[Cryptography] Fifth International Workshop on Privacy Engineering (IWPE'19)

Gaurav Misra gmisra at andrew.cmu.edu
Tue Nov 13 10:24:02 EST 2018

*Call For Papers: Fifth International Workshop on Privacy Engineering

*co-located with the IEEE Symposium on Security and Privacy *
*May 23, 2019 - Hyatt Regency, San Francisco, CA *


*Deadline of abstract submission:   January 30, 2019*
*Deadline of paper submission:      February 3, 2019*
*Notification of acceptance:        February 23, 2019 *
*Accepted Paper camera ready:       March 3, 2019  *

We are pleased to invite you to participate in the 5th International
Workshop on Privacy Engineering (IWPE'19).

Ongoing news reports regarding global surveillance programs, massive
personal data breaches in corporate databases, and notorious examples of
personal tragedies due to privacy violations have intensified societal
demands for privacy-friendly systems. In response, current legislative and
standardization processes worldwide aim to strengthen individual’s privacy
by introducing legal, organizational and technical frameworks that personal
data collectors and processors must follow.

However, in practice, these initiatives alone are not enough to guarantee
that organizations and software developers will be able to identify and
adopt appropriate privacy engineering techniques in their daily practices.
It is also difficult to systematically evaluate whether the systems
developed comply with legal frameworks, provide necessary technical
assurances, and fulfill users’ privacy requirements. It is evident that
research is needed in developing techniques and tools that can aid the
translation of legal and normative concepts, as well as user expectations
into systems requirements. Furthermore, methods that can support
organizations and engineers in developing systems that address these
requirements are of increasing value.

In this context, privacy engineering research is emerging as an important
topic. Engineers are increasingly expected to build and maintain
privacy-preserving and data-protection compliant systems in domains such as
health, energy, transportation, social computing, law enforcement, public
services; based on different infrastructures such as cloud, grid, or
mobile. While there is a consensus on the benefits of an engineering
approach to privacy, concrete proposals for models, methods, techniques and
tools that support engineers and organizations in this endeavor are few and
in need of immediate attention.

To cover this gap, the topics of the International Workshop on Privacy
Engineering (IWPE'19) focus on all the aspects of privacy engineering,
ranging from its theoretical foundations, engineering approaches, and
support infrastructures, to its practical application in projects of
different scale. Specifically, we are seeking the following kinds of

(1) technical papers that illustrate the engineering or application of a
novel formalism, method or other research finding (e.g., a privacy
enhancing protocol) with preliminary evaluation;
(2) experience and practice papers that describe a case study, challenge or
lessons learned from in a specific domain;
(3) early evaluations of tools and other infrastructure that support
privacy-related tasks;
(4) interdisciplinary studies or critical reviews of existing privacy
engineering concepts, methods, tools and frameworks;
(5) vision papers that take a clear position informed by evidence based on
a thorough literature review.

IWPE’19 welcomes papers that focus on novel solutions on the recent
developments in the general area of privacy engineering. Topics of
interests include, but are not limited to:
-Integrating law and policy compliance into the development process
-Privacy impact assessment during software development
-Privacy risk management models
-Privacy breach recovery Methods
-Technical standards, heuristics and best practices for privacy engineering
-Privacy engineering in technical standards
-Privacy requirements elicitation and analysis methods
-User privacy and data protection requirements
-Management of privacy requirements with other system requirements
-Privacy requirements elicitation and analysis techniques
-Privacy engineering strategies and design patterns
-Privacy-preserving architectures
-Privacy engineering and databases, services, and the cloud
-Privacy engineering in networks
-Engineering techniques for fairness, transparency, and privacy in databases
-Privacy engineering in the context of interaction design and usability
-Privacy testing and evaluation methods
-Validation and verification of privacy requirements
-Privacy Engineering and design
-Engineering Privacy Enhancing Technologies (PETs)
-Integration of PETs into systems
-Models and approaches for the verification of privacy properties
-Tools and formal languages supporting privacy engineering
-Teaching and training privacy engineering
-Adaptations of privacy engineering into specific software development
-Pilots and real-world applications
-Evaluation of privacy engineering methods, technologies and tools
-Privacy engineering and accountability
-Privacy engineering and business processes
-Privacy engineering and manageability of data in (large) enterprises
-Organizational, legal, political and economic aspects of privacy

This topic list is not meant to be exhaustive; since IWPE'19 is interested
in all aspects of privacy engineering. However, to screen out off-topic
papers early in the review process, we request authors to submit an
abstract prior to their paper submission. Abstracts of papers without a
clear application to privacy engineering will be considered outside the
scope of this workshop and may be rejected.


We solicit unpublished short position papers (up to 4 pages) and long
papers reporting technical, research or industry experience (up to 8 pages)
on all dimensions of the privacy engineering domain. Each paper, written in
English, must follow IEEE Proceedings format.
Authors must submit a short abstract prior to the paper submission. This
abstract is aimed at 1) helping organizers understand whether the paper is
on-topic early in the review process; and, 2) allowing reviewers to choose
their preferred manuscripts in advance of the paper submission.
Submission of a paper should be regarded as an undertaking that, should the
paper be accepted, at least one of the authors will attend the workshop to
present the paper. All papers must be submitted via EasyChair at
All IWPE'19 papers will be published in IEEE eXplore, which is indexed by
EI Engineering Index, ISI Conference Proceedings Citation Index (CPCI-S),
Scopus etc.

If you have any questions regarding IWPE'19, please contact
iwpe19 at easychair.org

IWPE’19 Organizing Committee
  Jose M. del Alamo
  Aleksandra Korolova
  Jose M. Such
  Borja Balle

*Gaurav Misra*
Postdoctoral Associate

Institute for Software Research
School of Computer Science
Carnegie Mellon University
Wean Hall 4111
5000 Forbes Avenue
Pittsburgh, PA 15213
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://www.metzdowd.com/pipermail/cryptography/attachments/20181113/5eef1cb8/attachment.html>

More information about the cryptography mailing list