| Time | Paper/Talk | Author |
|---|---|---|
| 08:50-09:10 | Welcome and Introduction (slides) | Vladimir Estivill-Castro |
| 09:10-10:00 | Lay of the Land: Legal, Moral, and Historical reasons why Privacy Preserving Data Mining is Important (slides) | Chris Clifton |
| 10:00-10:30 | Break | |
| 10:30-11:15 | Building Decision Tree Classifier on Private Data (slides) | Wenliang Du and Zhijun Zhan Syracuse University |
| 11:15-12:00 | A Methodology for Hiding Knowledge in Databases (slides) | Tom Johnsten and Vijay V. Raghavan University of South Alabama and University of Louisiana Lafayette |
| 12:00-13:00 | Lunch (provided) | |
| 13:00-13:45 | Foundations for an Access Control Model for Privacy Preservation in Multi-Relational Association Rule Mining (slides) | Stanley R. M. Oliveira and Osmar R. Zaïane Embrapa Information Technology and University of Alberta |
| 13:45-14:20 | An Architecture for Privacy-preserving Mining of Client Information (slides) | Murat Kantarcioglu and Jaideep Vaidya Purdue University |
| 14:20-14:55 | Privacy Preserving Frequent Itemset Mining (slides) | Stanley R. M. Oliveira and Osmar R. Zaïane Embrapa Information Technology and University of Alberta |
| 15:00-15:30 | Break | |
| 15:30-16:05 | Privacy Conflicts in CRM Services for Online Shops: A Case Study (slides) | Claus Boyens, Oliver Günther, Maximilian Teltzrow Humboldt-Universität zu Berlin |
| 16:05-16:40 | Privacy-Preserving Distributed Queries for a Clinical Case Research Network (slides) | Gunther Schadow, Shaun J. Grannis, Clement J. McDonald Regenstrief Institute and Indiana University School of Medicine |
| 16:40-17:00 | Break | |
| 17:00-18:00 | Panel and Discussion: What are the key applications and challenge problems for privacy-preserving data mining? (slides) | Chris Clifton, Vladimir Estivill-Castro, Gunther Schadow, Maximilian Teltzrow |