Date |
Paper |
Presenter |
Slides |
Sep 1 |
Introduction and Administrivia |
Apu Kapadia
|
|
Background: Privacy
|
|
Sep 8 |
Background: Security and Cryptography
|
Apu Kapadia
|
|
Untraceable electronic mail, return addresses,
and digital pseudonyms (presentation)
D. Chaum
Communications of the ACM, 1981 |
PDF |
Crowds: Anonymity for web transactions (discussion)
M. K. Reiter and A. D. Rubin
ACM Transactions on Information and System Security 1(1):66–92, November 1998
|
|
Sep 15 |
Tarzan: A Peer-to-Peer Anonymizing
Network Layer
M.J. Freedman, R.Morris
ACM CCS
2002
|
Shaun Deaton (presentation)
|
PDF |
An Analysis of the
Degradation of Anonymous Protocols
M.Wright, M.Adler, B.N.Levine,
C.Shields
NDSS 2002
|
Xiaoyong Zhou (discussion)
|
|
Mixminion: Design of a Type III Anonymous Remailer
Protocol G.Danezis, R.Dingledine,
N.Mathewson
IEEE Security & Privacy (Oakland)
2003
|
Chris Schneider (presentation)
|
PDF |
Tor: The Second-Generation Onion Router
Roger Dingledine, Nick Mathewson, and Paul Syverson
In the Proceedings of the 13th USENIX Security Symposium, August 2004
|
Naveed Alam (discussion)
|
|
Sep 22 |
Low-Cost Traffic Analysis of
Tor
S.J. Murdoch, G.Danezis, IEEE Security and Privacy (Oakland) 2005
|
Ali Khalfan (presentation)
|
PDF |
How Much Anonymity does Network Latency Leak?
Nicholas Hopper, Eugene Y. Vasserman, and Eric Chan-Tin
ACM Transactions on Information and System Security, forthcoming 2009
|
Emily Adams (discussion)
|
|
Nymble: Blocking Misbehaving Users in Anonymizing Networks
Patrick P. Tsang, Apu Kapadia, Cory Cornelius, and Sean W. Smith
To Appear in IEEE Transactions on Dependable and Secure Computing (TDSC)
|
Lusha Wang (presentation)
|
PDF |
The
Eternity Service
R.Anderson
Pragocrypt 1996
|
Mehool Intwala (discussion)
|
|
Sep 29 |
Freenet: A Distributed
Anonymous Information Storage and Retrieval System
I.Clarke, O.Sandberg, B.Wiley, T.W.
Hong
PET 2000 |
Nathan Husted (presentation)
|
PDF |
Publius: A robust, tamper-evident,
censorship-resistant and source-anonymous web publishing
system
M.Waldman, A.Rubin, L.Cranor
USENIX Security 2000 |
Moe Rafiuddin (discussion)
|
|
Tangler: a censorship-resistant
publishing system based on document entanglements
M.Waldman, D.Mazíeres,
ACM CCS 2001 |
Zhou Li (presentation)
|
PDF |
Censorship Resistance Revisited
Ginger Perng, Michael K. Reiter, and Chenxi Wang
Information Hiding Workshop (IH 2005) |
Asim Yuksel (discussion)
|
|
Oct 6 |
Project Proposal Presentations |
|
|
|
|
|
|
|
|
|
|
|
Oct 13 |
A
Taxonomy of Privacy
Daniel J. Solove
GWU Law School Public Law Research Paper No. 129
University of Pennsylvania Law Review, Vol. 154, No. 3, p. 477,
January 2006 |
Vaibhav Garg (presentation + discussion)
|
PDF |
Anonymity, Unlinkability, Undetectability, Unobservability,
Pseudonymity, and Identity Management —
A Consolidated Proposal for Terminology (alternate
link)
Pfitzmann, Hansen
TU Dresden |
Shirin Nilizadeh (presentation)
|
PDF |
I've
Got Nothing to Hide, and Other Misunderstandings of Privacy
Daniel J. Solove
George Washington University Law School, San Diego Law Review, Vol. 44, 2007 |
Mehool Intwala (discussion)
|
|
Oct 20 |
