HomeConference in Cooperation withHome

ARES 2006

The First International Conference on Availability, Reliability and Security

The International Dependability Conference - Bridging Theory and Practice
April 20th - April 22nd 2006, Vienna University of Technology, Austria

DAWAM 2006

International Workshop “Dependability Aspects on Data WArehousing and Mining applications” DAWAM 2006.

in conjunction with The First International Conference on Availability, Reliability and Security (ARES 2006)


Nowadays, the rapid growth of information technologies has brought tremendous opportunities for data sharing, integration, and analysis across multiple distributed, heterogeneous data sources. In the past decade, data warehousing and mining are the well-known technologies used for data analysis and knowledge discovery in vast domain of applications. Data mining technology has emerged as a means of identifying patterns and trends from large quantities of data. Data mining has used a data warehousing model of gathering all data into a central site, then running an algorithm against that data.

A growing attention has been paid to the study, development and application of data warehousing and mining. Nevertheless, dependability aspects in these applications such as availability, reliability, integrity, privacy, and security issues are still being investigated. For example, in data warehousing applications, privacy considerations may prevent the approach of collecting data into the centralized warehouse because each data source has different privacy policy. Furthermore, the complexity of security increases as different sources of information are combined. Reliable, consistent and trustworthy of information are also significant requirements in data warehousing applications. Data mining has been shown to be beneficial in confronting various types of attacks to computer systems such as fraud detection, intrusion prevention. In some applications, e.g. clinic information system, government management, business competitive information, it is required to apply the mining algorithms without observing the confidential data values thus demands the privacy preservation. There are also many challenging issues that need further investigation in the context of data mining from both privacy and security perspectives such as mining of imbalanced data, bioinformatics data, streaming data, ubiquitous computing data, grid computing data etc.

The goals of this workshop are to bring together users, engineers and researchers (from industry and academy) alike to present their recent work, discuss and identify problems, synergize different views of techniques and policies, and brainstorm future research directions on various dependability aspects of data warehousing and data mining applications. We strongly encourage researchers and practitioners with interest in the areas of reliability, availability, privacy and security, databases, data warehousing, data mining, and statistics to submit their experience, and/or research results.

Topics related to any of dependability aspects in data warehousing and mining, theory, systems and applications are of interest. These include, but are not limited to the following areas:

  • Dependability and fault tolerance
  • High Availability and Disaster Recovery
  • Survivability of evaluative systems
  • Reliability and Robustness Issues
  • Accuracy and reliability of responses
  • Reliable and Failure Tolerant Business Process Integration
  • Reliable Event Management and Data Stream Processing
  • Failure Tolerant and trustworthy Sensor Networks
  • Highly available data warehouses for business processes integration
  • Handling different or incompatible formats, and erroneous data
  • Privacy and security policies and social impact of data mining
  • Privacy preserving data integration
  • Access control techniques and secure data models
  • Encryption & Authentication
  • Pseudonymization and Encryption
  • Anonymization and pseudonymization
  • Trust management, and security
  • Security in Aggregation and Generalization
  • User Profile Based Security
  • Secure multi-party computation
  • Secondary use of personal data, clinic data, credit record
  • Fraud and misuse detection
  • Intrusion detection and tolerance
  • Data mining applications for terrorist detection
  • Private queries by a (semi-trusted) third party
  • Query authentication, logging, auditing, access control and authorization policies

  • The program of the workshop will be a combination of invited talks, paper/poster presentations and discussions.

