Trust, Privacy, and Security Moderator: Bharat Bhargava 1 Coordinators: Bharat Bhargava 1, Csilla Farkas 2, and Leszek Lilien 1 1 Purdue University and.

Slides:



Advertisements
Similar presentations
Protection of Information Assets I. Joko Dewanto 1.
Advertisements

Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #26 Emerging Technologies.
A Public Policy Research Agenda in IST John W. Bagby Professor of IST Co-Dir. Inst. Info. Policy.
OPM Cybersecurity Competencies by Occupation (Technical Competencies) Information Technology Management Series Electronics Engineering.
1 Trust and Privacy in Authorization Bharat Bhargava Yuhui Zhong Leszek Lilien CERIAS Security Center CWSA Wireless Center Department of CS and ECE Purdue.
Trust, Privacy, and Security Moderator: Bharat Bhargava Purdue University.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Metrics for Evaluating ICEBERG ICEBERG Retreat Breakout Session Jan 11, 2000 Coordinators: Chen-Nee Chuah & Jimmy Shih.
Using Digital Credentials On The World-Wide Web M. Winslett.
COTS Based System Security Economics - A Stakeholder/Value Centric Approach Related tool demo session: COTS Based System Security Test-bed (Tiramisu) Tuesday.
PRIVACY, TRUST, and SECURITY Bharat Bhargava (moderator)
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Secure Knowledge Management: and.
LÊ QU Ố C HUY ID: QLU OUTLINE  What is data mining ?  Major issues in data mining 2.
Company Confidential How to implement privacy and security requirements in practice? Tobias Bräutigam, OTT Senior Legal Counsel, Nokia 8 October
Computer Science and Engineering 1 Csilla Farkas Associate Professor Center for Information Assurance Engineering Dept. of Computer Science and Engineering.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Thirteenth Lecture Hour 8:30 – 9:20 am, Sunday, September 16 Software Management Disciplines Process Automation (from Part III, Chapter 12 of Royce’ book)
GEM/IRDR Social Vulnerability and Resilience Information System and Metadata Portal IRDR Scientific Board Meeting Chengdu 03/11/2012.
General Key Management Guidance. Key Management Policy  Governs the lifecycle for the keying material  Hope to minimize additional required documentation.
Computer Science and Engineering 1 Service-Oriented Architecture Security 2.
Dependability in FP 6 Brian Randell Pisa Workshop, November 2002.
Data and Applications Security Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #1 Introduction to Data and Applications Security August.
Computer Science and Engineering 1 Information Assurance Research Department of Computer Science and Engineering University of South Carolina, Columbia.
Secure Sensor Data/Information Management and Mining Bhavani Thuraisingham The University of Texas at Dallas October 2005.
Privacy, Confidentiality, and Security Unit 8: Professional Values and Medical Ethics Lecture 2 This material was developed by Oregon Health & Science.
Dr. Bhavani Thuraisingham August 2006 Building Trustworthy Semantic Webs Unit #1: Introduction to The Semantic Web.
Welcome to Department of Computer and Systems Sciences – DSV.
FIDIS & PRIME Project Views SecurIST Inaugural Workshop Brussels, Kai Rannenberg Goethe University Frankfurt
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
1 Policy Types l Program l Issue Specific l System l Overall l Most Generic User Policies should be publicized l Internal Operations Policies should be.
CyberInfrastructure for Network Analysis Importance of, contributions by network analysis Transformation of NA Support needed for NA.
Scott Charney Cybercrime and Risk Management PwC.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #1 Biometrics and Other Emerging Technologies in Applications.
26/05/2005 Research Infrastructures - 'eInfrastructure: Grid initiatives‘ FP INFRASTRUCTURES-71 DIMMI Project a DI gital M ulti M edia I nfrastructure.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #1 Introduction to Data and Applications Security and Digital Forensics.
Computer Science and Engineering 1 Mobile Computing and Security.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Erik Jonsson School of Engineering and Computer Science The University of Texas at Dallas Cyber Security Research on Engineering Solutions Dr. Bhavani.
Big Data Analytics Are we at risk? Dr. Csilla Farkas Director Center for Information Assurance Engineering (CIAE) Department of Computer Science and Engineering.
Information Management System Ali Saeed Khan 29 th April, 2016.
Cloud Security Session: Introduction 25 Sep 2014Cloud Security, Kelsey1 David Kelsey (STFC-RAL) EGI-Geant Symposium Amsterdam 25 Sep 2014.
Agenda’s for Preservation Research Micah Altman MIT Libraries Prepared for SAA Research Forum Atlanta August 2016.
Horizon 2020 Secure Societies European Info Day and Brokerage Event
Data and Applications Security
Non-Traditional Databases
Data and Applications Security Developments and Directions
CSCE 548 Secure Software Development Use Cases Misuse Cases
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security
Adaptable safety and security in v2x systems
I have many checklists: how do I get started with cyber security?
Chapter 27 Security Engineering
Data and Applications Security Developments and Directions
AT2AI-4 Fourth International Symposium "From Agent Theory to Agent Implementation" An Ontological Approach to Harmonising Security Models for Open Services.
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Web Information Systems Engineering (WISE)
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Formalization of Trust, Fraud, and Vulnerability Analysis
Data and Applications Security
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Data and Applications Security
Presentation transcript:

Trust, Privacy, and Security Moderator: Bharat Bhargava 1 Coordinators: Bharat Bhargava 1, Csilla Farkas 2, and Leszek Lilien 1 1 Purdue University and 2 University of South Carolina

Major Research Directions 1.Terminology and Formalization of Security, Privacy, and Trust for Data and Applications 2.Metrics for Trust, Privacy, Risk, Threats 3.New Challenges in Open, Pervasive, and Heterogeneous Environments 4.Testbeds, Experiments, Benchmarks, and Assessment 5.Legal and Social Issues, and Forensics

1. Terminology and Formalization of Security, Privacy, and Trust for Data and Applications Ontologies for Security, Privacy, and Trust Ontologies for Security, Privacy, and Trust Evidence, Credentials, Behavior Evidence, Credentials, Behavior Personal Privacy vs. Organizational Confidentiality Personal Privacy vs. Organizational Confidentiality Representations and Specifications Representations and Specifications Policies Policies Conditions Conditions Enforcement Enforcement

2. Metrics for Trust, Privacy, Risk, Threats Quantitative metrics like those in fault tolerance Quantitative metrics like those in fault tolerance Vulnerability analysis and threat evaluation Vulnerability analysis and threat evaluation Metrics for trust negotiation and privacy-for- trust trade Metrics for trust negotiation and privacy-for- trust trade Risk management Risk management Economic analysis and tradeoffs and impact on community and society Economic analysis and tradeoffs and impact on community and society

3. New Challenges in Open, Pervasive, and Heterogeneous Environ’s Foundations and common understanding Foundations and common understanding Representation, visualization Representation, visualization Uniform framework for multiple organizational and multiple administrative domains Uniform framework for multiple organizational and multiple administrative domains Conflict resolution and negotiation Conflict resolution and negotiation Data integration Data integration Aggregation and inference Aggregation and inference Data access and dissemination, and Web services Data access and dissemination, and Web services Apoptosis (clean self-destruction) and evaporation Apoptosis (clean self-destruction) and evaporation Data protection techniques: distortion, summarization, encryption and key management, integrity validation Data protection techniques: distortion, summarization, encryption and key management, integrity validation Limitations, incl. low power, small devices in mobile Limitations, incl. low power, small devices in mobile

4. Testbeds, Experiments, Benchmarks, and Assessment Security, attack, fraud benchmarks and scenarios Security, attack, fraud benchmarks and scenarios Help from community Help from community Example: IDS, attack benchmarks/scenarios Example: IDS, attack benchmarks/scenarios Tools for building benchmarks Tools for building benchmarks Testbeds Testbeds Who builds it for public access? Who builds it for public access? Simulation models like ns2 Simulation models like ns2 Validation models like TREC (info retrieval) Validation models like TREC (info retrieval) Forming repositories of data sets and software Forming repositories of data sets and software

5. Legal and Social Issues, and Forensics Forensic data management (not only for cybercrimes) Forensic data management (not only for cybercrimes) Authorization models for data capture, storing and processing Authorization models for data capture, storing and processing Legal evaluation of cyberattacks Legal evaluation of cyberattacks Collaboration with legal/social scinces experts Collaboration with legal/social scinces experts Legal ontologies Legal ontologies Legal domains (incl. jurisdiction) and interoperation Legal domains (incl. jurisdiction) and interoperation E.g., what is “trespassing” in cyberspace? E.g., what is “trespassing” in cyberspace? Lawful responses and legal argumentation Lawful responses and legal argumentation “Self-defense” analogies “Self-defense” analogies

Research Synergies Reliability Reliability Economics Economics Semantic Web Semantic Web Social Sciences and Law Social Sciences and Law …