[PET] IWSEC 2017: Call for Participation

WohlgemuthSven / WOHLGEMUTH,SVEN sven.wohlgemuth.kd at hitachi.com
Mon Jul 10 04:25:59 BST 2017


Dear members of the PET mailing list,

In regards to ICT support to a society, e.g., smart services for healthcare,
the 12th International Workshop on Security (IWSEC) 2017 addresses security and privacy issues
among others with its keynotes, e.g., Practical Risk-based Approaches for Anonymizing Health Data: A Perspective from the Trenches, and special sessions.

Please find the below Call for Participation; please feel free to re-distribute it.
Early-bird registration is possible until: July 30, 2017 (23:59 JST)

Sincerely yours,
Sven Wohlgemuth


####  IWSEC 2017 Call for Participation  ####
  The 12th International Workshop on Security (IWSEC)
  August 30 (Wed)-September 1 (Fri), 2017
  International Conference Center Hiroshima, Hiroshima, Japan
  Web page: http://www.iwsec.org/2017/
  Co-organized by CSEC of IPSJ, Japan, and ISEC of IEICE, Japan
  Original papers on the research and development of various
security topics, as well as case studies and implementation
experiences, are solicited for submission to IWSEC 2017.
Topics of interest for IWSEC 2017 include all theory and practice
of cryptography, information security, and network security,
as in previous IWSEC workshops. In particular, we encourage
the following topics in this year:
              Big Data Analysis for Security                          Critical Infrastructure Security
              Cryptanalysis                                                  Cryptographic Protocols
              Cybersecurity Economics                                Digital Forensics
              Enriched Cryptography                                    Financial Security
              Formal Methods                                              Information Law and Ethics
              IoT security                                                     Machine Learning for Security
              Malware Countermeasures                               Measurements for Cybersecurity
              Multiparty Computation                                    Post Quantum Cryptography
              Privacy Preserving                                          Rational Cryptography
              Real World Cryptography                                 Security Management
              Visualization for Security
** Registration **

  Registration payment, in Japanese Yen only, is due within 5 days of receipt of your registration. Registration is not valid or complete until payment is received unless other arrangements are made. The registration fee includes program material, conference proceedings, conference banquet, refreshment/coffee break. In case of cancellation 20% will be retained as non-refundable cancellation fee. If you use credit card for the payment, the organization name appeared in your credit card statement is Echizen & Associates (エチゼンジムショ in case of Japanese card).
We note that any student who will present a regular/short/poster paper is classified as a "Presenting student" for the registration fee.
  Early Registration Deadline: July 30, 2017 (23:59 JST)

                                                        On or Before Jul. 30            Standard Rate                     On-site Registration
              Regular                               JPY 55,000                         JPY 65,000                         JPY 75,000
              Regular                              JPY 55,000                         JPY 55,000                         JPY 55,000
              (Poster Presenting)
              Presenting Student              JPY 35,000                         JPY 35,000                         JPY 35,000
              Full Time Student                JPY 45,000                         JPY 45,000                         JPY 45,000

** Venue **
International Conference Center Hiroshima 1-5, Nakajima-cho, Naka-ku, Hiroshima, 730-0811
** Access **
International Conference Center Hiroshima (ICCH) is centrally located in Hiroshima City. It is easy to access ICCH from JR Hiroshima Station, Hiroshima Airport and Hiroshima Port.
For more details, please refer to the following webpage.
http://www.pcf.city.hiroshima.jp/icch/e_access.html
** Keynote Talks **
  Dr. Khaled El Emam (University of Ottawa, Canada)
  Title: Practical Risk-based Approaches for Anonymizing Health Data: A Perspective from the Trenches

Abstract
  Anonymization is fundamental for our ability to use and disclose health information for secondary purposes without the need to obtain express individual consent, such as for research, public health, drug development, and monitoring adverse drug events. Furthermore, the notion of personal information is integral to privacy statutes in many jurisdictions. Anonymization methods must provide robust assurances about privacy as well ensure that the perturbed data is still useful for secondary analysis.
  Risk-based anonymization methods have been in use for more than a decade to facilitate the sharing of health information. These methods have a number of important characteristics: they are quantitative in that they allow the expression of risk values, and they take into account the context of the data use or disclosure. The implication is that security, privacy, and contractual controls need to be applied to ensure that the risk of re-identification is acceptably low.
In this presentation I will provide an overview of how risk-based anonymization methods have been applied in practice for non-public data sharing, and the specific constraints that would need to be imposed on public data sharing (e.g., open data or open government initiatives) under this model.

