PrAISe 2016 Program

9:00 – 9:15 Welcome

9:15 – 10:15 Invited Talk by Seda Gürses
Privacy Engineering: A new field of research and practice
Abstract: The number of privacy debacles of the last years in social networks, web tracking, NSA/GCHQ surveillance, and mass scale breaches have been adding up. Contrary to claims that “privacy is dead”, the popularity of court cases with national and international implications, like Apple vs. FBI, are indicators that people around the world do care about their privacy, and the ambition to design and maintain systems that respond to relevant privacy issues can no longer be dismissed as “anti-progressivism”. However, assuming it is meant to be more than marketing, getting privacy right is challenging. The emerging field of privacy engineering responds to this challenge. It intends to address the gap between privacy research and and engineering practice by systematizing and evaluating methods, techniques and tools to capture and address privacy issues while engineering information systems. In addition, privacy engineering demands paying attention to the context in which these methods, techniques and tools can be applied, e.g., domain, type of organization, engineering expertise and practices, or software and hardware infrastructures. This talk will provide an introduction to different concepts of privacy, approaches to privacy research within computer science and an overview of the nascent field of privacy engineering.

11:00 – 12:40 Access control and Information Sharing

  • Strategies for Privacy Negotiation in Online Social Networks
  • Learning Privacy Rules Cooperatively in Online Social Networks
  • Using Genetic Algorithms for Design and Reconfiguration of RBAC Schemes
  • Representing sequences of actions in access control security policies

14:00 – 15:40 Detecting and Defending

  • Using a Deep Understanding of Network Activities for Network Vulnerability Assessment
  • Defending Cyber-Physical Attacks on Oil Pipeline Systems: A Game-Theoretic Approach
  • Detecting the Behavioral Relationships of Malware Connections
  • Detecting deceptive reviews using Argumentation

16:10 – 18:15 Information Leakage and Disclosure Control

  • Data set operations to hide decision tree rules
  • Secure Multi-Agent Planning
  • Towards a general record linkage framework for statistical disclosure control
  • A Genetic Algorithm Approach to Synthetic Data Production
  • Expressing Receipt-Freeness and Coercion-Resistance in Logics of Strategic Ability: Preliminary Attempt

18:15 – 18:30 Closing Remarks