The workshop is followed by a related working group on March 17, 2004.
Monday, March 15, 2004
8:00 - 8:50 Registration - 1st Floor Lobby, CoRE Building
Breakfast - 4th Floor, Lounge, CoRE Building
8:50 - 9:00 Welcome and Opening Remarks
Mel Janowitz, DIMACS Associate Director
9:00 - 9:30 From Idiosyncratic to Stereotypical: Toward
Privacy in Public Databases
Shuchi Chawla, CMU
9:30 - 10:00 Privacy-Preserving Datamining on Vertically Partitioned Databases
Kobbi Nissim, Microsoft Research
10:00 - 10:40 Confidentiality in Tables Viewed from an Algebraic Perspective
Lawrence H. Cox, CDC
10:40 - 11:10 Break - 4th Floor, Lounge, CoRE Building
11:10 - 11:40 Privacy Preserving Computation of the k'th Ranked Element
Gagan Aggarwal, Stanford University
11:40 - 12:10 Efficient Private Matching and Set Intersection
Mike Freedman, NYU
12:10 - 12:30 An Experimental Study of Association Rule Hiding Techniques
Emmanuel Pontikakis, University of Patras
12:30 - 2:00 Lunch - 4th Floor, Lounge, CoRE Building
2:00 - 2:15 Public-Key Encryption with Keyword Search
Giovanni DiCrescenzo, Telcordia
2:15 - 2:30 Privacy-Enhanced Searches Using Encrypted Bloom Filters
Steve Bellovin, AT & T Research
2:30 - 2:45 Secure indexes
Eu-Jin Goh, Stanford University
2:45 - 3:00 Privacy Preserving Keyword Searches on Remote Encrypted Data
Yan-Cheng Chang, Harvard University
3:00 - 3:30 Completeness in Two-Party Secure Computation - A Computational View
Moni Naor, Weizmann Institute
3:30 - 4:00 Break - 4th Floor, Lounge, CoRE Building
4:00 - 4:40 Data Mining and Information Privacy -
New Problems and the Search For Solutions
Tal Zarsky, Yale University
4:40 - 5:10 On the Difficulty of Defining Ideal Functionalities for Privacy
Preserving Data Mining: Why naive Secure Multiparty Computation Fails
Yehuda Lindell, IBM
5:20 - 7:00 Wine and Cheese Reception - DIMACS Lounge
Tuesday, March 16, 2004
8:30 - 9:00 Registration - 1st Floor Lobby, CoRE Building
Breakfast - 4th Floor, Lounge, CoRE Building
9:00 - 9:30 Extending Oblivious Transfers Efficiently
Yuval Ishai, Technion
9:30 - 10:00 Amortized PIR via Batch Codes
Eyal Kushilevitz, Technion
10:00 - 10:20 Private Inference Control
David Woodruff, MIT
10:20 - 10:40 Cryptographic Randomized Response Techniques
Markus Jakobsson, RSA Security
10:40 - 11:10 Break - 4th Floor, Lounge, CoRE Building
11:10 - 11:50 Privacy as Contextual Integrity
Helen Nissenbaum, NYU
11:50 - 12:20 Trading Entropy for Privacy, or Unconditional Security
When Information Leakage is Unavoidable
Adam Smith, MIT
11:20 - 12:40 Calypso: UCSD's Project on Privacy in Database Publishing
Alin Deutsch, UCSD
12:40 - 2:10 Lunch - 4th Floor, Lounge, CoRE Building
2:10 - 2:30 When can the randomization fail to protect privacy?
Kevin Du, Syracuse University
2:30 - 2:50 Computing sketches of matrices efficiently and
applications to privacy preserving data mining
Petros Drineas, Rensselaer Polytechnic Institute
2:50 - 3:10 Information leakage and privacy in data mining
Poorvi Vora, GWU
3:10 - 3:30 Random Encodings, Privacy Loss, and Some Possible Solutions:
A Coding Theory Perspective
Hillol Kargupta, University of Maryland
3:30 - 4:00 Break - 4th Floor, Lounge, CoRE Building
4:00 - 4:40 Secure Regression on Distributed Databases
Alan Karr, National Institute of Statistical Sciences
4:40 - 5:00 Tabular Data: Releases of Conditionals and Marginals
Aleksandra Slavkovic, Carnegie Mellon University
5:00 - 5:30 Private data mining based on randomized linear projections
Martin Strauss, AT&T Research
Previous: Participation
Next: Registration
Workshop Index