Biography
  Dr. Khaled El Emam is a Professor at the University of Ottawa, Faculty
of Medicine, and a Senior Investigator at the Children's Hospital of
Eastern Ontario Research Institute. From 2005 to 2015 he held the Canada
Research Chair in Electronic Health Information at the University of
Ottawa. His main area of research is developing techniques for health
data anonymization and secure disease surveillance for public health
purposes. He is also the founder and president of Privacy Analytics
Inc., which develops solutions for the de-identification of health
information. In 2016 Privacy Analytics was acquired by IMS Health Inc
(now QuintilesIMS).
Previously Khaled was a Senior Research Officer at the National Research
Council of Canada, and prior to that he was head of the Quantitative
Methods Group at the Fraunhofer Institute in Kaiserslautern, Germany. In
2003 and 2004, he was ranked as the top systems and software engineering
scholar worldwide by the Journal of Systems and Software based on his
research on measurement and quality evaluation and improvement, and
ranked second in 2002 and 2005. He holds a Ph.D. from the Department of
Electrical and Electronics, King's College, at the University of London
(UK).

  Dr. Kazue Sako (NEC, Japan)
  Title: TBA

Biography
  Dr. Kazue Sako received her B.S. degree and PhD from Kyoto University. Her
research interest is in cryptographic protocols that enhance privacy
and fairness, e.g. electronic voting protcols, group signature
schemes, digital lottery systems and blockchain architecture. In order
to promote the use of anonymous authentication, she edited ISO/IEC
29191 and ISO/IEC 20008-2. She served as Program co-Chair/ Chair for
ASIACRYPT 2012, 2013 and RSA conference 2016 Cryptographer's
Track. She is a strong advocate of Personal Data EcoSystem, which
empowers individuals with their own data. She is Senior Principal
Engineer at NEC. She is also a member of the Science Council of Japan.

** Special Session **

  We will have the following special talks about privacy enhancing technology competitions.

Genomic Data Privacy and Security Protection Competition
              Dr. Shuang Wang, Dr. Xiaoqian Jiang (UCSD)
Data Anonymization Competition to Study the Security and Utility of Personal Data
              Dr. Hiroaki Kikuchi (Meiji Univ.)
** Social Event **
  IWSEC 2017 plans to have a social banquet. We will announce the details on the web page.
** Call for Posters **

This year, the 12th International Workshop on Security, IWSEC 2017 decided to open call for POSTERS that focus on any relevant topic in the workshop. Posters can present on-going study, idea or project that is not mature yet, but interesting work in progress. Student projects (Bachelor, Master's or PhD) or any other relevant study are also welcome. Posters will be presented in poster-style, i.e. interactive presentation. Posters must be designed to fit within an A0 size space (118.9 cm (height) and 84.1 cm (width), or 46.8 in (height) and 33.1 in (width)), and may consist of a single printed poster or separate pieces. Poster presenters MUST BRING their own poster to the workshop venue on the poster presentation date. IWSEC2017 DOES NOT provide any printing support for the poster. Poster boards and pushpins will be provided by the workshop.

  Submission deadline: July 31st, 2017, 23:59 JST
  Notification of Acceptance: To be sent in 2 weeks from the each submission
  Registration of the accepted poster presenter: August 20th
  Submission deadline of final poster for web publication: August 24th, 2017.
  (only for those who wish to upload the poster at the workshop webpage)

In order to present a poster, authors must email the following information iwsec2017_poster at klab.is.sci.toho-u.ac.jp by July 31st, 2017, 23:59 UTC:

  Title
  Author(s)
  One or two paragraph abstract
  Name of person presenting the poster
  Whether wishing to publish the poster at the IWSEC2017 poster page