    Important Dates

    Submission Deadline: January, 15th 2006 Extension !!!
    Author Notification: January, 23th 2006
    Author Registration: February, 1st 2006
    Proceedings Version: February, 1st 2006

    Submission Guidelines

    Authors are invited to submit research and application papers in IEEE Computer Society Proceedings Manuscripts style (two columns, single-spaced, including figures and references, using 10 fonts, and number each page). You can confirm the IEEE Computer Society Proceedings Author Guidelines at the following web page:

    URL: http://www.computer.org/portal/site/ieeecs/menuitem.c5efb9b8ade9096b8a9ca0108bcd45f3/index.jsp?&pName=ieeecs_level1&path=ieeecs/publications/cps&file=cps_forms.xml&xsl=generic.xsl&

    or http://www.tinmith.net/tabletop2006/IEEE/Format/instruct.htm

    Submission are classified into 3 categories (1) full paper (8 pages), (2) short paper (5 pages), and (3) poster (2 pages) representing original, previously unpublished work. Submitted papers will be carefully evaluated based on originality, significance, technical soundness, and clarity of exposition.

    Contact author must provide the following information: paper title, authors' names, affiliations, postal address, phone, fax, and e-mail address of the author(s), about 200-250 word abstract, and about five keywords and register at our ARES website: http://www.ares-conf.org/?q=submission . Prepare your paper in PDF or MS Word file and submit it to our site or send it to the workshop co-chair: Dr. Nguyen Manh Tho, Institute of Software Technology, Vienna University of Technology, via email: tho@ifs.tuwien.ac.at

    Submission of a paper implies that should the paper be accepted, at least one of the authors will register and present the paper in the conference. Accepted papers will be given guidelines in preparing and submitting the final manuscript(s) together with the notification of acceptance.


    All accepted papers (full and short papers) will be published as ISBN proceedings published by IEEE Computer Society. Based on quality and referee reviews, some papers not suitable for acceptance as full paper will be accepted for presentation at DAWAM 2006 in Poster category and will be also included in the IEEE Proceedings.

    A selected number of papers will be nominated to be published as special issues in appropriate journals such as Journal of automatic and trusted computing (JoATC).

    Workshop Organizer Co-chairs

    Jimmy Huang, Prof.
    School of Information Technology,
    York University
    Toronto, Ontario
    Canada M3J 1P3

    Josef Schiefer, Ph.D.
    Senactive IT-Dienstleistungs GmbH ,
    Phorusgasse 8
    A1040 Vienna, Austria

    Nguyen Manh Tho, Ph.D. (main contact)
    Institute of Software Technique and Interactive System,
    Vienna University of Technology
    Favoriten strasse 9-11/188
    A1040 Vienna, Austria

    Program Committee

  • Jemal Abawajy, Deakin University, Australia
  • Aijun An, York University, Canada
  • Pawan Chowdhary, IBM T J Watson Research Center, USA
  • LiWu Chang, Naval Research Laboratory, USA
  • Josep Domingo-Ferrer, Rovira i Virgili University of Tarragona, Spain
  • Elena Ferrari, University of Insubria at Como, Italy
  • Ulrich Flegel, University of Dortmund, Germany
  • Tyrone Grandison, IBM Almaden Research, USA
  • Jimmy Huang, York University, Canada
  • Jun-Jang (JJ) Jeng, IBM T.J. Watson Research Center, USA
  • Hillol Kargupta, University of Maryland, Baltimore County, USA and Agnik, LLC
  • Zongwei Luo, University of Hong Kong, Hong Kong
  • Taneli Mielikäinen, University of Helsinki, Finland
  • Tho Manh Nguyen, Vienna University of Technology, Austria
  • Daniel E. O'Leary, University of Southern California, USA
  • Stanley Oliveira, Embrapa Information Technology, Brazil
  • Arnon Rosenthal, MITRE Corporation, USA
  • Josef Schiefer, Senactive IT-Dienstleistungs GmbH, Austria
  • Ben Soh, La Trobe University, Australia
  • David Taniar, Monash University, Australia
  • Juan Trujillo, University of Alicante, Spain
  • Vassilios S. Verykios, University of Thessaly, Greece
  • Justin Zhan, University of Ottawa, Canada
  • Sheng Zhong, State University of New York at Buffalo, USA