tailieunhanh - Computer Security: Chapter 11 - Private and Trusted Interactions
Computer Security: Chapter 11 - Private and Trusted Interactions includes Assuring privacy in data dissemination, Privacy-trust tradeoff, Privacy metrics, Example applications to networks and e-commerce, Prototype for experimental studies. | 11. Private and Trusted Interactions* Bharat Bhargava Department of Computer Sciences, CERIAS† and CWSA‡ Purdue University in collaboration with Prof. Leszek Lilien (Western Michigan University and CERIAS) Prof. Dongyan Xu (Purdue University and CERIAS) and . students and postdocs in the Raid Lab * Supported in part by NSF grants IIS-0209059, IIS-0242840, ANI-0219110, and Cisco URP grant. More grants are welcomed! † Center for Education and Research in Information Assurance and Security ‡ Center for Wireless Systems and Applications Motivation Sensitivity of personal data [Ackerman et al. ‘99] 82% willing to reveal their favorite TV show Only 1% willing to reveal their SSN Business losses due to privacy violations Online consumers worry about revealing personal data This fear held back $15 billion in online revenue in 2001 Federal Privacy Acts to protect privacy ., Privacy Act of 1974 for federal agencies Still many examples of privacy violations even by federal agencies JetBlue Airways revealed travellers’ data to federal gov’t ., Health Insurance Portability and Accountability Act of 1996 (HIPAA) 3/23/04 Privacy and Trust Privacy Problem Consider computer-based interactions From a simple transaction to a complex collaboration Interactions involve dissemination of private data It is voluntary, “pseudo-voluntary,” or required by law Threats of privacy violations result in lower trust Lower trust leads to isolation and lack of collaboration Trust must be established Data – provide quality an integrity End-to-end communication – sender authentication, message integrity Network routing algorithms – deal with malicious peers, intruders, security attacks 3/23/04 Fundamental Contributions Provide measures of privacy and trust Empower users (peers, nodes) to control privacy in ad hoc environments Privacy of user identification Privacy of user movement Provide privacy in data dissemination Collaboration Data warehousing . | 11. Private and Trusted Interactions* Bharat Bhargava Department of Computer Sciences, CERIAS† and CWSA‡ Purdue University in collaboration with Prof. Leszek Lilien (Western Michigan University and CERIAS) Prof. Dongyan Xu (Purdue University and CERIAS) and . students and postdocs in the Raid Lab * Supported in part by NSF grants IIS-0209059, IIS-0242840, ANI-0219110, and Cisco URP grant. More grants are welcomed! † Center for Education and Research in Information Assurance and Security ‡ Center for Wireless Systems and Applications Motivation Sensitivity of personal data [Ackerman et al. ‘99] 82% willing to reveal their favorite TV show Only 1% willing to reveal their SSN Business losses due to privacy violations Online consumers worry about revealing personal data This fear held back $15 billion in online revenue in 2001 Federal Privacy Acts to protect privacy ., Privacy Act of 1974 for federal agencies Still many examples of privacy violations even
đang nạp các trang xem trước