80 likes | 229 Views
This report highlights the significant achievements and future directions of the PORTIA Project, following a site visit in Stanford, CA. It showcases the benefits derived from a large ITR grant, including inter-institutional collaboration, interdisciplinary efforts, and the integration of research and education focused on privacy-publishing data management. The report outlines key accomplishments, such as novel algorithms for data protection, innovative privacy frameworks, and collaboration with genetics researchers. Future initiatives aim to enhance privacy, compliance tools, and engage user communities further.
E N D
WRAP UP Joan Feigenbaum http://www.cs.yale.edu/homes/jf PORTIA Project Site Visit Stanford CA, May 12-13, 2005
Benefits of a Large-ITR Grant Very high levels of • Inter-institutional collaboration • Inter-disciplinarity • Visibility and outreach • Integration of research and education • Public service by PIs
Accomplishments Reported Today RW: PPDM and MDS algorithmics AB: Policy specification and enforcement DB: Browser-based ID protection HG: Retaining control of outsourced data JF: Highly collaborative education and outreach SF: Novel data representations AS: Domain-specific DB challenges HN: Novel conceptual framework
Other Highlights of the First 1.5 Years • Search of access-controlled content • Economic analysis of “trusted platforms” • Provably secure query auditing • Privacy in public databases • BCC privacy violations in encrypted email • Cybercrime and cyberpolicing • The world changed (e.g., wrt spam, NGSCB).
The Powerful are Pessimistic • “You already have zero privacy. Get over it!” – Scott McNealy, 1999 • Microsoft Faculty Summit, August 2004 • Rick Rashid: People don’t even know what “privacy” means. • Bill Gates: Things are going to get worse. Google, Microsoft, and Yahoo! are all trying “to personalize search.”
Sample Highlights of theNext 3.5 Years (1) • Work with more user communities on PPDM. • Genetics researchers (see Schäffer’s White Paper) • We could use help from NSF on this! • Deal with adversarial behavior in massive-graph computations and massive-matrix computations. • Computational realization of contextual integrity (or proof that there is none) • Experimental analysis of “public-records” policies
Sample Highlights of theNext 3.5 Years (2) • Privacy-preserving data cleaning • Privacy-respecting personalized search • Policy-driven search in a social network • Enterprise-wide policy-driven search • Countering emerging threats to identity protection (e.g., bot-nets) • Compliance-testing tools • Health data: HIPAA • Financial data: SB1386,Sarbanes Oxley
Thank You for Your Attention THE END