May 5th May 13th, 2015
Ubiquitous sensors and processors embedded in the physical environment hold promise of a smart world
where the personal data collected is used to derive computational intelligence and provide trustworthy,
personalized, and adaptive services to people. The sensors are often unobtrusive and continually
collect data as people perform their daily activities. The personal data thus collected, can reveal
addictive habits and embarrassing behaviors, raising privacy and security concerns that threaten the very
adoption of these ubiquitous technologies.
The PTUC workshop intends to bring together researchers to discuss these emerging privacy and security challenges that arise due to the sharing of personal, time-varying, and voluminous sensory data. These challenges, are fundamentally different than the traditional notions of privacy defined for static and structured databases, and require new privacy-preserving techniques and realizable cryptographic mechanisms, that account for the unique characteristics and limitations of the ubiquitous platforms.
The workshop invites papers presenting original research results addressing both theoretical and practical aspects of privacy and security that arise while sharing of personal sensor data. Papers may include but need not be limited to:
Interested authors can either submit full technical papers (at most 6 pages) or short position papers (at most 4 pages). For formatting instructions and other details, authors are requested to follow the submission guidelines available on theUIC2015 submission page.
Accepted papers must be presented at the workshop and will appear in the proceedings of the UIC2015 conference published by the IEEE Computer Society. At least one author of each published paper is required to register for the conference and present their work at PTUC 2015.