1 WRAP UP Joan Feigenbaum PORTIA Project Site Visit Stanford CA, May 12-13, 2005.

Slides:



Advertisements
Similar presentations
1 Education and Outreach in the PORTIA Project Joan Feigenbaum PORTIA Project Site Visit Stanford CA, May 12-13, 2005.
Advertisements

Security, Privacy and the Cloud Connecticut Community Providers’ Association June 20, 2014 Steven R Bulmer, VP of Professional Services.
Cryptography and Authentication Lab ECE4112 Group4 Joel Davis Scott Allen Quinn.
Security Controls – What Works
© 2008 McAfee, Inc. “Endpoint” Security Defining the endpoints and how to protect them.
Trust, Privacy, and Security Moderator: Bharat Bhargava Purdue University.
Trust, Privacy, and Security Moderator: Bharat Bhargava 1 Coordinators: Bharat Bhargava 1, Csilla Farkas 2, and Leszek Lilien 1 1 Purdue University and.
1 The PORTIA Project: Research Overview Dan Boneh PORTIA Project Site Visit Stanford CA, May 12-13, 2005
Privacy: Challenges and Opportunities Tadayoshi Kohno Department of Computer Science and Engineering University of Washington.
Policy Languages and Enforcement John Mitchell Stanford 4 th IAPP Privacy Summit February 2004.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
(Geneva, Switzerland, September 2014)
Factors to be taken into account when designing ICT Security Policies
Contextual Integrity in PORTIA PI: Helen Nissenbaum Students: Timothy Weber & Michael Zimmer New York University In collaboration with: Sam Hawala (U.S.
The Business of Identity Management Barry R. Ribbeck Director Systems Architecture & Infrastructure Rice University
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
MOVING FACULTY AND STAFF TO GOOGLE APPS FOR EDUCATION Mark Fitzgerald Boise State University 1.
Cong Wang1, Qian Wang1, Kui Ren1 and Wenjing Lou2
IDENTITY MANAGEMENT: PROTECTING FROM THE INSIDE OUT MICHAEL FORNAL, SECURITY ANALYST PROVIDENCE HEALTH & SERVICES SOURCE SEATTLE CONFERENCE
1 Protecting Data in a Collaborative Environment Willa Pickering, Ph.D.
Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.
+ -SIG Information Systems & Computing University of Pennsylvania June 27, /13.
Instant Messaging – Turning Toys Into Tools Presented by: Marla K. Brock – Bilzin Sumberg Kajetan Koci – Loeb & Loeb Kevin Sullivan – Cohen & Grigsby.
© 2006 Verizon. All Rights Reserved. Overview of State Governance Security Landscape Leslie Carter, State Subject Matter Expert January 18, 2007 Leslie.
SECURITY & THE UNIVERSITY INCLUDING A HOSPITAL October 3, 2008 Doyle Friskney Chief Technology Officer University of Kentucky.
SEC303 Assessing and Managing Privacy in the Enterprise JC Cannon Privacy Strategist.
Mini-Project on Web Data Analysis DANIEL DEUTCH. Data Management “Data management is the development, execution and supervision of plans, policies, programs.
Computational Challenges in E-Commerce By Joan Feigenbaum, David C.Parkes, and David M.Pennock Presented by Wu Jingyuan.
NSF Middleware Initiative Renee Woodten Frost Assistant Director, Middleware Initiatives Internet2 NSF Middleware Initiative.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
2001 Ratemaking Seminar INT-1: Introduction to Data Management 101 Data Standards / Data Quality Joan M. Klucarich Fireman’s Fund Insurance Company.
Policies CIT 380: Securing Computer SystemsSlide #1.
Dale Smith COSC 4010 Computer Security Authentication & Security in the.NET environment.
CIS 4930/6930: Systems Security Instructor: Xinming “Simon” Ou TA: Xiaolong “Daniel” Wang Class time: MW 2-3:15 1.
Information Systems Security New Faculty Orientation Day Queen’s University August 2011 George Farah, GIAC/GSEC Gold, CRISC, CISA University Information.
Foundations of Secure Networked Computing Participants: Chen-Nee Chuah Joan Feigenbaum Russell Impagliazzo Matti Kaariainen Karl Levitt Scott Shenker Salil.
Network Security Principles & Practices By Saadat Malik Cisco Press 2003.
Abstract With the advent of cloud computing, data owners are motivated to outsource their complex data management systems from local sites to the commercial.
TRUST : Team for Research in Ubiquitous Secure Technology National Science Foundation Site Visit February 24-26, 2009 │Berkeley, California Health Infrastructures.
1 1 Securing (Accountability for) Cloud Content Peter McGoff – SVP and General Counsel.
CLOUDS. Online applications What is cloud computing Common, Location-independent, Online Utility on Demand Common implies multi-tenancy, not single or.
Web Information Retrieval Prof. Alessandro Agostini 1 Context in Web Search Steve Lawrence Speaker: Antonella Delmestri IEEE Data Engineering Bulletin.
How Will Applications Drive Future Data-Intensive Systems? Data-Intensive Computing Workshop Applications Break-Out Session.
Security Distributed Systems Lecture # 14. Why care about security? Authentication Use another person’s ID for sending Non-repudiation E-commerce.
System Development & Operations NSF DataNet site visit to MIT February 8, /8/20101NSF Site Visit to MIT DataSpace DataSpace.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
1 Privacy and Accountability: Introduction to Workshop Themes JOAN FEIGENBAUM June 28, 2006; Cambridge MA.
Computer Policy and Security Report to Faculty Council Jeanne Smythe ATN Director for Computing Policy March 26,2004.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
SharePoint and Active Directory Update March 18, 2010.
Some Great Open Source Intrusion Detection Systems (IDSs)
CMSC 818J: Privacy enhancing technologies Lecture 2.
Clouding with Microsoft Azure
Going to the Cloud Classrooms
Educause/Internet 2 Computer and Network Security Task Force
Data and Applications Security
Securing Information Systems
TECHjOSH.COM TechJosh.com.
BIS 221 MENTOR Perfect Education/ bis221mentor.com.
Richard Purcell Corporate Privacy Officer Microsoft Corporation
LM 8 Data Administration & Database Administration
Marketing Operations Leverages Scalable and Secure Machine Learning, Big Data from Azure “We deal with large streams of sensitive data from our users,
PBKM: A Secure Knowledge Management Framework
Identity and Trust Management Platform in DICOM
The MobileIron® Threat Detection difference:
Data and Applications Security Developments and Directions
Data and Applications Security
Data and Applications Security
Data and Applications Security
Presentation transcript:

