SCOPE
The need for privacy-aware policies, regulations, and techniques has been widely recognized. This workshop discusses the problems of privacy in the global interconnected societies and possible solutions. The 2022 Workshop, held in conjunction with the ACM CCS conference, is the twenty-first in a yearly forum for papers on all the different aspects of privacy in today's electronic society.
The workshop seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of electronic privacy, as well as experimental studies of fielded systems. We encourage submissions from other communities such as law and business that present these communities' perspectives on technological issues. Topics of interest include, but are not limited to:
- access and query privacy
- anonymization and transparency
- crowdsourcing for privacy and security
- data correlation and leakage attacks
- data and computations integrity in emerging scenarios
- electronic communication privacy
- electronic communication privacy
- information dissemination control
- insider-threat protection
- models, languages, and techniques for big data protection
- anonymization of text, unstructured data and multimedia
- anonymization of longitudinal data and streams
- statistical disclosure control
- theory of data anonymization
- privacy models
- network privacy
- personally identifiable information
- privacy-aware access control
- privacy and anonymity on the Web
- privacy in big data
- privacy in biometric systems
- privacy in cloud and grid systems
- privacy and data mining
- privacy in the digital business
- privacy in the Internet of Things
- privacy enhancing technologies
- privacy in health care and public administration
- privacy and human rights
- privacy metrics
- privacy in mobile systems
- privacy in outsourced scenarios
- privacy in sensor networks
- privacy in surveillance systems
- privacy policies
- privacy of provenance data
- privacy in social networks
- privacy threats
- privacy and virtual identity
- user privacy
- wireless privacy