PRIVACY, TRUST, and SECURITY Bharat Bhargava (moderator)

Slides:



Advertisements
Similar presentations
DG INFSO- Grid Research & Infrastructures: W. Boch, M. Campolargo 1 Delivery of Industrial-strength Grid Middleware: establishing an effective European.
Advertisements

Information Society Technologies Third Call for Proposals Norbert Brinkhoff-Button DG Information Society European Commission Key action III: Multmedia.
Jacques Bus, Head of Unit DG Information Society and Media EU-US Cooperation in Network and Information Security 17 Mar, 2008 – Yale, US.
Chart 1 C3 & IO Advanced Concepts SPARQLMotion for Distributed Network Ops John Carson, Lockheed Martin 2009 Semantic Technology.
NIST Big Data Public Working Group Security and Privacy Subgroup Presentation September 30, 2013 Arnab Roy, Fujitsu Akhil Manchanda, GE Nancy Landreville,
Federated Digital Rights Management Mairéad Martin The University of Tennessee TERENA General Assembly Meeting Prague, CZ October 24, 2002.
Towards trustworthy ICT service infrastructures Yves PAINDAVEINE Directorate General Information Society and Media Unit F5 Security European Commission.
Open Workshop on e-Infrastructures, Helsinki October 4 – 5, 2006 Roadmap Parallel Session on last chapter of e-IRG Roadmap: Crossing the Boundaries of.
Some contributions to the management of data in grids Lionel Brunie National Institute of Applied Science (INSA) LIRIS Laboratory/DRIM Team – UMR CNRS.
ASNA Architecture and Services of Network Applications Research overview and opportunities L. Ferreira Pires.
Trust, Privacy, and Security Moderator: Bharat Bhargava Purdue University.
Trust, Privacy, and Security Moderator: Bharat Bhargava 1 Coordinators: Bharat Bhargava 1, Csilla Farkas 2, and Leszek Lilien 1 1 Purdue University and.
Remarks: Roadmapping and Hard Problems Sally E. Howe, Ph.D. Associate Director National Coordination Office for Networking and Information Technology Research.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Secure Knowledge Management: and.
E-Commerce: Regulatory, Ethical, and Social Environments
A Survey of Mobile Phone Sensing Michael Ruffing CS 495.
An Analysis of Security and Privacy Issues in Smart Grid Software Architectures on Clouds Dresden, 22/05/2014 Felipe de Sousa Silva Simmhan, Kumnhare,
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
1 Identity and Transparency ( Bridging the GAPS of Governance Bridging the GAPS of Governance in eGov Initiatives in eGov Initiatives )‏ Badri Sriraman.
Un peu de recherche…. 2 LIRIS/DCS/DRIM 3 Nostalgia: an overview of the past 10 years Some contributions to the management of data in grids Some contributions.
Data Management Information Management Knowledge Management Data and Applications Security Challenges Bhavani Thuraisingham October 2006.
Olga E. SegouDr. Stelios C.A. Thomopoulos Integrated Systems.
Linked-data and the Internet of Things Payam Barnaghi Centre for Communication Systems Research University of Surrey March 2012.
Data and Applications Security Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #1 Introduction to Data and Applications Security August.
Computer Science and Engineering 1 Information Assurance Research Department of Computer Science and Engineering University of South Carolina, Columbia.
Wireless Hotspots: Current Challenges and Future Directions CNLAB at KAIST Presented by An Dong-hyeok Mobile Networks and Applications 2005.
CLARIN work packages. Conference Place yyyy-mm-dd
Geneva, Switzerland, April 2012 Introduction to session 7 - “Advancing e-health standards: Roles and responsibilities of stakeholders” ​ Marco Carugi.
ICS (072)Database Systems: An Introduction & Review 1 ICS 424 Advanced Database Systems Dr. Muhammad Shafique.
Page 1 Alliver™ Page 2 Scenario Users Contents Properties Contexts Tags Users Context Listener Set of contents Service Reasoner GPS Navigator.
Weak AI: Can Machines Act Intelligently? Some things they can do: –Computer vision: face recognition from a large set –Robotics: autonomous (mostly) car.
IST Programme - Key Action III Semantic Web Technologies in IST Key Action III (Multimedia Content and Tools) Hans-Georg Stork CEC DG INFSO/D5
Introduction Infrastructure for pervasive computing has many challenges: 1)pervasive computing is a large aspect which includes hardware side (mobile phones,portable.
A Context Model based on Ontological Languages: a Proposal for Information Visualization School of Informatics Castilla-La Mancha University Ramón Hervás.
Grid Computing & Semantic Web. Grid Computing Proposed with the idea of electric power grid; Aims at integrating large-scale (global scale) computing.
1 Innovation in Services Business Service Design and Innovation Fostering the Economic and Legal Framework for Innovation Performance and Development of.
Semantic Gadgets Pervasive Computing Meets the Semantic Web Reza Zakeri Sharif University of Technology.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #1 Introduction to Data.
Jacques Bus Head of Unit, DG INFSO-F5 “Security” European Commission FP7 launch in the New Member States Regional on-line conference 22 January 2007 Objective.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #1 Introduction to Data and Applications Security and Digital Forensics.
Computer Science and Engineering 1 Mobile Computing and Security.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
Extracting value from grey literature Processes and technologies for aggregating and analysing the hidden Big Data treasure of the organisations.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Erik Jonsson School of Engineering and Computer Science The University of Texas at Dallas Cyber Security Research on Engineering Solutions Dr. Bhavani.
1 Abdul Waheed Khan Communication and Information Sector UNESCO Building Knowledge Societies.
Group D New Environments and Data Management System Issues.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #11 Secure Heterogeneous.
[ [ Inter-Trust Interoperable Trust Assurance Infrastructure Project Presentation.
Big Data Security and Privacy
Data and Applications Security
Update from the Faster Payments Task Force
Testbed for Medical Cyber-Physical Systems
Julia Lane New York University
Data and Applications Security Developments and Directions
Data and Applications Security
Data Quality: Practice, Technologies and Implications
E-Commerce: Regulatory, Ethical, and Social Environments
NSF CSR PI Meeting Breakout Session: Integrated Networked Systems and Internet of Things Saurabh Bagchi Purdue University.
PLUG-N-HARVEST ID: H2020-EU
Trends and developments in eGOVwork – a resesearch perspective
Online Learning.
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security
Data and Applications Security
Data at the Speed of Trust:
Data and Applications Security
Presentation transcript:

PRIVACY, TRUST, and SECURITY Bharat Bhargava (moderator)

IDM Workshop 2003 Aim of Discussion Motivation Motivation  Interests of the participants  Research opportunities Themes Themes  Research challenges and new directions for the IDM community  Categorize and prioritize Formulate recommendations Formulate recommendations

IDM Workshop 2003 Preliminaries Privacy Security Trust Applications Policy making Formal models Negotiation Network security Anonymity Access control Semantic web security Encryption Information hiding Data mining System monitoring Computer epidemic Data provenance Fraud Biometrics

IDM Workshop 2003 Privacy What is it and why do we need it? What is it and why do we need it? Challenges for data management Challenges for data management  Policies:  Requirement analysis, stakeholder analysis  Primary and secondary use of information  Digital rights management (DRM)  Technologies:  Anonymity/accountability  Privacy preserving data mining and querying  Web monitoring and inferencing  Incorrect data  personal harm (monitoring the monitor)

IDM Workshop 2003 Privacy Recommendations Metrics for personal data usage Metrics for personal data usage  Who, how, what, how long?  Individual’s rights to personal data (licensing?) Public acceptance and enforcement issues Public acceptance and enforcement issues Metrics and methods of accuracy measurements for information extraction Metrics and methods of accuracy measurements for information extraction Monitoring privacy aspects of data integration Monitoring privacy aspects of data integration Social and ethical paradigms Social and ethical paradigms Tools for policy validation Tools for policy validation Other Other

IDM Workshop 2003 Trust Why do we need trust? Enable collaboration/communication Social paradigm: small village  big city Dynamic and open environments

IDM Workshop 2003 Trust Challenges How to initiate and build trust? Formal models Type of trust: data, users, system components Context dependent, bi-directional, asymmetric Direct evidence and second-hand recommendations

IDM Workshop 2003 Trust Challenges cont. Trust maintenance Data collection Accountability/evaluation Abuse prevention/revocation User motivation Fraud Formal models Models, tools, and methodsModels, tools, and methods Prevention/detection Scalability/performance/economics

IDM Workshop 2003 Trust Recommendations Build scalable and adaptable trust infrastructure Build scalable and adaptable trust infrastructure  Gain insight from different applications  Dynamic trust  Build interoperable tools  Standards Ethical, social, and legal issues Ethical, social, and legal issues  Human-centered  System-centered Use of social paradigms Use of social paradigms Applications for homeland security, government, industry, other Applications for homeland security, government, industry, other

IDM Workshop 2003 Security Security research for IDM community Security research for IDM community Information Security: protecting information Information Security: protecting information Security Information: managing security-related data Research directions: Research directions:  Pervasive environments  Semantic-aware applications  Large-scale integration  Inference control  Vulnerability and threat analysis  Large-scale monitoring and data analysis  Intruder detection and identification  Managing data for physical security Tradeoffs Tradeoffs

IDM Workshop 2003 Security Recommendations Emerging technologies Emerging technologies  Sensor information management  Multimedia data security  Context-aware applications  Data and Web mining  Mobile, wireless, and ad hoc computing  Semantic Web  Other

IDM Workshop 2003 Security Recommendations cont. Modeling and design for security Modeling and design for security  Levels of security  Quality of service/service level agreement  Real time constraints  Inference control Information integration Information integration  Security issues in information integration  Integration of security relevant data  Heterogeneous framework  Task specific  Privacy  Correctness of method

IDM Workshop 2003 Concluding Remarks Tradeoffs Tradeoffs  Performance vs. security/privacy/trust  Cost and functionality vs. security/privacy/trust  Monitoring and mining vs. security/privacy  Other Policies, regulations, technologies Policies, regulations, technologies  Flexible policies  Data management  Collection, usage, dissemination, sharing, other  Domain and application specific  Commercial, government, medical, e-commerce, other Economic models for security/privacy/trust Economic models for security/privacy/trust Legal and social aspects Legal and social aspects

IDM Workshop 2003 Motto of the day Any data management issue is a security issue!