After having notification of acceptance e-mail, at least one author is required to register with the workshop by August 20th and present the poster.
** Committees **
General co-chairs:
  Kazuto Ogawa (Japan Broadcasting Corporation, Japan)
  Masayuki Terada (NTT DOCOMO, Japan)
Program co-chairs:
  Satoshi Obana (HOSEI University, Japan)
  Koji Chida (NTT, Japan)
Poster chair:
  Takumi Yamamoto (Mitsubishi Electric Corporation, Japan)
Local organizing committee:
  Hiroaki Anada (University of Nagasaki, Japan)
  Atsushi Fujioka (Kanagawa University, Japan)
  Takuya Hayashi (National Institute of Information and Communications Technology, Japan)
  Takato Hirano (Mitsubishi Electric Corporation, Japan)
  Hiroyuki Inoue (Hiroshima City University, Japan)
  Akira Kanaoka (Toho University, Japan)
  Yutaka Kawai (Mitsubishi Electric Corporation, Japan)
  Ken Naganuma (Hitachi, Ltd., Japan)
  Tetsushi Ohki (National Institute of Advanced Industrial Science and Technology, Japan)
  Go Ohtake (Japan Broadcasting Corporation, Japan)
  Masakazu Soushi (Hiroshima City University, Japan)
  Yuji Suga (Internet Initiative Japan Inc., Japan)
  Yu Tsuda (National Institute of Information and Communications Technology, Japan)
  Sven Wohlgemuth (Hitachi, Ltd., Japan)
  Takumi Yamamoto (Mitsubishi Electric Corporation, Japan)
  Kan Yasuda (NTT, Japan)
Program Committee:
  Mohamed Abid (University of Gabes, Tunisia)
  Mitsuaki Akiyama (NTT, Japan)
  Elena Andreeva (KU Leuven, Belgium)
  Reza Azarderakhsh (Florida Atlantic University, USA)
  Josep Balasch (KU Leuven, Belgium)
  Gregory Blanc (Telecom SudParis, France)
  Olivier Blazy (Universite de Limoges, France)
  Aymen Boudguiga (Institute for Technological Research SystemX, France)
  Kai-Chi Chang (National Center for Cyber Security Technology, Taiwan)
  Yue Chen (Florida State University, USA)
  Celine Chevalier (Universite Pantheon-Assas, France)
  Koji Chida (NTT, Japan) ** chair **
  Sabrina De Capitani di Vimercati (DI - Universita degli Studi di Milano, Italy)
  Herve Debar (Telecom SudParis, France)
  Itai Dinur (Ben-Gurion University, Israel)
  Josep Domingo-Ferrer (Universitat Rovira i Virgili, Spain)
  Oriol Farras (Universitat Rovira i Virgili, Spain)
  Atsushi Fujioka (Kanagawa University, Japan)
  Dawu Gu (Shanghai Jiao Tong University, China)
  Roberto Guanciale (KTH Royal Institute of Technology, Sweden)
  Atsuo Inomata (Tokyo Denki University, Japan)
  Akira Kanaoka (Toho University, Japan)
  Florian Hahn (SAP, Germany)
  Hiroaki Kikuchi (Meiji University, Japan)
  Hyung Chan Kim (The Affiliated Institute of ETRI, Korea)
  Yuichi Komano (Toshiba Corporation, Japan)
  Noboru Kunihiro (The University of Tokyo, Japan)
  Maryline Laurent (Telecom SudParis, France)
  Heejo Lee (Korea University, South Korea)
  Hyung Tae Lee (Nanyang Technological University, Singapore)
  Zhou Li (RSA Labs., USA)
  Frederic Majorczyk (DGA-MI/CentraleSupelec, France)
  Florian Mendel (Graz University of Technology, Austria)
  Bart Mennink (Radboud University, The Netherlands)
  Kirill Morozov (Tokyo Institute of Technology, Japan)
  Koichi Mouri (Ritsumeikan University, Japan)
  Ivica Nikolic (Nanyang Technological University, Singapore)
  Ryo Nojima (National Institute of Information and Communications Technology, Japan)
  Satoshi Obana (HOSEI University, Japan) ** chair **
  Alexis Olivereau (CEA LIST, France)
  Kaan Onarlioglu (Northeastern University, USA)
  Thomas Peyrin (Nanyang Technological University, Singapore)
  Yusuke Sakai (National Institute of Advanced Industrial Science and Technology, Japan)
  Yu Sasaki (NTT, Japan)
  Dominique Schroder (Friedrich-Alexander Universität Erlangen-Nürnberg, Germany)
  Yannick Seurin (Agence Nationale de la Securite des Systemes d'Information, France)
  Yuji Suga (Internet Initiative Japan Inc., Japan)
  Willy Susilo (University of Wollongong, Australia)
  Mio Suzuki (National Institute of Information and Communications Technology, Japan)
  Katsuyuki Takashima (Mitsubishi Electric Corporation, Japan)
  Mehdi Tibouchi (NTT, Japan)
  Giorgos Vasiliadis (Qatar Computing Research Institute, HBKU, Greece)
  Cong Wang (City University of Hong Kong, Hong Kong)
  Sven Wohlgemuth (Hitachi, Ltd., Japan)
  Pa Pa Yin Minn (Yokohama National University, Japan)
  Chung-Huang Yang (National Kaohsiung Normal University, Taiwan)
  Kan Yasuda (NTT, Japan)
  Maki Yoshida (National Institute of Information and Communications Technology, Japan)
  Rui Zhang (Chinese Academy of Sciences, China)



(Last Update: July 10, 2017)
########################################################


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.links.org/pipermail/pet/attachments/20170710/2bbc5669/attachment.html>


More information about the PET mailing list