BSF/DIMACS/DyDAn Workshop on Data Privacy
Linda Casals
lindac at dimacs.rutgers.edu
Fri Jan 25 11:15:43 EST 2008
*************************************************
BSF/DIMACS/DyDAn Workshop on Data Privacy
February 4 - 7, 2008
DIMACS/DyDAn Center, CoRE Building, Rutgers University
Organizers:
Kobbi Nissim, Ben Gurion University, kobbi at cs.bgu.ac.il
Benny Pinkas, University of Haifa, benny at cs.haifa.ac.il
Rebecca Wright, Rutgers University, rebecca.wright at rutgers.edu
Presented under the auspices of the DIMACS Special Focus on
Communication Security and Information Privacy and
the Center for Dynamic Data Analysis (DyDAn).
************************************************
An ever-increasing amount of data is available in digital form, often
accessible via a network. Not surprisingly, this trend is accompanied
by an increase in public awareness of privacy issues and by
legislation of privacy laws. The interest in privacy, and the tension
between privacy and utility of data, is amplified by our growing
ability to collect and store large amounts of data, and our ability to
mine meaningful information from it. This workshop will view privacy
in a broad sense in order to facilitate interaction and discussion
between privacy-oriented researchers in different communities.
The study of "privacy" is inherently interdisciplinary, spanning a
range of applications and scenarios, such as analysis of census data,
detection and prevention of terrorist activity, and biomedical
research. There is a fundamental interplay between privacy and law,
security, economics, and the social sciences. This workshop will
foster interactions between researchers in these fields with those in
statistics and computer science, toward the goal of developing problem
formulations that can be translated into a technical mathematical
language that lends itself to a more rigorous study of privacy. The
workshop will contrast these formal definitions with more intuitive
notions of privacy from the social sciences, economics, philosophy and
law to determine the extent to which they capture the perceived
meaning of privacy in different settings.
Privacy-preserving technologies may soon become an integral part of
the basic infrastructure for the collection and dissemination of
official statistics, as well as for research in business, economics,
medical sciences, and social sciences. Functional solutions for
preserving privacy would therefore serve as a central part of the
infrastructure for those disciplines. This workshop will address a
variety of questions on algorithms for privacy-preserving analysis
such as:
* To what extent can such techniques be applied to
statistical data?
* What are the consequences to privacy and confidentiality
if such techniques are not used?
* Are changes in statistical tools needed to make them
compatible with such techniques?
* Can the techniques be modified to allow use of standard
statistical tools and practices?
**************************************************************
Program:
Monday, February 4, 2008
8:00 - 8:50 Breakfast and Registration
8:50 - 9:00 Welcome and Opening remarks
Rebecca Wright, DIMACS Deputy Director
9:00 - 10:00 Tutorial: Differential Privacy
Adam Smith, Penn State University
10:00 - 10:30 PINQ
Frank McSherry
10:30 - 11:00 Break
11:00 - 12:00 Tutorial: Smooth Sensitivity and Sampling
Sofya Raskhodnikova, Penn State University
12:00 - 12:30 Tutorial: Exponential Mechanism
Kunal Talwar
12:30 - 2:00 Lunch
2:00 - 3:00 Tutorial: Statistical Methods
Alexandra Slavkovic
3:00 - 3:30 Break
3:30 - 4:30 Tutorial: Synthetic Data
John Abowd
Tuesday, February 5, 2008
8:30 - 9:00 Breakfast and Registration
9:00 - 10:30 Tutorial: Secure Multiparty Computation and
Privacy-Preserving Data Mining
Yehuda Lindell, Bar Ilan University
10:30 - 11:00 Break
11:00 - 11:35 The Difficulty of Preventing Disclosure
Moni Naor
11:35 - 12:05 E Gov, Online Citizen Scrutiny and Participation -
The Joint Challenges for Cryptologists and Policy Makers
Tal Zarsky, University of Haifa
12:05 - 12:30 Robust De-anonymization of Multi-dimensional Databases
Vitaly Shmatikov, The University of Texas at Austin
12:30 - 2:00 Lunch
Statistics:
2:00 - 2:25 Privacy: Theory Meets Practice on the Map
John Abowd
2:25 - 2:50 A Hybrid Perturbation/Swapping Approach for Masking Numerical Data
Rathindra Sarathy, Oklahoma State University
2:50 - 3:20 Break
3:20 - 3:45 Deterministic History-Independent Strategies for Storing
Information on Write-Once Memories
Gil Segev, Weizmann Institute of Science
3:45 - 4:10 Cell Suppressions Leak Information
Shubha Nabar, Stanford University
4:10 - 4:35 A Learning Theory Perspective on Data Privacy:
New Hope for Releasing Useful Databases Privately
Avrim Blum, Katrina Ligett, Aaron Roth, Carnegie Mellon University
4:50 - 5:50 Distinguished Lecture: Dilemmas of Privacy
Problems of Marketers, Governments and Social Advocates
Joseph Turow, University of Pennsylvania
5:50 Dinner
Wednesday, February 6, 2008
8:30 - 9:00 Breakfast and Registration
9:00 - 9:30 What Can We Learn Privately?
