Robert Thibadeau, Copyright 2000 1 It’s not what IT does to Privacy it’s what Privacy does to IT Robert Thibadeau, Ph.D. www.internetlab.ri.cmu.edu www.w3.org/p3pwww.w3.org/p3p.

Slides:



Advertisements
Similar presentations
Privacy & Other Issues. Acceptable Use Policies When you sign up for an account at school or from an Internet Service Provider, you agree to their rules.
Advertisements

Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
Web Programming 1 Darby Chang Web Programming. Cookie 2 Web Programming.
Getting Set-up with Hosting and WordPress Gregory Young Alternative Hosting
Privacy Science, Copyright Robert Thibadeau, CMU, Privacy Science Robert Thibadeau, Ph.D. Director, Internet Systems Laboratory
Aim: What strategies can we use to keep our financial information safe online? Do Now: What do you do to protect your information online?
Novell from Home Net Storage. Novell access via NetStorage 1-Web Interface Connect to your shared drive through your web browser Windows, Mac or Linux.
6/10/2015Cookies1 What are Cookies? 6/10/2015Cookies2 How did they do that?
Copyright © 2004 Pearson Education, Inc. Slide 7-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
Extras Plus! Pepper. Objectives extra knowledge Cookies Picture handling when creating site.
1 CS 483 Enterprise and Web Application Programming Week 6 Session Beans JSP Tutorial.
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
Masud Hasan Secure Project 1. Secure It uses Digital Certificate combined with S/MIME capable clients to digitally sign and.
Course 201 – Administration, Content Inspection and SSL VPN
The Right Choice for Call Recording OAISYS and PCI DSS Compliance Managing Payment Card Industry Compliance with OAISYS Call Recording Solutions.
Chapter 7: Using Windows Servers to Share Information.
Networks What are they and how do they work? What is a Network?  Hardware and software data communication system  Two or more devices connected for.
SLIR Computer Lab: Orientation and Training December 16, 1998.
1 E-Wallets Your Logo Here Jennifer Hart. 2 Why We “Need” E-Wallets For frequent online shoppers, it becomes a hassle to fill out order forms with the.
Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah 24 Cookies: What.
INTERNET PRIVACY Marketing companies The cookie leak security hole in the HTML messages The Web Bug Can we trust the privacy.
The Internet and World Wide Web Robert T. Grauer
Lecture 16 Page 1 CS 236 Online SQL Injection Attacks Many web servers have backing databases –Much of their information stored in a database Web pages.
CS453: State in Web Applications (Part 1) State in General Sessions (esp. in PHP) Prof. Tom Horton.
Created by, Author Name, School Name—State FLUENCY WITH INFORMATION TECNOLOGY Skills, Concepts, and Capabilities.
Created by, Nancy Harris, James Madison University, VA FLUENCY WITH INFORMATION TECNOLOGY Skills, Concepts, and Capabilities.
COOKIES. INTERNET COOKIES What are they Where are they found What should you do about them.
Introduction to the Internet and World Wide Web. The Internet n A network of networks n Began in 1969 as ARPAnet (Advanced Research Projects Agency) n.
® Gradient Technologies, Inc. Inter-Cell Interworking Access Control Across the Boundary Open Group Members Meeting Sand Diego, CA USA April 1998 Brian.
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 8 Omar Meqdadi Department of Computer Science and Software Engineering University of.
Lecture 7, : Computer Security, Fall : Computer Security Lecture 6: Privacy, CSP & Review Robert Thibadeau School of Computer Science.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #22 Secure Web Information.
Module 2 – User Safety Privacy Attacks on end users Browser vulnerabilities.
Lecture 16 Page 1 CS 236 Online Web Security CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
CP476 Internet Computing CGI1 Cookie –Cookie is a mechanism for a web server recall info of accessing of a client browser –A cookie is an object sent by.
Student Experience It’s your education Type the web site address into the browser given to you by your junior high or high school Select “I am a student”
Cisco – Chapter 15 Application Layer closest to you as an end-user, when you are interacting with software.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
ECMM6018 Enterprise Networking for Electronic Commerce Tutorial 7
Morton Instructional Technology Team Edline Student Activation.
WEB SERVER SOFTWARE FEATURE SETS
8-Mar-16 More About Servlets Session Tracking. Persistent information A server site typically needs to maintain two kinds of persistent (remembered) information:
27.1 Chapter 27 WWW and HTTP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
COOKIES Gloria Soria Network Security COSC 356. What is a Cookie? A cookie is a piece of text that a Web Server can store on a user's hard disk. Cookies.
Privacy Science, Copyright Robert Thibadeau, CMU, Privacy Science Robert Thibadeau, Ph.D. Director, Internet Systems Laboratory
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
CS 115: COMPUTING FOR THE SOCIO-TECHNO WEB TECHNOLOGIES FOR PRIVATE (AND NOT-SO-PRIVATE) COMMUNICATIONS.
Why Does The Site Need an SSL Certification?. Security should always be a high concern for your website, but do you need an SSL certificate? A secure.
CX Introduction to Web Programming
Chapter 7: Using Windows Servers
Setting and Upload Products
Shopping online tips Presented by: Wala Al-Zahrani
Chapter 5 Electronic Commerce | Security Threats - Solution
Introduction to the Internet and World Wide Web
Remote Logging, Electronic Mail, and File Transfer
SSL Certificates for Secure Websites
Chapter 5 Electronic Commerce | Security Threats - Solution
COOKIES.
Some Common Terms The Internet is a network of computers spanning the globe. It is also called the World Wide Web. World Wide Web It is a collection of.
Yahoo Support Ireland Toll-Free Number:
AOL Phone Number
What is Cookie? Cookie is small information stored in text file on user’s hard drive by web server. This information is later used by web browser to retrieve.
Web Server Technology Unit 10 Website Design and Development.
Student Experience It’s your education.
CLASP Project AAI Workshop, Nov 2000 Denise Heagerty, CERN
Unit# 5: Internet and Worldwide Web
Introduction to the Internet and World Wide Web
CSc 337 Lecture 27: Cookies.
CSc 337 Lecture 25: Cookies.
Presentation transcript:

Robert Thibadeau, Copyright It’s not what IT does to Privacy it’s what Privacy does to IT Robert Thibadeau, Ph.D

Robert Thibadeau, Copyright Information Privacy Technology Law No matter how much you want to, you can’t get technology out of privacy or the law out of privacy

Robert Thibadeau, Copyright Reasons There is no technically perfect solution possible : Thomas Jefferson’s notion of public and private. –Therefore the Law becomes Indispensible, and the LAW is always at Fault if it is not there providing protection. Technology – actually the computer – will always surprise you : The Turing Principle –Therefore Technology cannot be frozen to a form, and the LAW is responsible, not technology Technology – you need locks on the doors, systems to facilitate privacy, and systems for policing of the laws –This requires Technology

Robert Thibadeau, Copyright Negotiating Privacy in a Millisecond A HARD PROBLEM FOR IT DICTATED BY PRIVACY

Robert Thibadeau, Copyright Privacy Server Protocol now the basis for the European JAVA Demonstrator Port-based, not (necessarily) HTTP –Scope : Persistence in Time and Scoping across Modality P3P Vocabulary (as excellent starter) Negotiated Privacy –Persona Driven Bilateral Privacy –Museums - Universal Studios – Ford Have Privacy Needs Too Non-Repudiate-able Contracts –Utilizing ASN.1/SMPTE 298M/DVBX Globally Unique Contract Names without central servers.

Robert Thibadeau, Copyright CMU PERSONA MODEL Schwab StockPicker Client Browser User Agent Web Site Server Agent Amazon Shopper DoubleClick User BN Shopper BUY Shopper Database System Privacy Policy Agreements Amazon Shopper DoubleClick User CMU Shadow

Robert Thibadeau, Copyright CMU PERSONA MODEL Schwab StockPicker Client Browser User Agent Web Site Server Agent Amazon Shopper DoubleClick User BN Shopper BUY Shopper Database System Amazon Shopper DoubleClick User CMU Shadow I want the Shopping Cart Need to be a Shopper I ‘m an Amazon Shopper OK, Sign Here OK, Now you Sign Done, Come on In!

Robert Thibadeau, Copyright CMU PERSONA MODEL *ALT Schwab StockPicker Client Browser User Agent Web Site Server Agent Amazon Shopper DoubleClick User BN Shopper BUY Shopper Database System Amazon Shopper DoubleClick User CMU Shadow I want the Shopping Cart Need to be a BN Shopper Can I be an Amazon Shopper? OK, Sign Here OK, Now you Sign Done, Come on In! What’s That? It’s This P3P Policy

Robert Thibadeau, Copyright CMU PERSONA MODEL *ALT Schwab StockPicker Client Browser User Agent Web Site Server Agent Amazon Shopper DoubleClick User BN Shopper BUY Shopper Database System Amazon Shopper DoubleClick User CMU Shadow I want the Shopping Cart Need to be a Shopper Can I be an Amazon Shopper? OK, Now You Sign OK, Sign Here Done, I’m Coming In! OK, But you need to be DoubleClick User TOO!

Robert Thibadeau, Copyright cmu persona A Persona is a Set of Credentials of which a Proper Subset is distinguished for Authorizing Access To the Remainder of the Set Name : Credit Card Number : Card Expiration : Mailing Address : Mothers Name : Child Persona : … Username : Password : Credentials as Other Persona Recogniz-er : FillerIn-er : Communicat-er : HowToUse-er : P3P APPEL :

Robert Thibadeau, Copyright cmu persona interface IE/Netscape Plugin is EMPTY PERSONA EDIT OR APPLY ENGINE Fill it with actual person in different ways: CMU PERSONA PLUGIN Active Persona Storage REMOTE BASESTATION WEB SERVER : PORT 80 (Web Page Activates Persona) AMAZON SHOPPER THIRD PARTY WEB SERVER : PORT 80 MY OTHER SHOPPER My Secure Hard Disk OR My Floppy Disk MY OTHER SHOPPER Like to Use Amazon Shopper

Robert Thibadeau, Copyright