Privacy vs. Pervasive Computing a panel at PSPT 200

Slides:



Advertisements
Similar presentations
Panel Moderator: Qian Zhang Hong Kong University of Science and Technology May 2008.
Advertisements

14th WATCH: Medical Device Cybersecurity: The First 164 Years Kevin Fu University of Massachusetts Amherst. THURSDAY November 15 th, Noon, Room 110 W ashington.
Complex networked systems ICT LEIT H2020 InfoDay Mario Di Francesco, PhD Assistant professor – Aalto University Department of Computer Science and Engineering.
Strategies for Economic Sustainability of Publicly Funded Data Repositories Discussion Session Three—Current Policies for the Long-term Availability of.
18th WATCH: An Experiment in Hiring Discrimination via Online Social Networks Alessandro Acquisti Carnegie Mellon University MONDAY Nov. 25 th, Noon, Room.
1 Computer Engineering Department College of Computer Sciences and Engineering Tuesday 18 November 2008 King Fahd University of Petroleum & Minerals.
CRAW / Lucent Technologies Graduate School Recruiting Panel University of California, Berkeley September 2000.
Hello! Dr. Jeyakesavan Veerasamy CS faculty, The University of Texas at Dallas Website:
Signatures As Threats to Privacy Brian Neil Levine Assistant Professor Dept. of Computer Science UMass Amherst.
Bjarne Stroustrup By Evan Feiereisel CSCE 221H Spring 2014.
NNSA Consortium Cybersecurity Education: Needs and Capabilities Dr. Jonathan M. Graham, Director IA-REDI Dr. Claude Turner, Associate Professor Computer.
Concluding Panel 15:30-17:00, Jan.31, 2002 Coordination : Jun Murai (Keio Univ.) Panelists : - Gul Agha (University of Illinois, USA) - Ly Sauer (Sandia.
Sept 29-30, 2005 Cambridge, MA 1 Grand Challenges Workshop for Computer Systems Software Brett D. Fleisch Program Director National Science Foundation.
Looking Ahead - The Next Generation of Security Solutions.
CRA-W Graduate School Panel Dalhousie University, Faculty of Computer Science March 11, 2009.
1 Panelists Krste Asanovic [UC Berkeley]  Krste received a BA in Electrical and Information Sciences from Cambridge University in 1987 and a Ph.D. in.
Information Security Analytics Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course.
I won a medal in a competition about fractions in third grade and ever since I was the acknowledged leader in my class in mathematics.
Massachusetts Institute of Technology. Index A) The M.I.T - History - Geographical situation - Type of institute B) Research Activities and Partnerships.
Data and Applications Security Research at the University of Texas at Dallas Dr. Bhavani Thuraisingham The University of Texas at Dallas April 25, 2006.
Introduction to SSIT S ociety on S ocial I mplications of T echnology September 2015.
How can computational simulation and modeling be used to create lead-free alloys? Tameka Whitney W.W. Samuell HS, Dallas ISD Faculty Mentor: Raymundo Arroyave,
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course August 22, 2005.
Knowledge Engine for Emergency Response Services -Dr. E. Douglas Harris, Associate Dean and Executive Director, Cyber Security & Emergency Preparedness.
UC Students and Resources. Who are our students?
At the University of Massachusetts Amherst, MA Marilyn Billings Scholarly Communications Librarian W.E.B. Du Bois Library
Why Should You Apply to Graduate School? Masters Degree
AAAS Science & Technology Policy Fellowships
Prof. Bhavani Thuraisingham The University of Texas at Dallas
Launch, Persevere, and Collaborate
Lecture 15: Guest Lecture Professor Gordon Wetzstein
SOFTWARE-BASED NETWORKS: LEVERAGING HIGH-PERFORMANCE NFV PLATFORMS TO MEET FUTURE COMMUNICATION CHALLENGES Time: 16:40 pm - 18:00 pm, 2017/12/28 (Check-in:
Institute for Cyber Security: Research Vision
Introduction to Agents
Effective Patch Management Strategies
Hilton Hotel Honolulu Tapa Ballroom 2 June 26, 2017 Geoffrey Fox
Institute for Cyber Security: Research Vision
Dr. Bhavani Thuraisingham The University of Texas at Dallas
Northwestern Lab for Internet and Security Technology (LIST)
The objectives of MIT-FabLab Norway
UTSA Cyber Security Ecosystem
Selected GOLD Activities by IEEE Societies
طبقه بندی نشریات علمی و فنی
Data and Applications Security Developments and Directions
Security and Privacy in Pervasive/Ubiquitous Computing Systems
Building Trustworthy Semantic Web
Prof. Bhavani Thuraisingham The University of Texas at Dallas
Data and Applications Security Developments and Directions
Trustworthy Semantic Webs
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Roberto M. Fernandez, and Brian Rubineau rsf 2019;5:88-102
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Admit Day 2004.
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Digital Forensics Dr. Bhavani Thuraisingham
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Building Trustworthy Semantic Web
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Dr. Bhavani Thuraisingham The University of Texas at Dallas
Data and Applications Security Developments and Directions
World-Leading Research with Real-World Impact!
Presentation transcript:

Privacy vs. Pervasive Computing a panel at PSPT 200

Panelists Bhavani Thuraisingham, MSF and MITRE Dan Bailey, RSA Labs Simson Garfinkel, MIT Brian Levine, University of Massachusetts

Bhavani Thuraisingham Bhavani Thuraisingham is a program director for Information and Data Management at NSF and on leave from MITRE. She is an IEEE and an AAS fellow. This fall she will leave NSF and join the University of Texas, Dallas.

Dan Bailey Dan Bailey is the RFID Solutions Architect at RSA Laboratories in Bedford MA, the research division of RSA Security. At RSA Security, Dan is working to spearhead RSA Security's efforts in developing RFID security technologies.

Simson Garfinkel Simson Garfinkel is a computer security researcher and award-winning IT commentator. He is a doctorial candidate at MIT and writes monthly columns Technology Review and CSO Magazine, for which he was awarded the 2004 Jesse H. Neal National Business Journalism Award for Best Regularly Featured Department or Column.

Brian Levine Brian Levine is an assistant professor of Computer Science at UMASS where he works on network privacy and security, group commun-ication, and mobility. Before joining UMASS in 1999, he was a student at UC Santa Cruz. .