Download PRIVACY, TRUST, and SECURITY

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
PRIVACY, TRUST, and
SECURITY
Bharat Bhargava (moderator)
Aim of Discussion



Motivation
 Interests of the participants
 Research opportunities
Themes
 Research challenges and new directions for the
IDM community
 Categorize and prioritize
Formulate recommendations
IDM Workshop 2003
Preliminaries
Fraud
Information hiding
Privacy
Network security
Access control
Applications
Data provenance
Semantic web security
Data mining
Negotiation
Security
Trust
Computer epidemic
Policy making
Biometrics
Encryption
Anonymity
System monitoring
Formal models
IDM Workshop 2003
Privacy


What is it and why do we need it?
Challenges for data management


Policies:
 Requirement analysis, stakeholder analysis
 Primary and secondary use of information
 Digital rights management (DRM)
Technologies:
 Anonymity/accountability
 Privacy preserving data mining and querying
 Web monitoring and inferencing
 Incorrect data  personal harm (monitoring the monitor)
IDM Workshop 2003
Privacy Recommendations

Metrics for personal data usage








Who, how, what, how long?
Individual’s rights to personal data (licensing?)
Public acceptance and enforcement issues
Metrics and methods of accuracy measurements
for information extraction
Monitoring privacy aspects of data integration
Social and ethical paradigms
Tools for policy validation
Other
IDM Workshop 2003
Trust
• Why do we need trust?
• Enable collaboration/communication
• Social paradigm: small village  big city
• Dynamic and open environments
IDM Workshop 2003
Trust Challenges
• How to initiate and build trust?
• Formal models
• Type of trust: data, users, system components
• Context dependent, bi-directional, asymmetric
• Direct evidence and second-hand
recommendations
IDM Workshop 2003
Trust Challenges cont.
• Trust maintenance
• Data collection
• Accountability/evaluation
• Abuse prevention/revocation
• User motivation
• Fraud
• Formal models
• Models, tools, and methods
• Prevention/detection
• Scalability/performance/economics
IDM Workshop 2003
Trust Recommendations




Build scalable and adaptable trust infrastructure
 Gain insight from different applications
 Dynamic trust
 Build interoperable tools
 Standards
Ethical, social, and legal issues
 Human-centered
 System-centered
Use of social paradigms
Applications for homeland security, government, industry,
other
IDM Workshop 2003
Security



Security research for IDM community
Information Security: protecting information
Security Information: managing security-related data
Research directions:









Pervasive environments
Semantic-aware applications
Large-scale integration
Inference control
Vulnerability and threat analysis
Large-scale monitoring and data analysis
Intruder detection and identification
Managing data for physical security
Tradeoffs
IDM Workshop 2003
Security Recommendations

Emerging technologies







Sensor information management
Multimedia data security
Context-aware applications
Data and Web mining
Mobile, wireless, and ad hoc computing
Semantic Web
Other
IDM Workshop 2003
Security Recommendations cont.

Modeling and design for security





Levels of security
Quality of service/service level agreement
Real time constraints
Inference control
Information integration
 Security issues in information integration
 Integration of security relevant data




Heterogeneous framework
Task specific
Privacy
Correctness of method
IDM Workshop 2003
Concluding Remarks

Tradeoffs
 Performance vs. security/privacy/trust
 Cost and functionality vs. security/privacy/trust
 Monitoring and mining vs. security/privacy
 Other
Policies, regulations, technologies
 Flexible policies
 Data management
 Collection, usage, dissemination, sharing, other
 Domain and application specific
 Commercial, government, medical, e-commerce, other

Economic models for security/privacy/trust

Legal and social aspects

IDM Workshop 2003
Motto of the day
Any data management issue
is a security issue!
IDM Workshop 2003
Related documents