Call for Participation 6th Workshop on Privacy Enhancing Technologies (PET 2006) Robinson College, Cambridge, United Kingdom June 28 - June 30, 2006 http://petworkshop.org/2006/ Special Events: * Keynote speaker: Susan Landau, Sun Microsystems Laboratories on "The Missing Link", (Abstract at the end of the email.) * PET Award 2006 ceremony and reception at Microsoft Research, http://petworkshop.org/2006/award.html Co-located with: * The Fifth Workshop on the Economics of Information Security (WEIS 2006), 26-28 June, http://weis2006.econinfosec.org/ * IAVoSS Workshop On Trustworthy Elections (WOTE 2006) 29-30 June, http://www.win.tue.nl/~berry/wote2006/ Privacy and anonymity are increasingly important in the online world. Corporations, governments, and other organizations are realizing and exploiting their power to track users and their behavior, and restricting the ability to publish or retrieve documents. Approaches to not only protecting individuals and groups, but also companies and governments, from such profiling and censorship include decentralization, encryption, distributed trust, and automated policy disclosure. This 6th workshop addresses the design and realization of such privacy and anti-censorship services for the Internet and other communication networks by bringing together anonymity and privacy experts from around the world to discuss recent advances and new perspectives. Early registration by May 12 at: http://petworkshop.org/2006/petRegister.html Further local information on accommodation and travel is available on the PET workshop website (book accommodation early!): http://petworkshop.org/2006/petTravel.html Program Chairs: * Philippe Golle, PARC (Philippe.Golle at parc com) * George Danezis, K.U.Leuven (George.Danezis at esat kuleuven be) General Chair: * Richard Clayton, University of Cambridge (Richard.Clayton at cl cam ac uk) Research Program: (also at http://petworkshop.org/2006/program.html) Privacy and the real world * One Big File Is Not Enough: A Critical Evaluation of the Dominant Free-Space Sanitization Technique Simson Garfinkel and David Malan * Protecting Privacy with the MPEG-21 IPMP Framework Nicholas Paul Sheppard and Reihaneh Safavi-Naini * Privacy for Public Transportation Thomas S. Heydt-Benjamin, Hee-Jin Chae, Benessa Defend, and Kevin Fu * Privacy Rights Management - Taming Cellphone Cameras Mina Deng, Lothar Fritsch and Klaus Kursawe * Ignoring the Great Firewall of China Richard Clayton, Steven J. Murdoch and Robert N. M. Watson * I Know What You Did Last Summer: Self-Awareness, Imagined Communities,and Information Sharing in an Online Social Network Alessandro Acquisti and Ralph Gross Privacy policies * Enhancing Consumer Privacy in the Liberty Alliance Identity Federation and Web Services Frameworks Mansour Alsaleh and Carlisle Adams * Traceable and Automatic Compliance of Privacy Policies in Federated Digital Identity Management Anna C. Squicciarini, Abhilasha Bhargav-Spantzel, Alexei Czeskis and Elisa Bertino * Privacy Injector - Automated Privacy Enforcement through Aspects Chris Vanden Berghe and Matthias Schunter * A Systemic Approach to Automate Privacy Policy Enforcement in Enterprises Marco Casassa Mont and Robert Thyne Anonymous communications * Improving Sender Anonymity in a Structured Overlay with Imprecise Routing Giuseppe Ciaccio * Selectively Traceable Anonymity Luis von Ahn, Andrew Bortz, Nicholas Hopper and Kevin O'Neill * Valet Services: Improving Hidden Servers with a Personal Touch Lasse Xverlier and Paul Syverson * Blending different latency traffic with alpha-mixing Roger Dingledine, Andrei Serjantov and Paul Syverson Attacks: Traffic and Location analysis * Breaking the Collusion Detection Mechanism of MorphMix Parisa Tabriz and Nikita Borisov * Linking Anonymous Transactions: The Consistent View Attack Andreas Pashalidis and Bernd Meyer * Preserving User Location Privacy in Mobile Data Management Infrastructures Reynold Cheng, Yu Zhang, Elisa Bertino and Sunil Prabhakar * Location Access Effects on Trail Re-identification Bradley Malin and Edoardo Airoldi Private muti-party computation, authentication, and cryptography * Private Resource Pairing Joseph A. Calandrino and Alfred C. Weaver * On the Security of the Tor Authentication Protocol Ian Goldberg * Honest-Verifier Private Disjointness Testing without Random Oracles Susan Hohenberger and Stephen A. Weis * A Flexible Framework for Secret Handshakes Gene Tsudik and Shouhuai Xu * Optimal Key-Trees for Tree-Based Private Authentication Levente Buttyan, Tamas Holczer and Istvan Vajda * Simple and Flexible Private Revocation Checking John Solis and Gene Tsudik Keynote speaker: The Missing Link Susan Landau In recent decades, we have seen significant progress in the development of tools to protect privacy. We have similarly seen various policy developments, e.g., the 1980 OECD Guidelines on Privacy Protection and 1997 application to the Internet. But Between the conception And the creation Between the emotion And the response Falls the Shadow. (T.S. Eliot, "The Hollow Men.") One shadow is that while privacy policies abound, when data is collected, there are few or no rules governing its security (which is a crucial requirement for data privacy). A current instance of this concerns the recent requirement for data retention by the European Union. This talk discusses what is needed to get to: Between the conception And the creation Between the emotion And the response Falls the Action. Disclaimer: http://www.kuleuven.be/cwis/email_disclaimer.htm ----- End forwarded message ----- -- Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc]