[Elsnet-list] 2nd Int. Workshop "Dependability Aspects on Data WArehousing and Mining Applications (DAWAM 2007)

Nguyen Manh Tho tho at ifs.tuwien.ac.at
Thu Sep 28 09:06:15 CEST 2006

Apologies for multiple copies due to cross postings. Please send to 

interested colleagues and students)





Second International Workshop "Dependability Aspects on Data WArehousing

 and Mining applications" DAWAM 2007.


http://www.ares-conference.eu/conf/ --> Workshops -->DAWAM




in conjunction with The Second International Conference on

Availability, Reliability and Security - ARES 2007





Nowadays, the rapid growth of information technologies has brought

tremendous opportunities for data sharing, integration, and analysis

across multiple distributed, heterogeneous data sources. In the past

decade, data warehousing and mining are the well-known technologies

used for data analysis and knowledge discovery in vast domain of



Data mining technology has emerged as a means of identifying

patterns and trends from large quantities of data. Data mining has

used a data warehousing model of gathering all data into a central

site, then running an algorithm against that data.


A growing attention has been paid to the study, development and

application of data warehousing and mining. Nevertheless,

dependability aspects in these applications such as availability,

reliability, integrity, privacy, and security issues are still being

investigated. For example, in data warehousing applications, privacy

considerations may prevent the approach of collecting data into the

centralized warehouse because each data source has different privacy

policy. Furthermore, the complexity of security increases as

different sources of information are combined. Reliable, consistent

and trustworthy of information are also significant requirements in

data warehousing applications. Data mining has been shown to be

beneficial in confronting various types of attacks to computer

systems such as fraud detection, intrusion prevention. In some

applications, e.g. clinic information system, government management,

business competitive information, it is required to apply the mining

algorithms without observing the confidential data values thus

demands the privacy preservation. There are also many challenging

issues that need further investigation in the context of data mining

from both privacy and security perspectives such as mining of

imbalanced data, bioinformatics data, streaming data, ubiquitous

computing data, grid computing data etc.


The goals of this workshop are to bring together users, engineers and

researchers (from industry and academy) alike to present their recent

work, discuss and identify problems, synergize different views of

techniques and policies, and brainstorm future research directions on

various dependability aspects of data warehousing and data mining

applications. We strongly encourage researchers and practitioners

with interest in the areas of reliability, availability, privacy and

security, databases, data warehousing, data mining, and statistics

to submit their experience, and/or research results.


Topics related to any of dependability aspects in data warehousing

and mining, theory, systems and applications are of interest. These

include, but are not limited to the following areas:


· Dependability and fault tolerance

· High Availability and Disaster Recovery

· Survivability of evaluative systems

· Reliability and Robustness Issues

· Accuracy and reliability of responses

· Reliable and Failure Tolerant Business Process Integration

· Reliable Event Management and Data Stream Processing

· Failure Tolerant and trustworthy Sensor Networks

· Highly available data warehouses for business processes integration

· Handling different or incompatible formats, and erroneous data

· Privacy and security policies and social impact of data mining

· Privacy preserving data integration

· Access control techniques and secure data models

· Encryption & Authentication

· Pseudonymization and Encryption

· Anonymization and pseudonymization

· Trust management, and security

· Security in Aggregation and Generalization

· User Profile Based Security

· Secure multi-party computation

· Secondary use of personal data, clinic data, credit record

· Fraud and misuse detection

· Intrusion detection and tolerance

· Data mining applications for terrorist detection

· Private queries by a (semi-trusted) third party

· Query authentication, logging, auditing, access control and

authorization policies


The program of the workshop will be a combination of invited talks,

paper/poster presentations and discussions.


Important Dates


Submission Deadline: December, 17th 2006

Author Notification: January, 14th 2007

Author Registration: January, 21st 2007

Proceedings Version: January, 21st 2007

Conference/Workshop: April 10-13th, 2007


Submission Guidelines


Authors are invited to submit research and application papers in IEEE

Computer Society Proceedings Manuscripts style (two columns,

single-spaced, including figures and references, using 10 fonts, and

number each page). You can confirm the IEEE Computer Society



Author Guidelines at the following web page:


URL: http://computer.org/cspress/instruct.htm

or http://www.tinmith.net/tabletop2006/IEEE/Format/instruct.htm


Submission are classified into 2 categories (1) full paper (8

pages) and (2) short paper (5 pages) representing original, previously 

unpublished work.


Submitted papers will be carefully evaluated based on originality,

technical soundness, and clarity of exposition.


Contact author must provide the following information: paper title,

authors' names, affiliations, postal address, phone, fax, and e-mail

address of the author(s), about 200-250 word abstract, and about five

keywords and register at our ARES website:




The online submission system will be available at the begining of October


You can also prepare your paper in PDF file and send it to the workshop

Dr. Nguyen Manh Tho, Institute of Software Technology, Vienna University of 

Technology, via email: tho at ifs.tuwien.ac.at


Submission of a paper implies that should the paper be accepted, at

least one of the authors will register and present the paper in the

conference. Accepted papers will be given guidelines in preparing

and submitting the final manuscript(s) together with the

notification of acceptance.




All accepted papers (full and short papers) will be published as ISBN

proceedings published by IEEE Computer Society. Based on quality and

referee reviews, some papers not suitable for acceptance as full

paper will be accepted for presentation at DAWAM 2007 as short paper or 

Poster presentation category and will be also included in the IEEE


A selected number of papers will be nominated to be published as

special issues in appropriate journals such as Journal of automatic

and trusted computing (JoATC).


Workshop Organizer Co-chairs


Jimmy Huang, Prof.,

School of Information Technology,

York University,

Toronto, Ontario

Canada M3J 1P3

jhuang at yorku.ca


Josef Schiefer, Ph.D.

Senactive IT-Dienstleistungs GmbH,

Phorusgasse 8

A1040 Vienna, Austria

josef.schiefer at senactive.com


Nguyen Manh Tho, Ph.D. (main contact)

Institute of Software Technique and Interactive System,

Vienna University of Technology,

Favoriten strasse 9-11/188

A1040 Vienna, Austria

tho at ifs.tuwien.ac.at


Program Committee


Jemal Abbawajy, Deakin University, Australia

Mikhail Atallah, Purdue University, USA

Barbara Carminati, University of Insubria at Varese, Italy

Pawan Chowdhary, IBM T. J. Watson Research Center, USA

Hervé Debar, France Télécom R&D, France

Josep Domingo-Ferrer, Rovira i Virgili University of Tarragona, Spain

Ulrich Flegel, University of Dortmund, Germany

Tyrone Grandison, IBM Almaden Research, USA

Jimmy Huang, York University, Canada

James Joshi, University of Pittsburgh, USA

Christopher Kruegel, Vienna University of Technology, Austria

Kwok-Yan Lam, Tsinghua University, China

Xue Li, The University of Queensland Brisbane, Australia

Zongwei Luo, The University of Hong Kong, China

Henrique Madeira, University of Coimbra, Portugal

Michael May, Fraunhofer AIS, Germany

Nasrullah Memon, Aalborg University Esbjerg, Denmark

Taneli Mielikäinen, University of Helsinki, Finland

Tho Manh Nguyen, Vienna University of Technology, Austria

Daniel O'Leary, University of Southern California, USA

Torsten Priebe, Capgemini Consulting Österreich AG, Vienna, Austria

Raghav Rao, SUNY at Buffalo, USA

Yücel Saygin, Sabanci University, Turkey

Josef Schiefer, Senactive IT-Dienstleistungs GmbH, Austria

Ben Soh, La Trobe University, Australia

Toshihiro Tabata, Okayama University, Japan

David Taniar, Monash University, Australia

Vassilios S. Verykios, University of Thessaly, Greece

Duminda Wijesekera, George Mason University, USA

Yanjiang Yang, Singapore Management University, Singapore

Justin Zhan, Carnegie Mellon University, USA

Sheng Zhong, SUNY at Buffalo, USA


-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://stratus.let.uu.nl/pipermail/elsnet-list/attachments/20060928/e53f3f73/attachment-0001.htm

More information about the Elsnet-list mailing list