k-anonymity:
a model for protecting privacy
L. Sweeney
International Journal on
Uncertainty, Fuzziness and Knowledge-based Systems, 2002 |
Xiaoyong Zhou (presentation)
|
PDF |
l-diversity: Privacy beyond k-anonymity
Ashwin Machanavajjhala, Johannes Gehrke, Daniel Kifer, Muthuramakrishnan Venkitasubramaniam
ICDE 2006 |
Chris Schneider (discussion)
|
|
t-Closeness: Privacy Beyond k-Anonymity and l-Diversity
Ninghui Li, Tiancheng Li, and Suresh Venkatasubramanian
International Conference on Data Engineering (ICDE), April 2007 |
Ali Khalfan (discussion)
|
|
An Ad Omnia Approach to Defining and Achieving Private Data Analysis
Cynthia Dwork
Privacy, Security, and Trust in KDD (PinKDD), August 2007 |
Shaun Deaton (presentation)
|
PDF |
Oct 27 |
Forensic
genomics: kin privacy, driftnets and other open questions
Frank Stajano, Lucia Bianchi, Pietro Lio and Douwe Korff
WPES 2008 |
Moe Rafiuddin (discussion)
|
|
Resolving Individuals Contributing Trace Amounts of DNA to Highly Complex Mixtures Using High-Density SNP Genotyping Microarrays
Homer et al.
PLoS Genetics |
Zhou Li (discussion)
|
|
Learning Your Identity and Disease from Research Papers: Information Leaks in Genome Wide Association Study.
Rui Wang, Yong Li, XiaoFeng Wang, Haixu Tang, Xiaoyong Zhou
CCS 2009 |
Emily Adams (presentation)
|
PDF |
Nov 3 |
Information Revelation and Privacy in Online Social Networks
Ralph Gross and Alessandro Acquisti
WPES 2005 |
Lusha Wang (discussion)
|
|
Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography
Lars Backstrom, Cynthia Dwork, and Jon M. Kleinberg
WWW 2007 |
Shirin Nilizadeh (discussion)
|
|
Preserving Privacy in Social Networks against Neighborhood Attacks
B. Zhou and J. Pei
ICDE 2008 |
Naveed Alam (presentation)
|
PDF |
Nov 10 |
ACM CCS Conference, no class. Attend CCS or work on project and status report |
|
|
Nov 17 |
The EigenTrust Algorithm for Reputation Management in P2P
Networks
Sepandar D. Kamvar, Mario T. Schlosser, and
Hector Garcia-Molina
WWW 2003
|
Asim Yuksel (presentation)
|
PDF |
A Survey of Attack and Defense Techniques for Reputation Systems
Kevin Hoffman, David Zage, and Cristina Nita-Rotaru
ACM Computing Surveys, Volume 41, Issue 4, December 2009.
|
Shaun Deaton, Nathan Husted (discussion)
|
|
Nov 24 |
Developing Privacy Guidelines for Social Location
Disclosure Applications and Services
G. Iachello, I. Smith, S. Consolvo, M. Chen,
G.D. Abowd
SOUPS 2005
|
Lusha Wang (discussion)
|
|
Preserving Privacy in GPS Traces via Density-Aware
Path Cloaking
Baik Hoh, Marco Gruteser, Hui Xiong,
Ansaf Alrabady
CCS 2007 |
Zhou Li (discussion)
|
|
Virtual Walls: Protecting Digital Privacy in Pervasive Environments
Apu Kapadia, Tristan Henderson, Jeffrey J. Fielding, and David Kotz
PERVASIVE '07 |
Moe Rafiuddin (presentation)
|
PDF |
Dec 1 |
CCS overview, 1–3:45pm as usual
|
|
|
Securing Medical Records on Smart Phones
Ryan Gardner, Sujata Garera, Matthew Pagan Matthew Green, Aviel Rubin
SPIMACS '09
|
Mehool Intwala (presentation)
|
PDF |
Dec 8 |
Discussion, wrap-up, student feedback.
|
|
|
|
|
|
|
|
|
|
|
|
Dec 15 |
Final Project Presentations, 8–11am, Info East 122. |
|
|
|
|
|
|
|
|
|
|
|