Shiva Kasiviswanathan
9:30 - 10:00 Mechanism Design
Frank McSherry / Kunal Talwar
10:00 - 10:30 Everlasting Privacy in Voting Protocols
Tal Moran, The Weizmann Institute of Science
10:30 - 11:00 Break
11:00 - 11:30 Efficient Protocols for Set Intersection and Pattern Matching
with Security Against Malicious and Covert Adversaries
Carmit Hazay, Bar-Ilan University
11:30 - 12:00 Mobile Data Collection and Processing
Aggelos Kiayias
12:00 - 12:30 On the Cultural Inflections of Surveillance Discourse
Rivka Ribak, University of Haifa
12:30 - 2:00 Lunch
2:00 - 2:25 Verification of Integrity for Outsourced Content
Publishing and Database Queries
Danfeng Yao
2:25 - 2:50 Secure Logistic Regression
Yuval Nardi, Carnegie Mellon University
2:50 - 3:20 Break
3:20 - 3:45 Constructions of Truly Practical Secure
Protocols using Standard Smartcards
Yehuda Lindell, Bar Ilan University
3:45 - 4:10 Eran Omri
4:10 - 4:35 Delegatable Anonymous Credentials
Melissa Chase
Thursday, February 7, 2008
8:30 - 9:00 Breakfast and Registration
9:00 - 9:25 Protecting the Confidentiality of Tables by Adding Noise to
the Underlying Microdata
Paul B. Massell, Statistical Research Division, U.S. Census Bureau
9:25 - 9:50 How Should We Solve Search Problems Privately?
Amos Beimel, Ben-Gurion University
9:50 - 10:15 Deniable Authentication
Yevgeniy Dodis, NYU and Harvard University
10:15 - 10:30 Alex Selkirk, The Common Datatrust Foundation
10:30 - 10:45 Break
10:45 - 11:30 Helen Nissenbaum
11:30 - 12:30 PANEL
moderated by Stephen Fienberg
12:30 - 2:00 Lunch
2:00 - 2:25 Privacy Utility Tradeoff in Data Publishing
Vibhor Rastogi, University of Washington
2:25 - 2:50 On Lower Bounds for Noise in Private Analysis of Statistical Databases
Sergey Yekhanin, Institute for Advanced Study
2:50 - 3:20 Break
3:20 - 3:45 k-Anonymous Data Mining
Arik Friedman, Technion, Israel
3:45 - 4:10 Efficient Algorithms for Masking and Finding Quasi-identifiers
Ying Xu, Stanford University
4:10 - 4:35 Privacy-Preserving Sharing of Network Data with Anonymization Tools: -
Characterizing Privacy/Utility Tradeoffs and Multi-Level Protection
William Yurcik, University of Texas at Dallas
************************************************************************************
Registration:
Pre-registration deadline: January 28, 2008
Please see website for registration information.
*********************************************************************
Information on participation, registration, accomodations, and travel
can be found at:
http://dimacs.rutgers.edu/Workshops/DataPrivacy/
**PLEASE BE SURE TO PRE-REGISTER EARLY**
********************************************************************
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
More information about the cryptography
mailing list