International Journal of Information and Computer Security, Special Issue on Security and Privacy Aspects of Data Mining 2006 (Submissions due 5 April 2006) http://www.site.uottawa.ca/~zhizhan/psdmspecialissue2006/index.htm Guest editors: Stan Matwin (University of Ottawa, Canada), LiWu Chang (Naval Research Laboratory, USA), Rebecca N. Wright (Stevens Institute of Technology, USA), and Justin Zhan (University of Ottawa, Canada) Rapid growth of information technologies nowadays has brought tremendous opportunities for data sharing and integration, and also demands for privacy protection. Privacy-preserving data mining, a new multi-disciplinary field in information security, broadly refers to the study of how to assure data privacy without compromising the confidentiality and quality of data. Although techniques, such as random perturbation techniques, secure multi-party computation based approaches, cryptographic-based methods, and database inference control have been developed, many of the key problems still remain open in this area. Especially, new privacy and security issues have been identified, and the scope of this problem has been expanded. How does the privacy and security issue affect the design of information mining algorithm? What are the metrics for measuring privacy? What impacts will this research impose on diverse areas of counter-terrorism, distributed computation, and privacy law legislation? This special issue aims to provide an opportunity for presenting recent advances as well as new research directions in all issues related to privacy-preserving data mining. This special issue is inviting original contributions that are not previously published or currently under review by other journals. We welcome both theoretical and empirical research using quantitative or qualitative methods. Areas of interest include but not limited to: * Access control techniques and secure data models. * Privacy-preserving data mining. * Privacy-preserving Information Retrieval * Trust management for information mining. * Inference/disclosure related information mining. * Privacy enhancement technologies in web environments. * Privacy guarantees and usability of perturbation and randomization techniques. * Analysis of confidentiality control methods. * Privacy policy analysis. * Privacy-preserving data integration. * Privacy policy infrastructure. * Privacy-preserving query systems. * Identify theft protection. * Privacy-aware access control. * Privacy policy languages and enforcement mechanisms.