[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]
Subject: Second International Workshop on Privacy Engineering (IWPE'16)
Dear PMRM TC members I believe that this conference, which will be co-located with 37th IEEE Symposium on Security and Privacy (http://www.ieee-security.org/TC/SP2016) may be of your interest, especially
for those who are located in the USA… On behalf of IWPE'16 Committee, we are pleased to invite you to submit a paper to the International Workshop on Privacy Engineering which will take place in The Fairmont, San Jose, CA (USA), on 26th May 2016. Details on the topics, organization
and submission guidelines can be found at http://www.ieee-security.org/TC/SPW2016/IWPE. The abstract submission deadline has been set on 18th January 2016, and the paper submission
deadline on 8th February 2016 (firm deadlines). -------------------------------------------------------------------------------------------- Privacy engineering research has never been a more timely endeavor. Ongoing news reports regarding global surveillance programs, massive personal data breaches in corporate databases, and notorious examples of personal tragedies due to privacy violations have intensified societal demands for privacy-friendly
systems. In response, current legislative and standardization processes worldwide are seeking to strengthen individuals’ privacy by introducing legal and organizational frameworks that personal data collectors and processors must follow. As a result, engineers
are increasingly expected to build and maintain systems that preserve privacy and comply with data protection standards in different ICT domains (such as health, energy, transportation, social computing, law enforcement, and public services) and on different
infrastructures and architectures (such as cloud, grid, or mobile computing). Although there is a consensus on the benefits of an engineering approach to privacy, few concrete proposals exist for models, methodologies, techniques and tools to support engineers and organizations in this endeavor. Work that focuses
on helping organizations and software developers to identify and adopt appropriate privacy engineering methods, techniques and tools in their daily practices is also missing. Furthermore, it is difficult to systematically evaluate whether the systems developed using privacy engineering methodologies comply with legal frameworks, provide necessary technical assurances, and fulfill users’ privacy requirements. Clearly, more research is needed in developing methods that can help translate legal and normative concepts, as well as user expectations, into systems requirements. There is also a growing need for techniques and tools to support organizations
and engineers in developing and maintaining (socio-)technical systems that meet these requirements. In an effort to close the gaps in research, the topics of IWPE'16 include all aspects of privacy engineering, ranging from its theoretical foundations, engineering
approaches and support infrastructures to its practical application in projects of different scales. IWPE’16 welcomes papers that focus on novel solutions based on recent developments in privacy engineering. Topics of interest include, but are not limited to: - -Integrating law and policy compliance into the development process - -Privacy impact assessment during software development - -Privacy risk management models - -Privacy breach recovery methods - -Technical standards, heuristics and best practices for privacy engineering - -Privacy engineering in technical standards - -Privacy requirements elicitation and analysis methods - -User privacy and data protection requirements - -Management of privacy requirements with other system requirements - -Privacy requirements implementation - -Privacy engineering strategies and design patterns - -Privacy-preserving architectures - -Privacy engineering and databases - -Privacy engineering in the context of interaction design and usability - -Privacy testing and evaluation methods - -Validation and verification of privacy requirements - -Engineering of Privacy Enhancing Technologies (PETs) - -Integration of PETs into systems - -Models and approaches for the verification of privacy properties - -Tools and formal languages supporting privacy engineering - -Teaching and training privacy engineering - -Adaptations of privacy engineering into specific software development processes - -Pilots and real-world applications - -Evaluation of privacy engineering methods, technologies and tools - -Privacy engineering and accountability - -Organizational, legal, political and economic aspects of privacy engineering General inquiries about the workshop can be sent to iwpe16 dot easychair dot org. Nicolás Notario McDonnell Research Engineer Identity & Privacy Laboratory Atos
Research & Innovation T +34 91 456 98 95
As its integrity cannot be secured on the Internet, the Atos group liability cannot be triggered for the message content. Although the sender endeavors to maintain a computer virus-free network, the sender does not warrant that this transmission is virus-free and will not be liable for any damages resulting from any virus transmitted. Este mensaje y los ficheros adjuntos pueden contener información confidencial destinada solamente a la(s) persona(s) mencionadas anteriormente y pueden estar protegidos por secreto profesional. Si usted recibe este correo electrónico por error, gracias por informar inmediatamente al remitente y destruir el mensaje. Al no estar asegurada la integridad de este mensaje sobre la red, Atos no se hace responsable por su contenido. Su contenido no constituye ningún compromiso para el grupo Atos, salvo ratificación escrita por ambas partes. Aunque se esfuerza al máximo por mantener su red libre de virus, el emisor no puede garantizar nada al respecto y no será responsable de cualesquiera daños que puedan resultar de una transmisión de virus. |
[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]