PROGRAMME

Download programme

Wednesday 24 September

8:30 - Registration
9:30 - Opening Session.

Tabular Data Protection I (Chair: Anco Hundepool)

10:00 - Using a Mathematical Programming Modeling Language for Optimal CTA. Jordi Castro and Daniel Baena
10:20 - Questions
10:25 - A Data Quality and Data Confidentiality Assessment of Complementary Cell Suppression. Lawrence H. Cox
10:45 - Questions

10.50 - Coffee Break

Tabular Data Protection II (Chair: Lawrence Cox)

11:10 - Pre-Processing Optimisation Applied to the Classical Integer Programming Model for Statistical Disclosure Control. Martin Serpell, Alistair Clark, Jim Smith and Andrea Staggemeier
11:30 - Questions
11:35 - How to Make the τ-Argus Modular Method Applicable to Linked Tables? Peter-Paul de Wolf and Sarah Giessing
11:55 - Questions
12:00 - Bayesian Assessment of Rounding-based Disclosure Control. Jon J. Forster and Roger C. Gill
12:20 - Questions

12:25 - Lunch

Tabular Data Protection III (Chair: Sarah Giessing)

14:30 - Cell Bounds in Two-Way Contingency Tables Based on Conditional Frequencies. Byran Smucker and Aleksandra B. Slavkovic
14:50 - Questions
14:55 - Invariant Post-Tabular Protection of Census Frequency. Natalie Shlomo and Caroline Young
15:15 - Questions
15:20 - Synthetic tabular data preserving the observed conditional frequencies. Juyoun Lee and Aleksandra Slavkovic
15:30 - Questions
15:35 - How to Prevent Cell Perturbation Procedures from Becoming Data Falsification Procedures (Incorporating Quality Measures in Tabular Data Protected by Cell Perturbation Methods). A Practical Solution. Ramesh A Dandekar
15:45 - Questions

15:50 - Coffee break

On-Line Databases and Remote Access (Chair: Jordi Castro)

16:10 - Auditing Categorical SUM, MAX and MIN. Francesco M. Malvestuto
16:30 - Questions
16:35 - Reasoning Under Uncertainty in On-Line Auditing. Gerardo Canfora and Bice Cavallo
16:55 - Questions
17:00 - A Remote Analysis Server – What Does Regression Output Look Like? Christine M. O’Keefe and Norm M. Good
17:20 - Questions


Thursday 25 September

 Privacy-Preserving Data Mining and Private Information Retrieval (Chair: Yücel Saygin)

09:00 - Accuracy in Privacy-Preserving Data Mining Using the Paradigm of Cryptographic Elections. Emmanouil Magkos, Manolis Maragoudakis, Vassilis Chrissikopoulos and Stefanos Gridzalis
09:20 - Questions
09:25 - A Privacy-Preserving Framework for Integrating Person-Specific Databases. Murat Kantarcioglu, Wei Jiang and Bradley Malin
09:45 - Questions
09:50 - Peer-to-Peer Private Information Retrieval. Josep Domingo-Ferrer and Maria Bras-Amorós
10:10 - Questions
10:15 - A Protocol for Privacy Preserving Neural Network Learning on Horizontally Partitioned Data. Nico Schlitter
10:25 - Questions

Legal issues (Chair: Natalie Shlomo)

10:30 - Legal, Political and Methodological Issues in Confidentiality in the European Statistical System. Jean-Marc Museux, Martine Peeters and Maria João Santos
10:50 - Questions

10:55 - Coffee Break

Microdata Protection: Methods and Case Studies I (Chair: Luisa Franconi)

11:15 - A Practical Approach to Balancing Data Confidentiality and Research Needs: the NHIS Linked Mortality Files.  Kim Lochner
11:35 - Questions
11:40 - From t-Closeness to PRAM and Noise Addition via Information Theory. David Rebollo, Jordi Forné and Josep Domingo-Ferrer
12:00 - Questions
12:05 - Robustification of Microdata Masking Methods and the Comparison with Existing Methods. Matthias Templ and Bernhard Meindl
12:25 - Questions

12:30 - Lunch

Microdata Protection: Methods and Case Studies II (Chair: Jean-Marc Museux)

14:40 - A Preliminary Investigation of the Gaussian Versus t-Copula for Data Perturbation. Mario Trottini, Krish Muralidhar and Rathindra Sarathy
15:00 - Questions
15:05 - Anonymisation of Longitudinal Enterprise Microdata – Survey of a German Project. Maurice Brandt, Rainer Lenz and Martin Rosemann
15:25 - Questions
15:30 - Making public use, synthetic files of the Longitudinal Business Database. Satkartar K. Kinney and Jerome P. Reiter
15:40 - Questions

18:30 – Bosphorus Gala Dinner


Friday 26 September

Microdata Protection: Disclosure Risk Assessment I (Chair: Silvia Polettini)

09:00 - Extensions of the Re-Identification Risk Measures Based on Log-Linear Models. Daniela Ichim
09:20 - Questions
09:25 - Assessing Disclosure Risk for Record. Chris Skinner
09:45 -  Questions
09:50 - Robust Statistics Meets SDC: New Disclosure Risk Measures for Continuous Microdata Masking. Matthias Templ and Bernhard Meindl
10:10 - Questions
10:15 - Parallelizing Record Linkage for Disclosure Risk Assessment. Joan Guisado-Gámez, Arnau Prat-Pérez, Jordi Nin, Víctor Muntés-Mulero and Josep L. Larriba-Pey
10:35 - Questions

10:40 – Coffee break

Microdata Protection: Disclosure Risk Assessment II (Chair: Chris Skinner)

11:00 - Towards a More Realistic Disclosure Risk Assessment. Jordi Nin, Javier Herranz and Vicenç Torra
11:20 - Questions
11:25 - Use of Auxiliary Information in Risk Estimation. Loredana Di Consiglio and Silvia Polettini
11:45 - Questions
11:50 - Accounting for Intruder Uncertainty Due to Sampling When Estimating Identification Disclosure Risks in Partially Synthetic Data. Jörg Drechsler and Jerome P. Reiter
12:10 - Questions
12:15 - How Protective are Synthetic Data? John M. Abowd and Lars Vilhuber
12:35 - Questions

12:40 – Closing remarks

Important Dates

Submission deadline:
May 25, 2008
Acceptance notification:
June 27, 2008
Proceedings version due:
July 11, 2008
Conference:
Sep. 24-26, 2008.

CD-only submission deadline:
July 15, 2008
CD-only acceptance notification:
July 31, 2008
CD-only proceedings version due:
Aug. 10, 2008

Online proceedings (Springer LNCS 5262) available

Plenary pictures [1][2]