lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Mon, 8 Jun 2015 16:25:10 -0400
From: Hongkai Wu <hw271@...rgetown.edu>
To: bionlp@...nlp.org, formalgrammar@...haifa.ac.il, colloq@...haifa.ac.il, 
	iscol@...haifa.ac.il, semitic@...haifa.ac.il, 
	Gregory Piatetsky <editor1@...uggets.com>,
	liberationtech-cfp@...ts.stanford.edu, NSM-L@...tserv.linguistlist.org, 
	pashto-urdu-computational-linguistics@...oogroups.com, 
	DATA-AC-UK@...cmail.ac.uk, data-protection@...cmail.ac.uk, 
	siggen-list@...web.org, dev@...p.org, fulldisclosure@...lists.org, 
	cipher-cfp@...e-security.org, craemer@...c.org, sigsemitic@...um.edu.mt,
	siam-dma-bounces@...m.org, DATA-FORUM@...cmail.ac.uk,
	DC-NKOS@...cmail.ac.uk, 
	senseval-discuss@...tserv.hum.gu.se, can-tal-nlp@...oogroups.com, 
	sentimentai@...oogroups.com, syntax@...oogroups.com, 
	textanalytics@...oogroups.com
Subject: [FD] [call for paper] SIGIR workshop: privacy-preserving
	information retrieval

Workshop on Privacy-Preserving Information Retrieval, held in conjunction
with the ACM SIGIR conference (August 13, 2015; Santiago de Chile)


Submission Deadline: June
​15
, 2015.
Acceptance Notifications: June
​20
, 2015
Camera-ready Deadline: June
​25
, 2015
Workshop: August 13, 2015
Submission types: Long papers (max. 4 pages in ACM SIG format), Position
papers (max. 2 pages in ACM SIG format)

Workshop format: Keynote speech, paper presentations, poster and group
discussions.

More information on: http://privacypreservingir.org


We look forward to your ideas and solutions to the cross-discipline
research on privacy and information retrieval.  The submissions should be
abount but not limited to the following research areas:
    - Privacy-related information retrieval models
    - Privacy in social media, micro blog, and people search
    - Evaluation for privacy-preserving IR
    - Leak of sensitive information in natural languages
    - Privacy in location-based services, recommender systems, and other IR
works on mobile app
    - Privacy preserving IR work for healthcare and other domains.

Potential topics for group discussion:
   - Protecting User Privacy in Search, Recommendation and Beyond: much
damage can be caused as users can be identified in AOL query log data and
Neflix log data, it is important to develop effective and efficient
solutions to protect users' privacy in information retrieval applications.
    - Dataset Distribution and Evaluation: How does privacy affect IR test
dataset distribution and evaluation? Forinstance, web query logs and
medical records could not be shared without privacy concerns to the public
or the researchers. How to anonymize the datasets and make sure that they
can be shared with a certain degree ofprivacy guarantee while at the same
time preserves the utility of the data?
    - Information Exposure Detection: new information retrieval and natural
language processing technologies
​​
are needed to quickly identify components and/or at tributes of a user's
online public profile that may reduce the user's privacy, and warn one's
vulnerability on the Web.
    - Novel Information Retrieval Techniques for Information
Privacy/Security Application: new information retrieval, evaluation, or
machine learning techniques need to be designed that fit the practice of
applications in information privacy and security.
    - Private Information Retrieval Techniques for Enabling Location
Privacy in Location-Based Services: data about a user's location and
historical movements can potentially be gathered by a third party who takes
away the information without the awareness of the service providers and the
users, how location-based services and recommender systems interact with
Location Obfuscation techniques and other Privacy-Enhancing Technologies.


Grace Hui Yang (Georgetown University)
Ian Soboroff (NIST)

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