The workshop is followed by a related working group on March 17, 2004.
Monday, March 15, 2004 8:00 - 8:50 Registration - 1st Floor Lobby, CoRE Building Breakfast - 4th Floor, Lounge, CoRE Building 8:50 - 9:00 Welcome and Opening Remarks Mel Janowitz, DIMACS Associate Director 9:00 - 9:30 From Idiosyncratic to Stereotypical: Toward Privacy in Public Databases Shuchi Chawla, CMU 9:30 - 10:00 Privacy-Preserving Datamining on Vertically Partitioned Databases Kobbi Nissim, Microsoft Research 10:00 - 10:40 Confidentiality in Tables Viewed from an Algebraic Perspective Lawrence H. Cox, CDC 10:40 - 11:10 Break - 4th Floor, Lounge, CoRE Building 11:10 - 11:40 Privacy Preserving Computation of the k'th Ranked Element Gagan Aggarwal, Stanford University 11:40 - 12:10 Efficient Private Matching and Set Intersection Mike Freedman, NYU 12:10 - 12:30 An Experimental Study of Association Rule Hiding Techniques Emmanuel Pontikakis, University of Patras 12:30 - 2:00 Lunch - 4th Floor, Lounge, CoRE Building 2:00 - 2:15 Public-Key Encryption with Keyword Search Giovanni DiCrescenzo, Telcordia 2:15 - 2:30 Privacy-Enhanced Searches Using Encrypted Bloom Filters Steve Bellovin, AT & T Research 2:30 - 2:45 Secure indexes Eu-Jin Goh, Stanford University 2:45 - 3:00 Privacy Preserving Keyword Searches on Remote Encrypted Data Yan-Cheng Chang, Harvard University 3:00 - 3:30 Completeness in Two-Party Secure Computation - A Computational View Moni Naor, Weizmann Institute 3:30 - 4:00 Break - 4th Floor, Lounge, CoRE Building 4:00 - 4:40 Data Mining and Information Privacy - New Problems and the Search For Solutions Tal Zarsky, Yale University 4:40 - 5:10 On the Difficulty of Defining Ideal Functionalities for Privacy Preserving Data Mining: Why naive Secure Multiparty Computation Fails Yehuda Lindell, IBM 5:20 - 7:00 Wine and Cheese Reception - DIMACS Lounge Tuesday, March 16, 2004 8:30 - 9:00 Registration - 1st Floor Lobby, CoRE Building Breakfast - 4th Floor, Lounge, CoRE Building 9:00 - 9:30 Extending Oblivious Transfers Efficiently Yuval Ishai, Technion 9:30 - 10:00 Amortized PIR via Batch Codes Eyal Kushilevitz, Technion 10:00 - 10:20 Private Inference Control David Woodruff, MIT 10:20 - 10:40 Cryptographic Randomized Response Techniques Markus Jakobsson, RSA Security 10:40 - 11:10 Break - 4th Floor, Lounge, CoRE Building 11:10 - 11:50 Privacy as Contextual Integrity Helen Nissenbaum, NYU 11:50 - 12:20 Trading Entropy for Privacy, or Unconditional Security When Information Leakage is Unavoidable Adam Smith, MIT 11:20 - 12:40 Calypso: UCSD's Project on Privacy in Database Publishing Alin Deutsch, UCSD 12:40 - 2:10 Lunch - 4th Floor, Lounge, CoRE Building 2:10 - 2:30 When can the randomization fail to protect privacy? Kevin Du, Syracuse University 2:30 - 2:50 Computing sketches of matrices efficiently and applications to privacy preserving data mining Petros Drineas, Rensselaer Polytechnic Institute 2:50 - 3:10 Information leakage and privacy in data mining Poorvi Vora, GWU 3:10 - 3:30 Random Encodings, Privacy Loss, and Some Possible Solutions: A Coding Theory Perspective Hillol Kargupta, University of Maryland 3:30 - 4:00 Break - 4th Floor, Lounge, CoRE Building 4:00 - 4:40 Secure Regression on Distributed Databases Alan Karr, National Institute of Statistical Sciences 4:40 - 5:00 Tabular Data: Releases of Conditionals and Marginals Aleksandra Slavkovic, Carnegie Mellon University 5:00 - 5:30 Private data mining based on randomized linear projections Martin Strauss, AT&T Research