Discussion Schedule (Subject to Change)


[ Home ]    [ Policies ]    [ Lectures ]    [ Project ]   


Notice: Students are responsible for reading all papers listed below prior to the lecture in which they will be discussed. Paper reviews are due at the start of lecture and will not be accepted late without prior approval.


Lecture # Date Topics Presenter
1 1/5 (Thu) Administrivia and course introduction Prof. Lee
2 1/10 (Tues) Cloud Security
Shai Halevi, Danny Harnik, Benny Pinkas, Alexandra Shulman-Peleg: Proofs of Ownership in Remote Storage Systems, CCS 2011. [PDF] Bill
3 1/12 (Thu) Rui Wang, Shuo Chen, XiaoFeng Wang, Shaz Qadeer: How to Shop for Free Online: Security Analysis of Cashier-as-a-Service Based Web Stores, Oakland 2011. [PDF] Huy
4 1/17 (Tues) Keven D. Bowers, Marten van Dijk, Ari Juels, Alina Oprea, Ronald L. Rivest: How to tell if your cloud files are vulnerable to drive crashes, CCS 2011. [PDF] Nick T.
5 1/19 (Thu) Student Choice: Thomas Ristenpart, Eran Tromer, Hovav Shacham, Stefan Savage: Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds, CCS 2009. [PDF] Andrew
6 1/24 (Tues) Privacy in Social Media
Yang Wang, Gregory Norcie, Saranga Komanduri, Pedro Giovanni Leon, Lorrie Faith Cranor, Alessandro Acquisti: "I regretted the minute I pressed share": A Qualitative Study of Regrets on Facebook, SOUPS 2011. [PDF] Marian
7 1/26 (Thu) Serge Egelman, Andrew Oates, Shriram Krishnamurthi: Oops, I Did It Again: Mitigating Repeated Access Control Errors on Facebook, CHI 2011. [PDF] Andrew
8 1/31 (Tues) Ari Lampinen, Vilma Lehtinen, Asko Lehmuskallio, Sakari Tamminen: We're in It Together: Interpersonal Management of Disclosure in Social Network Services, CHI 2011. [PDF] Nathalie
9 2/2 (Thu) Ashwin Machanavajjhala, Aleksandra Korolova, Atish Das Sarma: Personalized Social Recommendations - Accurate or Private?, VLDB 2011. [PDF] Xuelia
10 2/7 (Tues) Student Choice: Andrew Besmer and Heather Richter Lipford: Moving beyond untagging: photo privacy in a tagged world, CHI 2010. [PDF] Xiang
11 2/9 (Thu) Location Privacy and Exposure
Roman Schlegel, Apu Kapadia, Adam J. Lee, Eyeing your Exposure: Quantifying and Controlling Information Sharing for Improved Privacy, SOUPS 2011. [PDF] Yann
12 2/14 (Tues) Reza Shokri, George Theodorakopoulos, Jean-Yves Le Boudec, Jean-Pierre Hubaux: Quantifying Location Privacy, Oakland 2011. [PDF] Xiang
13 2/16 (Thu) Reza Shokri, George Theodorakopoulos, George Danezis, Jean-Pierre Hubaux, Jean-Yves Boudec: Quantifying Location Privacy: The Case of Sporadic Location Exposure, PETS 2011. [PDF] John
14 2/21 (Tue) Jacob T. Biehl, Eleanor Rieffel, Adam J. Lee: When Privacy and Utility are in Harmony: Towards Better Design of Presence Technologies, PUC, In Press. [Link] Yann
15 2/23 (Thu) Project proposal mini-presentations -
16 2/28 (Tues) Student Choice: Hui Zang and Jean Bolot: Anonymization of location data does not work: a large-scale measurement study, MobiCom '11. [PDF] Nathalie
17 3/01 (Thu) Security and Privacy in Database Systems
Mustafa Canim, Murat Kantarcioglu, Bijit Hore, Sharad Mehrotra: Building Disclosure Risk Aware Query Optimizers for Relational Databases, VLDB 2010. [PDF] Thao
- 3/06 (Tues) Spring break. No class.
- 3/08 (Thu) Spring break. No class.
18 3/13 (Tues) Nicholas L. Farnan, Adam J. Lee, Panos K. Chrysanthis, Ting Yu: Don't Reveal My Intension: Protecting User Privacy Using Declarative Preferences during Distributed Query Processing, ESORICS 2011. [PDF] Nick F.
19 3/15 (Thu) Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati: Authorization enforcement in distributed query evaluation, JCS 19(4), 2011. [PDF] Nick F.
20 3/20 (Tues) Student Choice: Raluca Ada Popa, Catherine M. S. Redfield, Nickolai Zeldovich, and Hari Balakrishnan: CryptDB: Protecting Confidentiality with Encrypted Query Processing, SOSP 2011. [PDF] Nick T.
21 3/22 (Thu) Privacy in Pervasive Sensing
Raghu K. Ganti, Nam Pham, Yu-En Tsai, and Tarek F. Abdelzaher: PoolView: stream privacy for grassroots participatory sensing, SenSys 2008. [PDF] Thao
22 3/27 (Tues) Predrag Klasnja, Sunny Consolvo, Tanzeem Choudhury, Richard Beckwith, Jeffery Hightower: Exploring Privacy Concerns about Personal Sensing, Pervasive 2009. [PDF] Bailing
23 3/29 (Thu) Minho Shin, Cory Cornelius, Daniel Peebles, Apu Kapadia, David Kotz, Nikos Triandopoulos: AnonySense: A system for anonymous opportunistic sensing, Pervasive and Mobile Computing 7(1), 2011. [PDF] Rich
24 4/03 (Tues) Emiliano De Cristofaro, Claudio Soriente: PEPSI: Privacy-Enhanced Participatory Sensing Infrastructure, WiSec 2011. [Extended PDF]

Note: Please read the extended version of the paper linked above, not the short paper that appeared in WiSec.
John
25 4/05 (Thu) Student Choice: Chih-Jye Wang and Wei-Shinn Ku: Anonymous Sensory Data Collection Approach for Mobile Participatory Sensing, In Proceedings of the Workshop on Secure Data Management on Smartphones and Mobiles, held in conjunction with ICDE 2012, Washington, D.C., 2012 [PDF] Marian
26 4/10 (Tues) Access Control
Deepak Garg, Limin Jia, and Anupam Datta: Policy auditing over incomplete logs: theory, implementation and applications, CCS 2011. [PDF] Bill
27 4/12 (Thu) Piotr Mardziel, Stephen Magill, Michael Hicks, Mudhakar Srivatsa. Dynamic Enforcement of Knowledge-based Security Policies, CSF 2011. [PDF] Rich
28 4/17 (Tues) Student Choice: Philip W.L. Fong and Ida Siahaan. Relationship-based access control policies and their policy languages, SACMAT 2011. [PDF] Xuelia
29 4/19 (Thu) Final Project Presentations -
30 4/24 (Tues) Final Project Presentations -