PRIVACY, TRUST, and SECURITY - PowerPoint PPT Presentation

About This Presentation
Title:

PRIVACY, TRUST, and SECURITY

Description:

System monitoring. Computer epidemic. Data provenance. Fraud. Biometrics. IDM Workshop 2003 ... Monitoring privacy aspects of data integration. Social and ... – PowerPoint PPT presentation

Number of Views:322
Avg rating:3.0/5.0
Slides: 15
Provided by: Fark8
Category:

less

Transcript and Presenter's Notes

Title: PRIVACY, TRUST, and SECURITY


1
PRIVACY, TRUST, and SECURITY
  • Bharat Bhargava (moderator)

2
Aim of Discussion
  • Motivation
  • Interests of the participants
  • Research opportunities
  • Themes
  • Research challenges and new directions for the
    IDM community
  • Categorize and prioritize
  • Formulate recommendations

3
Preliminaries
Fraud
Information hiding
Privacy
Negotiation
Network security
Access control
Applications
Data provenance
Biometrics
Semantic web security
Security
Trust
Data mining
Encryption
Computer epidemic
Anonymity
Policy making
Formal models
System monitoring
4
Privacy
  • What is it and why do we need it?
  • Challenges for data management
  • Policies
  • Requirement analysis, stakeholder analysis
  • Primary and secondary use of information
  • Digital rights management (DRM)
  • Technologies
  • Anonymity/accountability
  • Privacy preserving data mining and querying
  • Web monitoring and inferencing
  • Incorrect data ? personal harm (monitoring the
    monitor)

5
Privacy Recommendations
  • Metrics for personal data usage
  • Who, how, what, how long?
  • Individuals rights to personal data (licensing?)
  • Public acceptance and enforcement issues
  • Metrics and methods of accuracy measurements for
    information extraction
  • Monitoring privacy aspects of data integration
  • Social and ethical paradigms
  • Tools for policy validation
  • Other

6
Trust
  • Why do we need trust?
  • Enable collaboration/communication
  • Social paradigm small village ? big city
  • Dynamic and open environments

7
Trust Challenges
  • How to initiate and build trust?
  • Formal models
  • Type of trust data, users, system components
  • Context dependent, bi-directional, asymmetric
  • Direct evidence and second-hand recommendations

8
Trust Challenges cont.
  • Trust maintenance
  • Data collection
  • Accountability/evaluation
  • Abuse prevention/revocation
  • User motivation
  • Fraud
  • Formal models
  • Models, tools, and methods
  • Prevention/detection
  • Scalability/performance/economics

9
Trust Recommendations
  • Build scalable and adaptable trust infrastructure
  • Gain insight from different applications
  • Dynamic trust
  • Build interoperable tools
  • Standards
  • Ethical, social, and legal issues
  • Human-centered
  • System-centered
  • Use of social paradigms
  • Applications for homeland security, government,
    industry, other

10
Security
  • Security research for IDM community
  • Information Security protecting information
  • Security Information managing security-related
    data
  • Research directions
  • Pervasive environments
  • Semantic-aware applications
  • Large-scale integration
  • Inference control
  • Vulnerability and threat analysis
  • Large-scale monitoring and data analysis
  • Intruder detection and identification
  • Managing data for physical security
  • Tradeoffs

11
Security Recommendations
  • Emerging technologies
  • Sensor information management
  • Multimedia data security
  • Context-aware applications
  • Data and Web mining
  • Mobile, wireless, and ad hoc computing
  • Semantic Web
  • Other

12
Security Recommendations cont.
  • Modeling and design for security
  • Levels of security
  • Quality of service/service level agreement
  • Real time constraints
  • Inference control
  • Information integration
  • Security issues in information integration
  • Integration of security relevant data
  • Heterogeneous framework
  • Task specific
  • Privacy
  • Correctness of method

13
Concluding Remarks
  • Tradeoffs
  • Performance vs. security/privacy/trust
  • Cost and functionality vs. security/privacy/trust
  • Monitoring and mining vs. security/privacy
  • Other
  • Policies, regulations, technologies
  • Flexible policies
  • Data management
  • Collection, usage, dissemination, sharing, other
  • Domain and application specific
  • Commercial, government, medical, e-commerce,
    other
  • Economic models for security/privacy/trust
  • Legal and social aspects

14
Motto of the day
  • Any data management issue
  • is a security issue!
Write a Comment
User Comments (0)
About PowerShow.com