Presentation on theme: "1 Education and Outreach in the PORTIA Project Joan Feigenbaum PORTIA Project Site Visit Stanford CA, May 12-13, 2005."— Presentation transcript:
1 Education and Outreach in the PORTIA Project Joan Feigenbaum PORTIA Project Site Visit Stanford CA, May 12-13, 2005
2 PORTIA Research Goals Integrate relevant research communities that had been working separately on how to handle massive, sensitive data sets. Integrate researchers with user communities. Broaden and deepen understanding of the rights and responsibilities of data users, data owners, data subjects, and other stakeholders. These are also the PORTIA goals for education and outreach!
3 Educational and Outreach Activities Mentoring students and postdocs Developing and teaching courses Running workshops Professional service
4 Mentors from Different Institutions (1) Privacy-preserving survey computation –Students: R. Ryger and F. Saint-Jean –Mentors: J. Feigenbaum (Yale) and B. Pinkas (HP) –Additional input from Computing Research Association Identity protection –Students: B. Ross, C. Jackson, R. Ladesma, N. Miyake, and Y. Teraguchi –Mentors: D. Boneh and J. Mitchell (Stanford) T. Pageler (Secret Service) Contextual integrity of the US Census –Student: T. Weber –Mentors: H. Nissenbaum (NYU) and S. Hawala (Census Bureau)
5 Mentors from Different Institutions (2) Privacy-preserving Bayes-net construction –Students: O. Kardes and R. Ryger –Mentors: J. Feigenbaum (Yale) and R. Wright (Stevens) Contextual integrity in vehicle-safety communication –Student: H. Shacham and M. Zimmer –Mentors: H. Nissenbaum (NYU) and D. Boneh (Stanford) –Additional input from the automotive industry Database engines for biosciences –Students: J. Corwin and S. Yadlapalli –Mentors: A. Silberschatz (Yale) and P. Miller (Yale Med. School) At least a dozen such examples so far
6 Flow of Students and Postdocs Sheng Zhong: Yale Stevens Jian Zhang: Yale Stanford Fernando Esponda: UNM Yale Vijay Ramachandran: Yale Stevens Collin Jackson: Yale CDT Stanford Nimrod Kozlovski: Yale Law Yale CS Visits to universities, past and future, by people from CDT, EPIC, Microsoft, and HP Labs
7 Statistics on Students and Postdocs 9 supported MS students, 5 supported postdocs, 29 supported PhD students, and 6 undergrads Intellectual synergy: Several other related, pre- existing grants are supporting PhD students who are collaborating with PORTIA participants. These students include P. Ganesan, F. Saint-Jean, and R. Ryger (see posters). 4 PhD Theses completed thus far; at least 7 more anticipated in Many details are available on the PORTIA education page. Note strong participation by members of under-represented groups.
8 Novel Courses and Seminars (1) “Sensitive Information in a Wired World: A Legal Perspective on the PORTIA Project” –Yale Law School and CS Dept. –Interdisciplinary seminar on PORTIA themes “Privacy in a Networked World” –Stevens Institute of Technology –A course on both technical and policy issues, aimed at CS students “Values Embodied in Information and Communication Technologies” –New York University –A course on both technical and policy issues, aimed at Culture and Communication students and CS students “Stanford Security Seminar” –Aimed at communication between “Stanford and the Outside World” “A Study of Perturbation Techniques for Data Privacy” –Stanford course taught by C. Dwork (MS), N. Mishra (HP), and K. Nissim (MS)
9 Novel Courses and Seminars (2) 20 courses and seminars, many developed explicitly for the PORTIA project. Syllabi are available on the PORTIA education page. They exemplify PORTIA’s integrative approach to research, education, and outreach. Byproducts of these courses include white papers, lecture notes, and expository papers (e.g., on P3P, privacy legislation, spam legislation, sensitive financial information, etc.) suitable for a general audience. See postings on: –Expository publications page –Social, legal, and philosophical publications page –“Newcomers” page (reachable from Overview)
10 PORTIA Workshops (1) Past –Privacy-preserving data mining (March 2004, Rutgers, co-sponsored by DIMACS) –Sensitive data in medical, financial, and content-distribution systems (July 2004, Stanford) –Cryptography: Theory meets practice (October 2004, Rutgers, co-sponsored by DIMACS) Future –Trustworthy interfaces for passwords and personal information (June 2005, Stanford) –Japan-US workshop on critical-information infrastructure protection (June 2005, Tokyo) –Values in computer and information system design (August 2005, Santa Clara Univ.)
11 PORTIA Workshops (2) Workshop reports, programs, talk abstracts, and slides are available through the PORTIA Sponsored-Events page. Some reports include lists of open problems. Byproducts include good expository material on some important PORTIA themes, including identity theft, HIPAA, privacy-enhancing technologies in health care, and the use of “trusted systems” for privacy protection. See “newcomers” page. PPDM workshop has fostered collaboration with the Statistics community. MFCD workshop crystallized a new research problem: “group privacy.” –Opposite of the “census problem” –Inspired by airline-passenger privacy flap –Progress since the workshop by V. Shmatikov and A. Narayanan
12 Professional Service (1) (beyond PCs and journals) 8 NSF proposal-evaluation panels External advisory-board member for CENS, an NSF S&T Center Participation in NSF’s PI meetings for the ITR and Cyber Trust programs, in an NSF Workshop on Cyberinfrastructure for the Social Sciences, and in an NSF/Japan Workshop on Critical Information- Infrastructure Protection Membership in the US Secret Service’s San Francisco Electronic-Crimes Task Force (Director’s Award to PORTIA PI John Mitchell)
13 Professional Service (2) DHS Study Group on ID Theft DARPA ISAT Study Group on “the Network as Economy” and DARPA independent-evaluation team for Self-Regenerating Systems 2 CSTB members; 1 CSTB Study-committee member (e-voting) ACM Committee on voter-registration databases
14 Professional Service (3) US Treasury Dept. Workshop on Resilient Financial Information Systems Invited address to NAS on “The Use of Commercial Databases for National Security”