Download presentation
Presentation is loading. Please wait.
1
PRIVACY, TRUST, and SECURITY Bharat Bhargava (moderator)
2
IDM Workshop 2003 Aim of Discussion Motivation Motivation Interests of the participants Research opportunities Themes Themes Research challenges and new directions for the IDM community Categorize and prioritize Formulate recommendations Formulate recommendations
3
IDM Workshop 2003 Preliminaries Privacy Security Trust Applications Policy making Formal models Negotiation Network security Anonymity Access control Semantic web security Encryption Information hiding Data mining System monitoring Computer epidemic Data provenance Fraud Biometrics
4
IDM Workshop 2003 Privacy What is it and why do we need it? What is it and why do we need it? Challenges for data management Challenges for data management Policies: Requirement analysis, stakeholder analysis Primary and secondary use of information Digital rights management (DRM) Technologies: Anonymity/accountability Privacy preserving data mining and querying Web monitoring and inferencing Incorrect data personal harm (monitoring the monitor)
5
IDM Workshop 2003 Privacy Recommendations Metrics for personal data usage Metrics for personal data usage Who, how, what, how long? Individual’s rights to personal data (licensing?) Public acceptance and enforcement issues Public acceptance and enforcement issues Metrics and methods of accuracy measurements for information extraction Metrics and methods of accuracy measurements for information extraction Monitoring privacy aspects of data integration Monitoring privacy aspects of data integration Social and ethical paradigms Social and ethical paradigms Tools for policy validation Tools for policy validation Other Other
6
IDM Workshop 2003 Trust Why do we need trust? Enable collaboration/communication Social paradigm: small village big city Dynamic and open environments
7
IDM Workshop 2003 Trust Challenges How to initiate and build trust? Formal models Type of trust: data, users, system components Context dependent, bi-directional, asymmetric Direct evidence and second-hand recommendations
8
IDM Workshop 2003 Trust Challenges cont. Trust maintenance Data collection Accountability/evaluation Abuse prevention/revocation User motivation Fraud Formal models Models, tools, and methodsModels, tools, and methods Prevention/detection Scalability/performance/economics
9
IDM Workshop 2003 Trust Recommendations Build scalable and adaptable trust infrastructure Build scalable and adaptable trust infrastructure Gain insight from different applications Dynamic trust Build interoperable tools Standards Ethical, social, and legal issues Ethical, social, and legal issues Human-centered System-centered Use of social paradigms Use of social paradigms Applications for homeland security, government, industry, other Applications for homeland security, government, industry, other
10
IDM Workshop 2003 Security Security research for IDM community Security research for IDM community Information Security: protecting information Information Security: protecting information Security Information: managing security-related data Research directions: Research directions: Pervasive environments Semantic-aware applications Large-scale integration Inference control Vulnerability and threat analysis Large-scale monitoring and data analysis Intruder detection and identification Managing data for physical security Tradeoffs Tradeoffs
11
IDM Workshop 2003 Security Recommendations Emerging technologies Emerging technologies Sensor information management Multimedia data security Context-aware applications Data and Web mining Mobile, wireless, and ad hoc computing Semantic Web Other
12
IDM Workshop 2003 Security Recommendations cont. Modeling and design for security Modeling and design for security Levels of security Quality of service/service level agreement Real time constraints Inference control Information integration Information integration Security issues in information integration Integration of security relevant data Heterogeneous framework Task specific Privacy Correctness of method
13
IDM Workshop 2003 Concluding Remarks Tradeoffs Tradeoffs Performance vs. security/privacy/trust Cost and functionality vs. security/privacy/trust Monitoring and mining vs. security/privacy Other Policies, regulations, technologies Policies, regulations, technologies Flexible policies Data management Collection, usage, dissemination, sharing, other Domain and application specific Commercial, government, medical, e-commerce, other Economic models for security/privacy/trust Economic models for security/privacy/trust Legal and social aspects Legal and social aspects
14
IDM Workshop 2003 Motto of the day Any data management issue is a security issue!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.