1 WRAP UP Joan Feigenbaum PORTIA Project Site Visit Stanford CA, May 12-13, 2005

2 Benefits of a Large-ITR Grant Very high levels of Inter-institutional collaboration Inter-disciplinarity Visibility and outreach Integration of research and education Public service by PIs

3 Accomplishments Reported Today RW: PPDM and MDS algorithmics AB: Policy specification and enforcement DB: Browser-based ID protection HG: Retaining control of outsourced data JF: Highly collaborative education and outreach SF: Novel data representations AS: Domain-specific DB challenges HN: Novel conceptual framework

4 Other Highlights of the First 1.5 Years Search of access-controlled content Economic analysis of “trusted platforms” Provably secure query auditing Privacy in public databases BCC privacy violations in encrypted Cybercrime and cyberpolicing The world changed (e.g., wrt spam, NGSCB). 

5 The Powerful are Pessimistic “You already have zero privacy. Get over it!” – Scott McNealy, 1999 Microsoft Faculty Summit, August 2004 –Rick Rashid: People don’t even know what “privacy” means. –Bill Gates: Things are going to get worse. Google, Microsoft, and Yahoo! are all trying “to personalize search.”

6 Sample Highlights of the Next 3.5 Years (1) Work with more user communities on PPDM. –Genetics researchers (see Schäffer’s White Paper) –We could use help from NSF on this! Deal with adversarial behavior in massive-graph computations and massive-matrix computations. ?Computational realization of contextual integrity (or proof that there is none) Experimental analysis of “public-records” policies

7 Sample Highlights of the Next 3.5 Years (2) Privacy-preserving data cleaning Privacy-respecting personalized search ― Policy-driven search in a social network ― Enterprise-wide policy-driven search Countering emerging threats to identity protection (e.g., bot-nets) Compliance-testing tools ― Health data: HIPAA ― Financial data: SB1386, Sarbanes Oxley

8 Thank You for Your Attention THE END