handle the breach. (USA
National Institute of Standards and Technology, 2009)

* PII – information in an IT system or online collection: (1) that
directly identifies an individual (e.g., name, address, social security
number or other identifying number or code, telephone number, email
address, etc.), or (2) by which an agency intends to identify specific
individuals in conjunction with other data elements, i.e., indirect
identification. (These data elements may include a combination of
gender, race, birth date, geographic indicator, and other descriptors.)
(U.S. Department of Health & Human Services)

* PII – information which can be used to distinguish or trace an
individual's identity, such as their name, social security number,
biometric records, etc. alone, or when combined with other personal or
identifying information which is linked or linkable to a specific
individual, such as date and place of birth, mother’s maiden name, etc.
(OMB Memorandum 07-16)

* PII – 'personal data' shall mean any information relating to an
identified or identifiable natural person ('data subject'); an
identifiable person is one who can be identified, directly or
indirectly, in particular by reference to an identification number or to
one or more factors specific to his physical, physiological, mental,
economic, cultural or social identity;( EU directive 95/46/EC)


= Track program committee co-chairs =
Dr. Mikaël Ates, Entr'ouvert, France.
Dr. Sabah Al-Fedaghi, Computer Engineering Department, Kuwait
University.


= Topics include but not limited to =

PII Definition, 
PII Value, 
PII Effects and uses, 

PII Laws, 
PII Health records, 
PII Economics, 
PII Trust issues, 
PII Ownership,
PII Impact Assessment,
PII on the Internet,
PII in e-commerce, 
PII and the Semantic Web,
PII and Banking systems,
PII and Social networks,
PII and Digital Rights Management,
PII and Media content streaming,

PII Classification, 
PII Processing, 
PII Sensitivity, 
PII Lying, 
PII Flow,
PII Seeking, 
Non-textual PII,
PII Biometrics,

PII and Data mining,
PII and Security,
PII and Privacy,
PII Protection, 
PII Surveillance, 
PII and Access Control, 
PII Confidentiality issues, 
PII and Anonymity,
PII and Personal identifiable misinformation, 
PII and Privacy-by-design, 

PII Access and Dissemination, 
PII Management systems, 
Capture, archival and retrieval of PII, 
PII Policies,
PII Databases, 
PII Warehouses, 
PII On-line stores,
PII into RDF, 
PII in P3P, 
PII Life-cycles.


= Important Dates =
* Submission of papers (firm): 	April 11, 2010
* Notification of acceptance: 	May 15, 2010
* Camera ready:		 	June 15, 2010
* Conference:			September 20 - 24, 2010


= Publication =
Contributions are solicited for the following categories:
- full research papers describing research accomplishments
(aproximatelly 5000 words), 
- demonstrations and short communications (aproximatelly 2000-3000
words), i.e. experience reports, project overviews, etc. which do not
fully adhere to the standards of a first rate scientific publication,
but are nevertheless of interest and value for the participants of the
conference.

The program committee may decide to accept a submission as a short paper
(2000–3000 words) if it reports interesting results but does not justify
publication of a full paper. Research papers will be published in the
LNCS series of Springer Verlag. Communications will be included in
additional local proceedings. A selection of outstanding papers from the
conference may be invited for publication in an internationally
recognized journal (subject to additional reviewing). All contributions
should be in PDF format and should be submitted electronically via the
ADBIS `Submission and Review System’. For their submissions, authors are
encouraged to consider the final paper format requirements, as specified
at the conference site.

Research papers should be original contributions and should not be
accepted or submitted elsewhere until the decisions of the ADBIS 2010
program committee are announced. At least one author from every
submission accepted to appear in the Springer proceedings or the local
proceedings is obliged to register and attend the conference.


= Submission =
Submit your paper on the conference Website:
http://www.mucoms.org/script/a_login.php?ci=ci13


= Program committee =
Buccafurri	Francesco	Università Mediterranea di Reggio Calabria - DIMET
Laboratory - Italy
Chbeir		Richard		University of Bourgogne - LE2I Laboratory - France
Chen		Gongliang	Shanghai Jiao Tong University - China
Cuppens		Frédéric	TELECOM BRETAGNE – SERES Laboratory - France
Damiani		Ernesto		Università degli Studi di Milano – SESAR Laboratory -
Italy
Dauvergne	Benjamin	Entrouvert - France
Fayolle		Jacques		TELECOM SAINT-ETIENNE – Université de Lyon – DIOM
Laboratory - France
Jaillon		Philippe	ENS MINES SAINT-ETIENNE – LSTI - France
Kakizaki	Yoshio		Tokyo University of Science - Japan
Laurent		Maryline	TELECOM SUD PARIS - France
Lax		Gianluca	Università Mediterranea di Reggio Calabria – DIMET
Laboratory - Italy
Lee		Byung-Gil	ETRI – Knowledge-based Information Security & Safety
Research Department - Korea
Lhote		Loick		ENSICAEN – GREYC Laboratory - France
Ma		YingHua		Shanghai Jiao Tong University - China
Parrend		Pierre		Forschungszentrum Informatik an der Universität
Karlsruhe - FZI - Germany
Pasquet		Marc		ENSICAEN – GREYC Laboratory - France
Riguidel	Michel		TELECOM PARISTECH - France
Thalheim	Bernhard	University of Kiel – ISE - Germany
Vercouter	Laurent		ENS MINES SAINT-ETIENNE – LSTI Laboratory - France
Yoo		Jang-Hee	ETRI – Software Research Laboratory - Korea


= Further information on =
http://www.adbis2010.org/
http://piipes.entrouvert.org/adbis2010/tracks/piipes/




