Lecture # |
Date |
Topics |
Presenter |
1 |
1/5 (Thu) |
Administrivia and course introduction |
Prof. Lee |
2 |
1/10 (Tues) |
Cloud Security |
Shai Halevi, Danny Harnik, Benny
Pinkas, Alexandra Shulman-Peleg: Proofs of Ownership in Remote
Storage Systems, CCS
2011. [PDF] |
Bill |
3 |
1/12 (Thu) |
Rui Wang, Shuo Chen, XiaoFeng Wang,
Shaz Qadeer: How to Shop for Free Online: Security Analysis of
Cashier-as-a-Service Based Web Stores, Oakland
2011. [PDF] |
Huy |
4 |
1/17 (Tues) |
Keven D. Bowers, Marten van Dijk, Ari Juels, Alina Oprea, Ronald L. Rivest: How to tell if your cloud files are vulnerable to drive crashes, CCS 2011. [PDF] |
Nick T. |
5 |
1/19 (Thu) |
Student Choice: Thomas Ristenpart, Eran Tromer, Hovav Shacham, Stefan Savage: Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds, CCS 2009. [PDF] |
Andrew |
6 |
1/24 (Tues) |
Privacy in Social Media |
Yang Wang, Gregory Norcie, Saranga Komanduri, Pedro Giovanni Leon, Lorrie Faith Cranor, Alessandro Acquisti: "I regretted the minute I pressed share": A Qualitative Study of Regrets on Facebook, SOUPS 2011. [PDF] |
Marian |
7 |
1/26 (Thu) |
Serge Egelman, Andrew Oates, Shriram Krishnamurthi: Oops, I Did It Again: Mitigating Repeated Access Control Errors on Facebook, CHI 2011. [PDF] |
Andrew |
8 |
1/31 (Tues) |
Ari Lampinen, Vilma Lehtinen, Asko Lehmuskallio, Sakari Tamminen: We're in It Together: Interpersonal Management of Disclosure in Social Network Services, CHI 2011. [PDF] |
Nathalie |
9 |
2/2 (Thu) |
Ashwin Machanavajjhala, Aleksandra Korolova, Atish Das Sarma: Personalized Social Recommendations - Accurate or Private?, VLDB 2011. [PDF] |
Xuelia |
10 |
2/7 (Tues) |
Student Choice: Andrew Besmer and Heather Richter Lipford: Moving beyond untagging: photo privacy in a tagged world, CHI 2010. [PDF] |
Xiang |
11 |
2/9 (Thu) |
Location Privacy and Exposure |
Roman Schlegel, Apu Kapadia, Adam J. Lee, Eyeing your Exposure: Quantifying and Controlling Information Sharing for Improved Privacy, SOUPS 2011. [PDF] |
Yann |
12 |
2/14 (Tues) |
Reza Shokri, George Theodorakopoulos, Jean-Yves Le Boudec, Jean-Pierre Hubaux: Quantifying Location Privacy, Oakland 2011. [PDF] |
Xiang |
13 |
2/16 (Thu) |
Reza Shokri, George Theodorakopoulos, George Danezis, Jean-Pierre Hubaux, Jean-Yves Boudec: Quantifying Location Privacy: The Case of Sporadic Location Exposure, PETS 2011. [PDF] |
John |
14 |
2/21 (Tue) |
Jacob T. Biehl, Eleanor Rieffel, Adam J. Lee: When Privacy and Utility are in Harmony: Towards Better Design of Presence Technologies, PUC, In Press. [Link] |
Yann |
15 |
2/23 (Thu) |
Project proposal mini-presentations |
- |
16 |
2/28 (Tues) |
Student Choice: Hui Zang and Jean Bolot: Anonymization of location data does not work: a large-scale measurement study, MobiCom '11. [PDF] |
Nathalie |
17 |
3/01 (Thu) |
Security and Privacy in Database Systems |
Mustafa Canim, Murat Kantarcioglu, Bijit Hore, Sharad Mehrotra: Building Disclosure Risk Aware Query Optimizers for Relational Databases, VLDB 2010. [PDF] |
Thao |
- |
3/06 (Tues) |
Spring break. No class. |
- |
3/08 (Thu) |
Spring break. No class. |
18 |
3/13 (Tues) |
Nicholas L. Farnan, Adam J. Lee, Panos K. Chrysanthis, Ting Yu: Don't Reveal My Intension: Protecting User Privacy Using Declarative Preferences during Distributed Query Processing, ESORICS 2011. [PDF] |
Nick F. |
19 |
3/15 (Thu) |
Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati: Authorization enforcement in distributed query evaluation, JCS 19(4), 2011. [PDF] |
Nick F. |
20 |
3/20 (Tues) |
Student Choice: Raluca Ada Popa, Catherine M. S. Redfield, Nickolai Zeldovich, and Hari Balakrishnan: CryptDB: Protecting Confidentiality with
Encrypted Query Processing, SOSP 2011. [PDF] |
Nick T. |
21 |
3/22 (Thu) |
Privacy in Pervasive Sensing |
Raghu K. Ganti, Nam Pham, Yu-En Tsai, and Tarek F. Abdelzaher: PoolView: stream privacy for grassroots participatory sensing, SenSys 2008. [PDF] |
Thao |
22 |
3/27 (Tues) |
Predrag Klasnja, Sunny Consolvo, Tanzeem Choudhury, Richard Beckwith, Jeffery Hightower: Exploring Privacy Concerns about Personal Sensing, Pervasive 2009. [PDF] |
Bailing |
23 |
3/29 (Thu) |
Minho Shin, Cory Cornelius, Daniel Peebles, Apu Kapadia, David Kotz, Nikos Triandopoulos: AnonySense: A system for anonymous opportunistic sensing, Pervasive and Mobile Computing 7(1), 2011. [PDF] |
Rich |
24 |
4/03 (Tues) |
Emiliano De Cristofaro, Claudio Soriente: PEPSI: Privacy-Enhanced Participatory Sensing Infrastructure, WiSec 2011.
[Extended PDF]
Note: Please read the extended version of the paper linked above, not the short paper that appeared in WiSec. |
John |
25 |
4/05 (Thu) |
Student Choice: Chih-Jye Wang and Wei-Shinn Ku: Anonymous Sensory Data Collection Approach for Mobile Participatory Sensing, In Proceedings of the Workshop on Secure Data Management on Smartphones and Mobiles, held in conjunction with ICDE 2012, Washington, D.C., 2012 [PDF] |
Marian |
26 |
4/10 (Tues) |
Access Control |
Deepak Garg, Limin Jia, and Anupam Datta: Policy auditing over incomplete logs: theory, implementation and applications, CCS 2011. [PDF] |
Bill |
27 |
4/12 (Thu) |
Piotr Mardziel, Stephen Magill, Michael Hicks, Mudhakar Srivatsa. Dynamic Enforcement of Knowledge-based Security Policies, CSF 2011. [PDF] |
Rich |
28 |
4/17 (Tues) |
Student Choice: Philip W.L. Fong and Ida Siahaan. Relationship-based access control policies and their policy languages, SACMAT 2011. [PDF] |
Xuelia |
29 |
4/19 (Thu) |
Final Project Presentations |
- |
30 |
4/24 (Tues) |
Final Project Presentations |
- |