Download Tim Finin - APAN Community

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
Managing the Assured
Information Sharing Lifecycle
Tim Finin
University of Maryland,
Baltimore County
7 August 2013
discover
acquire
use
2008 MURI project
University of Maryland, Baltimore County
T. Finin (PI), A. Joshi, H. Kargupta, A. Sherman, Y. Yesha
Purdue University
E. Bertino (CO-PI), N. Li, C. Clifton, E. Spafford
University of Texas at Dallas
M. Kantarcioglu (CO-PI), B. Thuraisingham, L. Khan, A. Bensoussan, N. Berg
University of Illinois at Urbana Champaign
J. Han (CO-PI), C. Zhai
University of Texas at San Antonio
R. Sandhu (CO-PI), J. Massaro, S. Xu
University of Michigan
L. Adamic (CO-PI)
Scientific Objectives
• Better understand the barriers preventing
people and organizations from sharing
information with appropriate constraints on
security, privacy and quality
• Design and develop new mechanisms and
techniques to eliminate or reduce those
barriers
• Prototype components and systems embodying these ideas and evaluate the results
Our approach and research themes
• An information value chain of producers and
consumers yields an assured information sharing
lifecycle to be managed
• Policies for data access, use and trust grounded in
shared semantic models operating in a distributed
architecture accelerate information sharing
• New discovery, integration and data mining
techniques are required to assure information
quality and privacy
• Modeling, analyzing and exploiting social networks
and incentives for sharing increase effectiveness
Morning Presentations
09:00−09:15 AISL Overview, Tim Finin, UMBC
09:15−10:00 Constructing Trusted Heterogeneous Social &
Information Networks through Data Mining,
Jiawei Han, Illinois
10:00−10:30 Differentially Private Association Rule Mining,
Chris Clifton, Purdue
10:30−11:00 Managing Shared Information: Statistical Methods
for Validating, Integrating, and Analyzing Text Data
from Multiple Sources, ChengXiang Zhai, Illinois
11:00−11:30 Access control policy specification for information
sharing, Ninghui Li, Purdue
11:30−12:00 Cybersecurity Dynamics, Shouhuai Xu, UTSA
Afternoon Presentations
12:00−13:30 Lunch
13:30−13:50 Context-Aware Privacy Policies in Mobile
Computing, Tim Finin, UMBC
13:50−14:15 Situational Awareness for Intrusion Detection
Systems, Tim Finin, UMBC
14:15−15:00 Incentive-compatible Assured Information Sharing,
Murat Kantarcioglu, UTD
15:00−15:30 Patterns and properties in large-scale information
networks, Edwin (Chun-Yuen) Teng, Michigan
Motivation
• 9/11 and related events illustrated problems
in managing sensitive information
• Managing Web information & services with
appropriate security, privacy and simplicity is
increasingly important and challenging
• Autonomous devices (mobile phones, routers & medical equipment) need access too
• Moving to EMRs is a national goal, but
raises many privacy issues
• Business needs better models for DRM
6/12/08
6
Need to Know, Need to Share
• Traditional information security frameworks are based on “need to know”
Unless you can prove that you have
a prearranged right to access this
information, you can’t have it
• The 9/11 commission recommended
moving from this to “need to share”
I think this information may be important
for you to accomplish your mission and
would like to discuss sharing it with you
6/12/08
7
What’s changed in five years?
• The memories of 9/11 are less strong
This year’s college freshmen were in the first grade
when the towers fell
• Concern about loss of privacy has increased
Government data collection is a issue this summer,
but every company on the planet is collecting and
using vast amounts of data on us all
• Cybersecurity is a real and growing worry
• Mobile and social computing have expanded
and generate huge amounts of data on us all
What should we do for the next five?
• Make progress on privacy preserving data
sharing and analysis
• Put better controls for data sharing into the
hands of consumers and software users
• Explore incentive structures for companies to
accumulate less data about us all
• Make public data easier to share and use by
promoting semantic technologies
• Enhance cybersecurity to protect our data
from attackers
Our MURI themes are still sound
• Assured information sharing in open, heterogeneous, distributed environments is increasingly
important
• New policy frameworks and languages can help
• Semantic Web technologies share common policy
concepts, policies & domain models
• Data quality and privacy-preserving techniques
must be addressed
• Social aspects are important: networks, incentives
• http://aisl.umbc.edu/ for more information