BSF/DIMACS/DyDAn Workshop on Data Privacy

February 4 - 7, 2008
DIMACS/DyDAn Center, CoRE Building, Rutgers University

Organizers:
Kobbi Nissim, Ben Gurion University, kobbi at cs.bgu.ac.il
Benny Pinkas, University of Haifa, benny at cs.haifa.ac.il
Rebecca Wright, Rutgers University, rebecca.wright at rutgers.edu
Presented under the auspices of the DIMACS Special Focus on Communication Security and Information Privacy and the Center for Dynamic Data Analysis (DyDAn).

This workshop is jointly sponsored by:


Workshop Program:

Monday, February 4, 2008

 8:00 -  8:50  Breakfast and Registration

 8:50 -  9:00  Welcome and Opening remarks
               Rebecca Wright, DIMACS Deputy Director
               Sharon Regev, Consulate General of Israel
               Kobbi Nissim and Benny Pinkas, Workshop Organizers

 9:00 - 10:00  Tutorial: Differential Privacy
               Adam Smith, Penn State University

10:00 - 10:30  PINQ 
               Frank McSherry, Microsoft

10:30 - 11:00  Break

11:00 - 12:00  Tutorial: Smooth Sensitivity and Sampling
               Sofya Raskhodnikova, Penn State University

12:00 - 12:30  Tutorial: Exponential Mechanism
               Kunal Talwar, Microsoft

12:30 -  2:00  Lunch

 2:00 -  3:00  Tutorial: Statistical Disclosure Limitation Methods
               Alexandra Slavkovic, Penn State University

 3:00 -  3:30  Break

 3:30 -  4:30  Tutorial: Synthetic Data
               John Abowd, Cornell University

Tuesday, February 5, 2008

 8:30 -  9:00  Breakfast and Registration

 9:00 - 10:30  Tutorial: Secure Multiparty Computation and 
               Privacy-Preserving Data Mining 
               Yehuda Lindell, Bar Ilan University

10:30 - 11:00  Break

11:00 - 11:35  On the Difficulties of Achieving Disclosure Prevention
               Moni Naor, Weizmann Institute of Science

11:35 - 12:05  E Gov, Online Citizen Scrutiny and Participation -
               The Joint Challenges for Cryptologists and Policy Makers 
               Tal Zarsky, University of Haifa

12:05 - 12:30  Cyber Sovereignty
               David Chaum

12:30 -  2:00  Lunch

 2:00 -  2:25  Privacy: Theory Meets Practice on the Map
               John Abowd, Cornell University

 2:25 -  2:50  A Hybrid Perturbation/Swapping Approach for Masking Numerical Data
               Rathindra Sarathy, Oklahoma State University 

 2:50 -  3:20  Break

 3:20 -  3:45  Deterministic History-Independent Strategies for Storing 
               Information on Write-Once Memories
               Gil Segev, Weizmann Institute of Science

 3:45 -  4:10  Cell Suppressions Leak Information
               Shubha Nabar, Stanford University 

 4:10 -  4:35  A Learning Theory Perspective on Data Privacy: 
               New Hope for Releasing Useful Databases Privately
               Avrim Blum, Katrina Ligett, Aaron Roth, Carnegie Mellon University

 4:50 -  5:50  Distinguished Lecture: Dilemmas of Privacy
               Problems of Marketers, Governments and Social Advocates
               Joseph Turow, University of Pennsylvania
               
 5:50          Dinner

Wednesday, February 6, 2008

 8:30 -  9:00  Breakfast and Registration

 9:00 -  9:30  What Can We Learn Privately?
               Shiva Kasiviswanathan

 9:30 - 10:00  Mechanism Design
               Frank McSherry / Kunal Talwar

10:00 - 10:30  Everlasting Privacy in Voting Protocols
               Tal Moran, The Weizmann Institute of Science

10:30 - 11:00  Break

11:00 - 11:30  Efficient Protocols for Set Intersection and Pattern Matching 
               with Security Against Malicious and Covert Adversaries
               Carmit Hazay, Bar-Ilan University

11:30 - 12:00  How to Collect a Function Securely?
               Aggelos Kiayias, University of Connecticut

12:00 - 12:30  On the Cultural Inflections of Surveillance Discourse
               Rivka Ribak, University of Haifa

12:30 -  2:00  Lunch

 2:00 -  2:25  Efficient Signature Schemes Supporting Sedaction, 
               Pseudonymization, and Data Deidentification
               Daphne Yao, Rutgers University

 2:25 -  2:50  Robust De-anonymization of Multi-dimensional Databases 
               Vitaly Shmatikov, The University of Texas at Austin 

 2:50 -  3:20  Break

 3:20 -  3:45  Constructions of Truly Practical Secure
               Protocols using Standard Smartcards
               Yehuda Lindell, Bar Ilan University

 3:45 -  4:10  Distributed Private Data Analysis: Simultaneously Solving How and What
               Eran Omri, Ben Gurion University

 4:10 -  4:35  Delegatable Anonymous Credentials
               Melissa Chase

Thursday, February 7, 2008
 
 8:30 -  9:00  Breakfast and Registration

 9:00 -  9:25  Protecting the Confidentiality of Tables by Adding Noise to 
               the Underlying Microdata
               Paul B. Massell, Statistical Research Division, U.S. Census Bureau

 9:25 -  9:50  How Should We Solve Search Problems Privately?
               Amos Beimel, Ben-Gurion University

 9:50 - 10:15  Deniable Authentication
               Yevgeniy Dodis, NYU and Harvard University 

10:15 - 10:30  Alex Selkirk, The Common Datatrust Foundation

10:30 - 10:45  Break

10:45 - 11:30  Helen Nissenbaum

11:30 - 12:30  PANEL
               Moderated by Stephen Fienberg

12:30 -  2:00  Lunch

 2:00 -  2:25  Privacy Utility Tradeoff in Data Publishing
               Vibhor Rastogi, University of Washington

 2:25 -  2:50  On Lower Bounds for Noise in Private Analysis of Statistical Databases
               Sergey Yekhanin, Institute for Advanced Study

 2:50 -  3:20  Break

 3:20 -  3:45  k-Anonymous Data Mining
               Arik Friedman, Technion, Israel

 3:45 -  4:10  Efficient Algorithms for Masking and Finding Quasi-identifiers
               Ying Xu, Stanford University 

 4:10 -  4:35  Privacy-Preserving Sharing of Network Data with Anonymization Tools: - 
               Characterizing Privacy/Utility Tradeoffs and Multi-Level Protection
               William Yurcik, University of Texas at Dallas


Previous: Participation
Next: Registration
Workshop Index
DIMACS Homepage
Contacting the Center
Document last modified on February 5, 2008.