第三届ACM数据与应用安全与隐私会议论文集

E. Bertino, R. Sandhu, Lujo Bauer, Jaehong Park
{"title":"第三届ACM数据与应用安全与隐私会议论文集","authors":"E. Bertino, R. Sandhu, Lujo Bauer, Jaehong Park","doi":"10.1145/2435349","DOIUrl":null,"url":null,"abstract":"It is our great pleasure to welcome you to the third edition of the ACM Conference on Data and Application Security and Privacy (CODASPY 2013), which follows the successful first and second editions held in February 2011 and 2012. This conference series has been founded to foster novel and exciting research in this arena and to help generate new directions for further research and development. The initial concept came up in a conversation between the two co-founders when both happened to be at the same meeting. This was followed by discussions with a number of fellow cyber security researchers. Their enthusiastic encouragement persuaded us to move ahead with the always daunting task of creating a high-quality conference. \n \nData and applications that manipulate data are crucial assets in today's information age. With the increasing drive towards availability of data and services anytime and anywhere, security and privacy risks have increased. Vast amounts of privacy-sensitive data are being collected today by organizations for a variety of reasons. Unauthorized disclosure, modification, usage or denial of access to these data and corresponding services may result in high human and financial costs. New applications such as social networking and social computing provide value by aggregating input from numerous individual users and the mobile devices they carry and computing new information of benefit to society and individuals. To achieve efficiency and effectiveness in traditional domains such as healthcare there is a drive to make these records electronic and highly available. The need for organizations to share information effectively is underscored by rapid innovations in the business world that require close collaboration across traditional boundaries. Security and privacy in these and other arenas can be meaningfully achieved only in context of the application domain. Data and applications security and privacy has rapidly expanded as a research field with many important challenges to be addressed. \n \nIn response to the call for papers of CODASPY 2013 a total of 107 papers were submitted from Africa, Asia, Australia, Europe, and North America. The program committee selected 24 fulllength research papers, which is three more than last year. These papers cover a variety of topics, including privacy of social networks, novel privacy techniques and applications, and access control and security of smart appliances and mobile devices. The program committee also selected nine short papers for presentation. This year for the first time the program also includes a poster paper session presenting exciting work in progress. The program is complemented by keynote speeches by Mike Reiter and by Ronnie Killough, as well as a panel (topic not yet decided at press time).","PeriodicalId":118139,"journal":{"name":"Proceedings of the third ACM conference on Data and application security and privacy","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2013-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Proceedings of the third ACM conference on Data and application security and privacy\",\"authors\":\"E. Bertino, R. Sandhu, Lujo Bauer, Jaehong Park\",\"doi\":\"10.1145/2435349\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"It is our great pleasure to welcome you to the third edition of the ACM Conference on Data and Application Security and Privacy (CODASPY 2013), which follows the successful first and second editions held in February 2011 and 2012. This conference series has been founded to foster novel and exciting research in this arena and to help generate new directions for further research and development. The initial concept came up in a conversation between the two co-founders when both happened to be at the same meeting. This was followed by discussions with a number of fellow cyber security researchers. Their enthusiastic encouragement persuaded us to move ahead with the always daunting task of creating a high-quality conference. \\n \\nData and applications that manipulate data are crucial assets in today's information age. With the increasing drive towards availability of data and services anytime and anywhere, security and privacy risks have increased. Vast amounts of privacy-sensitive data are being collected today by organizations for a variety of reasons. Unauthorized disclosure, modification, usage or denial of access to these data and corresponding services may result in high human and financial costs. New applications such as social networking and social computing provide value by aggregating input from numerous individual users and the mobile devices they carry and computing new information of benefit to society and individuals. To achieve efficiency and effectiveness in traditional domains such as healthcare there is a drive to make these records electronic and highly available. The need for organizations to share information effectively is underscored by rapid innovations in the business world that require close collaboration across traditional boundaries. Security and privacy in these and other arenas can be meaningfully achieved only in context of the application domain. Data and applications security and privacy has rapidly expanded as a research field with many important challenges to be addressed. \\n \\nIn response to the call for papers of CODASPY 2013 a total of 107 papers were submitted from Africa, Asia, Australia, Europe, and North America. The program committee selected 24 fulllength research papers, which is three more than last year. These papers cover a variety of topics, including privacy of social networks, novel privacy techniques and applications, and access control and security of smart appliances and mobile devices. The program committee also selected nine short papers for presentation. This year for the first time the program also includes a poster paper session presenting exciting work in progress. The program is complemented by keynote speeches by Mike Reiter and by Ronnie Killough, as well as a panel (topic not yet decided at press time).\",\"PeriodicalId\":118139,\"journal\":{\"name\":\"Proceedings of the third ACM conference on Data and application security and privacy\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-02-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the third ACM conference on Data and application security and privacy\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/2435349\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the third ACM conference on Data and application security and privacy","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2435349","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

