INFO-I 590: Advanced Topics in Privacy
Fall 2009

[ Home | Policies | Schedule | Project | Resources ]

Presentation Schedule

Date Paper Presenter Slides
Sep 1 Introduction and Administrivia Apu Kapadia
Background: Privacy
Sep 8 Background: Security and Cryptography Apu Kapadia
Untraceable electronic mail, return addresses, and digital pseudonyms (presentation)
D. Chaum
Communications of the ACM, 1981
Crowds: Anonymity for web transactions (discussion)
M. K. Reiter and A. D. Rubin
ACM Transactions on Information and System Security 1(1):66–92, November 1998
Sep 15 Tarzan: A Peer-to-Peer Anonymizing Network Layer
M.J. Freedman, R.Morris
ACM CCS 2002
Shaun Deaton (presentation)
An Analysis of the Degradation of Anonymous Protocols
M.Wright, M.Adler, B.N.Levine, C.Shields
NDSS 2002
Xiaoyong Zhou (discussion)
Mixminion: Design of a Type III Anonymous Remailer Protocol
G.Danezis, R.Dingledine, N.Mathewson
IEEE Security & Privacy (Oakland) 2003
Chris Schneider (presentation)
Tor: The Second-Generation Onion Router
Roger Dingledine, Nick Mathewson, and Paul Syverson
In the Proceedings of the 13th USENIX Security Symposium, August 2004
Naveed Alam (discussion)
Sep 22 Low-Cost Traffic Analysis of Tor
S.J. Murdoch, G.Danezis, IEEE Security and Privacy (Oakland) 2005
Ali Khalfan (presentation)
How Much Anonymity does Network Latency Leak?
Nicholas Hopper, Eugene Y. Vasserman, and Eric Chan-Tin
ACM Transactions on Information and System Security, forthcoming 2009
Emily Adams (discussion)
Nymble: Blocking Misbehaving Users in Anonymizing Networks
Patrick P. Tsang, Apu Kapadia, Cory Cornelius, and Sean W. Smith
To Appear in IEEE Transactions on Dependable and Secure Computing (TDSC)
Lusha Wang (presentation)
The Eternity Service
Pragocrypt 1996
Mehool Intwala (discussion)
Sep 29 Freenet: A Distributed Anonymous Information Storage and Retrieval System
I.Clarke, O.Sandberg, B.Wiley, T.W. Hong
PET 2000
Nathan Husted (presentation)
Publius: A robust, tamper-evident, censorship-resistant and source-anonymous web publishing system
M.Waldman, A.Rubin, L.Cranor
USENIX Security 2000
Moe Rafiuddin (discussion)
Tangler: a censorship-resistant publishing system based on document entanglements
M.Waldman, D.Mazíeres,
ACM CCS 2001
Zhou Li (presentation)
Censorship Resistance Revisited
Ginger Perng, Michael K. Reiter, and Chenxi Wang
Information Hiding Workshop (IH 2005)
Asim Yuksel (discussion)
Oct 6 Project Proposal Presentations

Oct 13 A Taxonomy of Privacy
Daniel J. Solove
GWU Law School Public Law Research Paper No. 129 University of Pennsylvania Law Review, Vol. 154, No. 3, p. 477, January 2006
Vaibhav Garg (presentation + discussion)
Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management — A Consolidated Proposal for Terminology (alternate link)
Pfitzmann, Hansen
TU Dresden
Shirin Nilizadeh (presentation)
I've Got Nothing to Hide, and Other Misunderstandings of Privacy
Daniel J. Solove
George Washington University Law School, San Diego Law Review, Vol. 44, 2007
Mehool Intwala (discussion)
Oct 20 k-anonymity: a model for protecting privacy
L. Sweeney
International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 2002
Xiaoyong Zhou (presentation)
l-diversity: Privacy beyond k-anonymity
Ashwin Machanavajjhala, Johannes Gehrke, Daniel Kifer, Muthuramakrishnan Venkitasubramaniam
ICDE 2006
Chris Schneider (discussion)
t-Closeness: Privacy Beyond k-Anonymity and l-Diversity
Ninghui Li, Tiancheng Li, and Suresh Venkatasubramanian
International Conference on Data Engineering (ICDE), April 2007
Ali Khalfan (discussion)
An Ad Omnia Approach to Defining and Achieving Private Data Analysis
Cynthia Dwork
Privacy, Security, and Trust in KDD (PinKDD), August 2007
Shaun Deaton (presentation)
Oct 27 Forensic genomics: kin privacy, driftnets and other open questions
Frank Stajano, Lucia Bianchi, Pietro Lio and Douwe Korff
WPES 2008
Moe Rafiuddin (discussion)
Resolving Individuals Contributing Trace Amounts of DNA to Highly Complex Mixtures Using High-Density SNP Genotyping Microarrays
Homer et al.
PLoS Genetics
Zhou Li (discussion)
Learning Your Identity and Disease from Research Papers: Information Leaks in Genome Wide Association Study.
Rui Wang, Yong Li, XiaoFeng Wang, Haixu Tang, Xiaoyong Zhou
CCS 2009
Emily Adams (presentation)
Nov 3 Information Revelation and Privacy in Online Social Networks
Ralph Gross and Alessandro Acquisti
WPES 2005
Lusha Wang (discussion)
Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography
Lars Backstrom, Cynthia Dwork, and Jon M. Kleinberg
WWW 2007
Shirin Nilizadeh (discussion)
Preserving Privacy in Social Networks against Neighborhood Attacks
B. Zhou and J. Pei
ICDE 2008
Naveed Alam (presentation)
Nov 10 ACM CCS Conference, no class.
Attend CCS or work on project and status report

Nov 17 The EigenTrust Algorithm for Reputation Management in P2P Networks
Sepandar D. Kamvar, Mario T. Schlosser, and Hector Garcia-Molina
WWW 2003
Asim Yuksel (presentation)
A Survey of Attack and Defense Techniques for Reputation Systems
Kevin Hoffman, David Zage, and Cristina Nita-Rotaru
ACM Computing Surveys, Volume 41, Issue 4, December 2009.
Shaun Deaton, Nathan Husted (discussion)
Nov 24 Developing Privacy Guidelines for Social Location Disclosure Applications and Services
G. Iachello, I. Smith, S. Consolvo, M. Chen, G.D. Abowd
SOUPS 2005
Lusha Wang (discussion)
Preserving Privacy in GPS Traces via Density-Aware Path Cloaking
Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady
CCS 2007
Zhou Li (discussion)
Virtual Walls: Protecting Digital Privacy in Pervasive Environments
Apu Kapadia, Tristan Henderson, Jeffrey J. Fielding, and David Kotz
Moe Rafiuddin (presentation)
Dec 1 CCS overview, 1–3:45pm as usual
Securing Medical Records on Smart Phones
Ryan Gardner, Sujata Garera, Matthew Pagan Matthew Green, Aviel Rubin
Mehool Intwala (presentation)
Dec 8 Discussion, wrap-up, student feedback.

Dec 15 Final Project Presentations, 8–11am, Info East 122.