Tutorial 1 by Josep Domingo-Ferrer & Jordi Soria-Comas
Title: “Data Anonymization”
Abstract: Database privacy means different things depending on the context. Here we deal with protecting the privacy of data subjects/respondents by anonymizing their data records: the scenario is a data collector who wants to release useful information while preserving the privacy of data subjects/respondents. We consider the various types of data releases, analyze their privacy implications and review the statistical disclosure control techniques in use.
Short Biographies: Josep Domingo-Ferrer is a Distinguished Professor of Computer Science at Universitat Rovira i Virgili, Tarragona, Catalonia, where he holds the UNESCO Chair in Data Privacy. His research interests are in data privacy, data security, statistical disclosure control and cryptographic protocols, with a focus on the conciliation of privacy, security and functionality. He has received a Google Faculty Research Award (2014). He is a Fellow of IEEE and he has consulted worldwide on anonymization and statistical disclosure control.
Jordi Soria-Comas is a postdoctoral researcher at Universitat Rovira i Virgili. He holds a B.Sc. in Mathematics, M.Sc. degrees in Computer Security and in Finance and a Ph.D. in Computer Science. He also has industrial experience.
Tutorial 2 by Esma Aïmeur
Title:“Online Privacy: Risks, Challenges, and New Trends”
Abstract: Being on the Internet implies constantly sharing information, personal or not. Nowadays, preserving privacy is not an easy feat: technology is growing too fast, leaving legislation far behind and the level of security awareness is insufficient. Websites and Internet services are collecting personal data with or without the knowledge or consent of users. Not only does new technology readily provide an abundance of methods for organizations to gather and store information, people are also willingly sharing data with increasing frequency, exposing their intimate lives on social media websites. Online data brokers, search engines, data aggregators, geolocation services and many other actors on the web are monetizing our online presence for their own various purposes. Similarly, current technologies including digital devices such as smartphones, tablets, cloud computing/SaaS, big data, BYOD are posing serious problems for individuals and businesses alike. Data loss is now a common event and the consequences are exceedingly damaging. Although there are means at our disposal to limit or at least acknowledge how and what we’re sharing, the most do not avail themselves of these tools and so the current situation remains unacceptable. Many privacy enhancing technologies (PETs) have been available for some time, but are not effective enough to prevent re-identification and identity theft.
In this tutorial, we propose how to address various issues inherent to Internet data collection and voluntary information disclosure — the Achilles’ heel of privacy. We emphasize the problems and challenges facing privacy nowadays and conclude with some recommendations and best practices.
Short Biography: Esma Aïmeur is a Professor in the Department of Computer Science and Operations Research at the University of Montreal. She received her Ph.D. Degree from University of Paris 6 in the field of Artificial Intelligence. She was the head of the Computer Science division of the multidisciplinary Masters Program in Electronic Commerce at the University of Montreal. She has been working with her team on computer privacy for more than 12 years. She is interested in privacy-enhancing technologies in different settings, such as social networks, electronic commerce and e-learning. She also works on privacy-preserving data mining and the protection of personal data (identity theft, information disclosure, profiling and re-identification). She has been an appointed member of the Data Protection Advisory Committee of University of Montreal. Her responsibilities include helping to improve policies and decision making in security awareness by providing best practices to protect personal data.
Tutorial 3 by Yury Zhauniarovich
Title: “Security of the Android operating system”
Abstract: The aim of this tutorial is to give interested people the understanding of the security mechanisms implemented in the Android OS. Achievement of the aim will help listeners to identify benefits and limitations of this operating system and will support them in understanding of the security mechanisms of other mobile operating systems.
Short Biography: Yury Zhauniarovich is a Postdoctoral Researcher at the University of Trento in Security Research Group. He earned his M.Sc. degree in Computer Science from the Belarusian State University in 2007. From 2007 till 2009, he worked as a SAP Consultant at Itransition. In April 2014, he received his Ph.D. degree in Information and Communication Technology from the University of Trento. His research interests include design, implementation and evaluation of security enhancements of mobile operating systems, runtime security, smartphone applications security and mobile malware. He is the author of the free book “Android Security (and Not) Internals.