摘要

我们非常高兴地欢迎您参加第三届ACM数据和应用程序安全与隐私会议(CODASPY 2013),继2011年2月和2012年2月成功举办的第一届和第二届会议之后。这个系列会议的成立是为了在这个领域促进新颖和令人兴奋的研究,并帮助为进一步的研究和发展创造新的方向。最初的想法是在两位联合创始人的一次谈话中提出的,当时他们碰巧都在同一个会议上。随后,他与一些网络安全研究人员进行了讨论。他们的热情鼓励说服我们继续进行创建一次高质量会议这一始终艰巨的任务。在当今的信息时代,数据和操作数据的应用程序是至关重要的资产。随着人们对数据和服务随时随地可用性的要求越来越高,安全和隐私风险也在增加。如今,由于各种原因,组织正在收集大量的隐私敏感数据。未经授权的披露、修改、使用或拒绝访问这些数据和相应的服务可能会导致高昂的人力和财务成本。诸如社交网络和社交计算之类的新应用程序通过聚合来自众多个人用户及其携带的移动设备的输入并计算对社会和个人有益的新信息来提供价值。为了在医疗保健等传统领域实现效率和有效性,需要推动这些记录电子化和高可用性。商业世界的快速创新需要跨越传统边界的密切合作,这就强调了组织有效地共享信息的必要性。只有在应用程序域的上下文中,才能有意义地实现这些领域和其他领域的安全和隐私。数据和应用程序安全与隐私作为一个研究领域迅速发展,有许多重要的挑战需要解决。本次会议共收到来自非洲、亚洲、澳大利亚、欧洲和北美的107篇论文。计划委员会选出了24篇长篇研究论文,比去年增加了3篇。这些论文涵盖了各种主题,包括社交网络的隐私,新的隐私技术和应用,以及智能家电和移动设备的访问控制和安全。项目委员会还选出了9篇短文作报告。今年,该项目还首次包括一个海报会议,介绍正在进行的令人兴奋的工作。该项目由Mike Reiter和Ronnie Killough的主题演讲以及一个小组(截止发稿时主题尚未确定)补充。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Proceedings of the third ACM conference on Data and application security and privacy
It is our great pleasure to welcome you to the third edition of the ACM Conference on Data and Application Security and Privacy (CODASPY 2013), which follows the successful first and second editions held in February 2011 and 2012. This conference series has been founded to foster novel and exciting research in this arena and to help generate new directions for further research and development. The initial concept came up in a conversation between the two co-founders when both happened to be at the same meeting. This was followed by discussions with a number of fellow cyber security researchers. Their enthusiastic encouragement persuaded us to move ahead with the always daunting task of creating a high-quality conference. Data and applications that manipulate data are crucial assets in today's information age. With the increasing drive towards availability of data and services anytime and anywhere, security and privacy risks have increased. Vast amounts of privacy-sensitive data are being collected today by organizations for a variety of reasons. Unauthorized disclosure, modification, usage or denial of access to these data and corresponding services may result in high human and financial costs. New applications such as social networking and social computing provide value by aggregating input from numerous individual users and the mobile devices they carry and computing new information of benefit to society and individuals. To achieve efficiency and effectiveness in traditional domains such as healthcare there is a drive to make these records electronic and highly available. The need for organizations to share information effectively is underscored by rapid innovations in the business world that require close collaboration across traditional boundaries. Security and privacy in these and other arenas can be meaningfully achieved only in context of the application domain. Data and applications security and privacy has rapidly expanded as a research field with many important challenges to be addressed. In response to the call for papers of CODASPY 2013 a total of 107 papers were submitted from Africa, Asia, Australia, Europe, and North America. The program committee selected 24 fulllength research papers, which is three more than last year. These papers cover a variety of topics, including privacy of social networks, novel privacy techniques and applications, and access control and security of smart appliances and mobile devices. The program committee also selected nine short papers for presentation. This year for the first time the program also includes a poster paper session presenting exciting work in progress. The program is complemented by keynote speeches by Mike Reiter and by Ronnie Killough, as well as a panel (topic not yet decided at press time).
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信