Wednesday, September 6, 2017

[DMANET] Call for Participation: DPM 2017 -- 12th International Workshop on Data Privacy Management, held in conjunction with ESORICS 2017, Oslo, Norway, September 14-15, 2017

(apologies for cross-posting)

12th International Workshop on Data Privacy Management,

co-located with ESORICS 2017, Oslo, Norway, September 14-15, 2017.


Organizations are increasingly concerned about the privacy of
information that they manage (several people have filed lawsuits
against organizations violating the privacy of customer's data). Thus,
the management of privacy-sensitive information is very critical and
important for every organization. This poses several challenging
problems, such as how to translate the high-level business goals into
system-level privacy policies, administration of privacy-sensitive
data, privacy data integration and engineering, privacy access control
mechanisms, information-oriented security, and query execution on
privacy-sensitive data for partial answers.


Thursday September 14

09:15-09:15 General Welcome

09:15-10:30 Keynote: Privacy models and disclosure risk: integral privacy
by Vicenc Torra (University of Skovde, Sweden)

11:00-12:30 Session 1: Privacy, logics, and computational models

- A Proof Calculus for Attack Trees in Isabelle
By Florian Kammueller (Middlesex University London and TU Berlin)

- Confidentiality of Interactions in Concurrent Object-Oriented Systems
By Olaf Owe (University of Oslo), Toktam Ramezanifarkhani
(University of Oslo)

- Using Oblivious RAM in Genomic Studies.
By Nikolaos Karvelas (TU Darmstadt), Andreas Peter (University of
Stefan Katzenbeisser (TU Darmstadt)

14:00-15:30 Session 2: Privacy and encrypted search

- Towards Efficient and Secure Encrypted Databases: Extending
Message-Locked Encryption in Three-Party Model.
By Yuuji Furuta (Osaka University), Naoto Yanai (Osaka University),
Masashi Karasaki (Nippon Telegraph and Telephone West Corporation),
Katsuhiko Eguchi (Nippon Telegraph and Telephone West Corporation),
Yasunori Ishihara (Osaka University), Toru Fujiwara (Osaka

- Searchable Encrypted Relational Databases: Risks and Countermeasures
By Mohamed Ahmed Abdelraheem (SICS), Tobias Andersson (SICS), Christian
Gehrmann (Lund University)

- Private verification of access on medical data: an initial study
By Thais Bardini Idalino (University of Ottawa), Dayana Spagnuelo
(University of Luxembourg),
Jean Everson Martina (Universidade Federal de Santa Catarina)

16:00-17:30 Session 3: Data Privacy, data mining, and applications

- Default Privacy Setting Prediction by Grouping User's Attributes
and Settings Preferences
By Toru Nakamura (KDDI Research, Inc.), Welderufael Berhane Tesfay
(Goethe University Frankfurt),
Shinsaku Kiyomoto (KDDI Research, Inc.), Jetzabel Serna (Goethe
University Frankfurt)

- Bounding Privacy Leaks in Privacy Preserving Data Mining.
By Zhizhou Li (The Voleon Group), Ten H. Lai (The Ohio State

- Threshold Single Password Authentication
By Devris Isler (Koc University), Alptekin Kupcu (Koc University)

- Towards A Toolkit for Utility and Privacy-Preserving Transformation of
Semi-structured Data Using Data Pseudonymization
By Saffija Kasem-Madani (University of Bonn), Michael Meier
(University of Bonn),
Martin Wehner (University of Bonn)

18:30-20:00 Aperitif in Gamle Museet

Friday September 15

09:00-10:30 Session 4: User privacy

- Privacy Dashcam - Towards Lawful Use of Dashcams Through Enforcement
of External Anonymization
By Paul Wagner (Karlsruhe Institute of Technology), Pascal
Birnstill (Fraunhofer IOSB), Erik Krempel (Fraunhofer IOSB),
Sebastian Bretthauer (Karlsruhe Institute of Technology),
Jurgen Beyerer (Fraunhofer IOSB).

- DLoc: Distributed Auditing for Data Location Compliance in Cloud
By Mojtaba Eskandari (University of Trento), Bruno Crispo
(University of Trento),
Anderson Santana De Oliveira (SAP).

- Inonymous: Anonymous Invitation-Based System
By Sanaz Taheri Boshrooyeh (Koc University), Alptekin Kupcu (Koc

11:00-12:40 Session 5: Applied Cryptography and Privacy

- PCS, a privacy-preserving certification scheme
By Nesrine Kaaniche (Telecom SudParis), Maryline Laurent (Telecom
Pierre-Olivier Rocher (Telecom SudParis), Christophe Kiennert
(Telecom SudParis),
Joaquin Garcia-Alfaro (Telecom SudParis)

- Order-Preserving Encryption Using Approximate Integer Common Divisors
By James Dyer (University of Manchester), Martin Dyer (University
of Leeds),
Jie Xu (University of Leeds).

- Privacy-Preserving Deterministic Automata Evaluation with Encrypted
Data Blocks
By Giovanni Di Crescenzo (Vencore Labs), Brian Coan (Vencore Labs),
Jonathan Kirsch (Vencore Labs)

12:40-14:00 Lunch & Farewell


Registration information is available at:


The workshop will be held in Oslo, Norway, in conjunction with
the 22nd annual European research event in Computer Security
(ESORICS 2017) symposium.

More information about travel and registration is available on
the ESORICS 2017 website at

Accommodation and venue information is also available from the
ESORICS 2017 website at:



Additional information is available at:
* Contributions to be spread via DMANET are submitted to
* Replies to a message carried on DMANET should NOT be
* addressed to DMANET but to the original sender. The
* original sender, however, is invited to prepare an
* update of the replies received and to communicate it
* via DMANET.