Author notification:
September
20, 2017
Camera Ready due:
September 30, 2017
Registration due:
September 30, 2017
Scope and Topics
Introduction
While more and
more data including personal
information is being hosted online
such as cloud infrastructure,
privacy leakage is becoming one of
most challenging concerns in
information collection, sharing or
analysis. In practice, different
temporal, spatial or application
cases often demand different privacy
protection solutions. Accordingly,
most of traditional approaches are
case by case or based on a specific
application circumstance. It is on
demand for a systematic and
quantized privacy characterization
towards systematic computing model
describing the relationships between
protection level, profit and loss as
well as the complexity of integrated
privacy protection models because
real-world applications with privacy
are changing across time, space and
different domains. This
international symposium focuses on
an evolving pathway - from privacy
protection to privacy computing, by
serving as an international premier forum
for engineers and scientists in
academia, industry, and government
to address the resulting profound
challenges and to present and
discuss their new ideas, research
results, applications and experience
on all aspects of privacy computing.
PriCom 2017 is the next event in a
series of highly successful
international symposiums on privacy
computing, previously held in
Beijing China for 2016 and 2015. For
more information, please navigate
the site using buttons located in
the left column.
Scope and Topics
Topics of particular interest
include, but are not limited to:
1.
Theories and
foundations for privacy computing
2. Languages and compilers for
privacy computing
3. Privacy
computing model and modelling
4. Privacy
quantification, formal description
5. Privacy
information engineering, provider,
collector, user
6. Privacy
operation and modelling
7. Data utility
and privacy loss
8.
Context adaptive
cryptology for privacy protection
9.
Privacy
protection based information hiding
and sharing
10.
Data analytics
oriented privacy control and
protection
11.
Private
information collection
12. Privacy
sensing and distribution
13. Combined
and comprehensive privacy protection
14. Privacy
preserving data publishing
15. Private
information storage
16. Private
integration and synergy
17. Private
information exchange and sharing
18. Privacy
inference and reasoning
19. Privacy in
cloud, social networks, IoT and
Industrial Internet
20. Privacy,
security, trust, autonomy,
reliability, fault-tolerance
21.
Privacy, AI,
Machine Learning, Data Mining and
Knowledge Discovery
Submission Guidelines
Submissions must include an
abstract, keywords, the e-mail
address of the corresponding author
and should not exceed 8 pages for
main conference, including tables
and figures in IEEE CS format. The
template files for LATEX or WORD can
be downloaded
here. All paper submissions must
represent original and unpublished
work. Each submission will be peer
reviewed by at least three program
committee members. Submission of a
paper should be regarded as an
undertaking that, should the paper
be accepted, at least one of the
authors will register for the
conference and present the work.
Submit your paper(s) in PDF file at
the submission site: http://www.swinflow.org/confs/2017/pricom/submission.htm.
Publications
Accepted and presented papers will
be included into the
symposium
proceedings. Distinguished papers presented at
the conference, after further
revision, will be published in
special issues of
selected journals.