CALL FOR PAPERS 14th East-European Conference on Advances in Databases and Information Systems Novi Sad, September 20 - 24, 2010 ADBIS 2010 TRACK    Personal Identifiable Information: Privacy, Ethics, and Security (PIIPES) ____ = PIIPES = Personal Identifiable Information: Privacy, Ethics, and Security Breaches of personally identifiable information (PII) have increased dramatically over the past few years and have resulted in the loss of millions of records. Breaches of PII are hazardous to both individuals and organizations. Individual harms may include identity theft, embarrassment, or blackmail. Organizational harms may include a loss of public trust, legal liability, or high costs to handle the breach. (USA National Institute of Standards and Technology, 2009) * PII – information in an IT system or online collection: (1) that directly identifies an individual (e.g., name, address, social security number or other identifying number or code, telephone number, email address, etc.), or (2) by which an agency intends to identify specific individuals in conjunction with other data elements, i.e., indirect identification. (These data elements may include a combination of gender, race, birth date, geographic indicator, and other descriptors.) (U.S. Department of Health & Human Services) * PII – information which can be used to distinguish or trace an individual's identity, such as their name, social security number, biometric records, etc. alone, or when combined with other personal or identifying information which is linked or linkable to a specific individual, such as date and place of birth, mother’s maiden name, etc. (OMB Memorandum 07-16) * PII – 'personal data' shall mean any information relating to an identified or identifiable natural person ('data subject'); an identifiable person is one who can be identified, directly or indirectly, in particular by reference to an identification number or to one or more factors specific to his physical, physiological, mental, economic, cultural or social identity;( EU directive 95/46/EC) = Track program committee co-chairs = Dr. Mikaël Ates, Entr'ouvert, France. Dr. Sabah Al-Fedaghi, Computer Engineering Department, Kuwait University. = Topics include but not limited to = PII Definition, PII Value, PII Effects and uses, PII Laws, PII Health records, PII Economics, PII Trust issues, PII Ownership, PII Impact Assessment, PII on the Internet, PII in e-commerce, PII and the Semantic Web, PII and Banking systems, PII and Social networks, PII and Digital Rights Management, PII and Media content streaming, PII Classification, PII Processing, PII Sensitivity, PII Lying, PII Flow, PII Seeking, Non-textual PII, PII Biometrics, PII and Data mining, PII and Security, PII and Privacy, PII Protection, PII Surveillance, PII and Access Control, PII Confidentiality issues, PII and Anonymity, PII and Personal identifiable misinformation, PII and Privacy-by-design, PII Access and Dissemination, PII Management systems, Capture, archival and retrieval of PII, PII Policies, PII Databases, PII Warehouses, PII On-line stores, PII into RDF, PII in P3P, PII Life-cycles. = Important Dates = * Submission of papers (firm): April 11, 2010 * Notification of acceptance: May 15, 2010 * Camera ready: June 15, 2010 * Conference: September 20 - 24, 2010 = Publication = Contributions are solicited for the following categories: - full research papers describing research accomplishments (aproximatelly 5000 words), - demonstrations and short communications (aproximatelly 2000-3000 words), i.e. experience reports, project overviews, etc. which do not fully adhere to the standards of a first rate scientific publication, but are nevertheless of interest and value for the participants of the conference. The program committee may decide to accept a submission as a short paper (2000–3000 words) if it reports interesting results but does not justify publication of a full paper. Research papers will be published in the LNCS series of Springer Verlag. Communications will be included in additional local proceedings. A selection of outstanding papers from the conference may be invited for publication in an internationally recognized journal (subject to additional reviewing). All contributions should be in PDF format and should be submitted electronically via the ADBIS `Submission and Review System’. For their submissions, authors are encouraged to consider the final paper format requirements, as specified at the conference site. Research papers should be original contributions and should not be accepted or submitted elsewhere until the decisions of the ADBIS 2010 program committee are announced. At least one author from every submission accepted to appear in the Springer proceedings or the local proceedings is obliged to register and attend the conference. = Submission = Submit your paper on the conference Website: http://www.mucoms.org/script/a_login.php?ci=ci13 = Program committee = Buccafurri Francesco Università Mediterranea di Reggio Calabria - DIMET Laboratory - Italy Chbeir Richard University of Bourgogne - LE2I Laboratory - France Chen Gongliang Shanghai Jiao Tong University - China Cuppens Frédéric TELECOM BRETAGNE – SERES Laboratory - France Damiani Ernesto Università degli Studi di Milano – SESAR Laboratory - Italy Dauvergne Benjamin Entrouvert - France Fayolle Jacques TELECOM SAINT-ETIENNE – Université de Lyon – DIOM Laboratory - France Jaillon Philippe ENS MINES SAINT-ETIENNE – LSTI - France Kakizaki Yoshio Tokyo University of Science - Japan Laurent Maryline TELECOM SUD PARIS - France Lax Gianluca Università Mediterranea di Reggio Calabria – DIMET Laboratory - Italy Lee Byung-Gil ETRI – Knowledge-based Information Security & Safety Research Department - Korea Lhote Loick ENSICAEN – GREYC Laboratory - France Ma YingHua Shanghai Jiao Tong University - China Parrend Pierre Forschungszentrum Informatik an der Universität Karlsruhe - FZI - Germany Pasquet Marc ENSICAEN – GREYC Laboratory - France Riguidel Michel TELECOM PARISTECH - France Thalheim Bernhard University of Kiel – ISE - Germany Vercouter Laurent ENS MINES SAINT-ETIENNE – LSTI Laboratory - France Yoo Jang-Hee ETRI – Software Research Laboratory - Korea = Further information on = http://www.adbis2010.org/ http://piipes.entrouvert.org/adbis2010/tracks/piipes/

ATOM RSS1 RSS2