Trust, Privacy, and Security - PowerPoint PPT Presentation

About This Presentation
Title:

Trust, Privacy, and Security

Description:

Bharat Bhargava1, Csilla Farkas2, and Leszek Lilien1 ... 5. Legal and Social Issues, and Forensics. Forensic data management (not only for cybercrimes) ... – PowerPoint PPT presentation

Number of Views:21
Avg rating:3.0/5.0
Slides: 9
Provided by: Gues438
Category:

less

Transcript and Presenter's Notes

Title: Trust, Privacy, and Security


1
Trust, Privacy, and Security
  • Moderator
  • Bharat Bhargava1
  • Coordinators
  • Bharat Bhargava1, Csilla Farkas2, and Leszek
    Lilien1
  • 1 Purdue University and 2 University of South
    Carolina

2
Major Research Directions
  • Terminology and Formalization of Security,
    Privacy, and Trust for Data and Applications
  • Metrics for Trust, Privacy, Risk, Threats
  • New Challenges in Open, Pervasive, and
    Heterogeneous Environments
  • Testbeds, Experiments, Benchmarks, and Assessment
  • Legal and Social Issues, and Forensics

3
1. Terminology and Formalization of Security,
Privacy, and Trust for Data and Applications
  • Ontologies for Security, Privacy, and Trust
  • Evidence, Credentials, Behavior
  • Personal Privacy vs. Organizational
    Confidentiality
  • Representations and Specifications
  • Policies
  • Conditions
  • Enforcement

4
2. Metrics for Trust, Privacy, Risk, Threats
  • Quantitative metrics like those in fault
    tolerance
  • Vulnerability analysis and threat evaluation
  • Metrics for trust negotiation and
    privacy-for-trust trade
  • Risk management
  • Economic analysis and tradeoffs and impact on
    community and society

5
3. New Challenges in Open,Pervasive, and
Heterogeneous Environs
  • Foundations and common understanding
  • Representation, visualization
  • Uniform framework for multiple organizational and
    multiple administrative domains
  • Conflict resolution and negotiation
  • Data integration
  • Aggregation and inference
  • Data access and dissemination, and Web services
  • Apoptosis (clean self-destruction) and
    evaporation
  • Data protection techniques distortion,
    summarization, encryption and key management,
    integrity validation
  • Limitations, incl. low power, small devices in
    mobile

6
4. Testbeds, Experiments, Benchmarks, and
Assessment
  • Security, attack, fraud benchmarks and scenarios
  • Help from community
  • Example IDS, attack benchmarks/scenarios
  • Tools for building benchmarks
  • Testbeds
  • Who builds it for public access?
  • Simulation models like ns2
  • Validation models like TREC (info retrieval)
  • Forming repositories of data sets and software

7
5. Legal and Social Issues, and Forensics
  • Forensic data management (not only for
    cybercrimes)
  • Authorization models for data capture, storing
    and processing
  • Legal evaluation of cyberattacks
  • Collaboration with legal/social scinces experts
  • Legal ontologies
  • Legal domains (incl. jurisdiction) and
    interoperation
  • E.g., what is trespassing in cyberspace?
  • Lawful responses and legal argumentation
  • Self-defense analogies

8
Research Synergies
  • Reliability
  • Economics
  • Semantic Web
  • Social Sciences and Law
Write a Comment
User Comments (0)
About PowerShow.com