Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Managing the Assured Information Sharing Lifecycle Tim Finin University of Maryland, Baltimore County 7 August 2013 discover acquire use 2008 MURI project University of Maryland, Baltimore County T. Finin (PI), A. Joshi, H. Kargupta, A. Sherman, Y. Yesha Purdue University E. Bertino (CO-PI), N. Li, C. Clifton, E. Spafford University of Texas at Dallas M. Kantarcioglu (CO-PI), B. Thuraisingham, L. Khan, A. Bensoussan, N. Berg University of Illinois at Urbana Champaign J. Han (CO-PI), C. Zhai University of Texas at San Antonio R. Sandhu (CO-PI), J. Massaro, S. Xu University of Michigan L. Adamic (CO-PI) Scientific Objectives • Better understand the barriers preventing people and organizations from sharing information with appropriate constraints on security, privacy and quality • Design and develop new mechanisms and techniques to eliminate or reduce those barriers • Prototype components and systems embodying these ideas and evaluate the results Our approach and research themes • An information value chain of producers and consumers yields an assured information sharing lifecycle to be managed • Policies for data access, use and trust grounded in shared semantic models operating in a distributed architecture accelerate information sharing • New discovery, integration and data mining techniques are required to assure information quality and privacy • Modeling, analyzing and exploiting social networks and incentives for sharing increase effectiveness Morning Presentations 09:00−09:15 AISL Overview, Tim Finin, UMBC 09:15−10:00 Constructing Trusted Heterogeneous Social & Information Networks through Data Mining, Jiawei Han, Illinois 10:00−10:30 Differentially Private Association Rule Mining, Chris Clifton, Purdue 10:30−11:00 Managing Shared Information: Statistical Methods for Validating, Integrating, and Analyzing Text Data from Multiple Sources, ChengXiang Zhai, Illinois 11:00−11:30 Access control policy specification for information sharing, Ninghui Li, Purdue 11:30−12:00 Cybersecurity Dynamics, Shouhuai Xu, UTSA Afternoon Presentations 12:00−13:30 Lunch 13:30−13:50 Context-Aware Privacy Policies in Mobile Computing, Tim Finin, UMBC 13:50−14:15 Situational Awareness for Intrusion Detection Systems, Tim Finin, UMBC 14:15−15:00 Incentive-compatible Assured Information Sharing, Murat Kantarcioglu, UTD 15:00−15:30 Patterns and properties in large-scale information networks, Edwin (Chun-Yuen) Teng, Michigan Motivation • 9/11 and related events illustrated problems in managing sensitive information • Managing Web information & services with appropriate security, privacy and simplicity is increasingly important and challenging • Autonomous devices (mobile phones, routers & medical equipment) need access too • Moving to EMRs is a national goal, but raises many privacy issues • Business needs better models for DRM 6/12/08 6 Need to Know, Need to Share • Traditional information security frameworks are based on “need to know” Unless you can prove that you have a prearranged right to access this information, you can’t have it • The 9/11 commission recommended moving from this to “need to share” I think this information may be important for you to accomplish your mission and would like to discuss sharing it with you 6/12/08 7 What’s changed in five years? • The memories of 9/11 are less strong This year’s college freshmen were in the first grade when the towers fell • Concern about loss of privacy has increased Government data collection is a issue this summer, but every company on the planet is collecting and using vast amounts of data on us all • Cybersecurity is a real and growing worry • Mobile and social computing have expanded and generate huge amounts of data on us all What should we do for the next five? • Make progress on privacy preserving data sharing and analysis • Put better controls for data sharing into the hands of consumers and software users • Explore incentive structures for companies to accumulate less data about us all • Make public data easier to share and use by promoting semantic technologies • Enhance cybersecurity to protect our data from attackers Our MURI themes are still sound • Assured information sharing in open, heterogeneous, distributed environments is increasingly important • New policy frameworks and languages can help • Semantic Web technologies share common policy concepts, policies & domain models • Data quality and privacy-preserving techniques must be addressed • Social aspects are important: networks, incentives • http://aisl.umbc.edu/ for more information