Group Meeting
Schedule
Winter 2006-07
Date | Speakers | Topics
(with links to notes) |
Jan 17 |
Everyone | Organizational meeting |
Jan 24 |
Dilys Thomas | ThreeBallot: Ronald Rivests Voting scheme |
Jan 31 |
Bob Mungamuru | CIDR Paper: Privacy and Availability |
Feb 7 |
Dilys Thomas | Probabilistic Anonymity |
Feb 14 |
Ying Xu | Detecting Keys in a Database |
Feb 21 |
Sumit Mehra | NISE |
Feb 28 |
TBD | --- |
Mar 7 |
Anupam | Vanderbilt |
Mar 14 |
Japan visitor | Talk |
Previous Quarters
Fall 2006-07
Date | Speakers | Topics
(with links to notes) |
Oct 12 |
Everyone | Organizational meeting |
Oct 19 |
Dilys Thomas | Laws Shaping the field of Privacy. Recent papers in privacy. |
Oct 26 |
Shubha Nabar | Aggregates on K-Anonymous data. Privacy of the Netflix dataset. |
Nov 2 |
Bob Mungamuru | Anonymization of Sequential Releases |
Nov 9 |
Sharada Sundaram | Fine grained Authorization in Databases |
Nov 16 |
Anupam and Adam | MyHealth portal Privacy issues |
Nov 23 |
Dilys Thomas | Probabilistic Anonymity |
Nov 30 |
Vignesh, Dilys, Hector, Rajeev | CIDR paper followup |
Dec 7 |
To decide | |
Spring 2005-06
Date | Speakers | Topics
(with links to notes) |
May. 26 |
Dilys Thomas | Achieving Anonymity via Clustering |
May. 17 |
Adam Barth | Privacy and Contextual Integrity: Framework and Applications |
May. 11 |
Krishnaram Kenthapadi | Models and Algorithms for Data Privacy (PhD Defense) |
Apr. 21 |
Sharada Sundaram | Data Privacy issues at TCS |
Apr. 14 |
Ying Xu and Bob Mungamuru | CIDR paper follow-up discussion |
Winter 2005-06
Date | Speakers | Topics
(with links to notes) |
Mar. 8 |
Matt Blaze | Privacy and Security Challenges/Problems |
Mar. 1 |
Sachin Lodha and Harrick Vin | Privacy issues faced by Tata Research Development and Design Centre |
Feb. 22 |
David Mazieres | Asbestos project |
Feb. 15 |
Rajeev Motwani | Electronic Medical Records |
Feb. 1 |
Shubha Nabar | Query Auditing: Utility, Updates, and Open Problems |
Jan. 25 |
Bob Mungamuru | Update about TRUST project |
Jan. 18 |
Krishnaram Kenthapadi | Deciding agenda for the quarter |
Fall 2005-06
Date | Speakers | Topics
(with links to notes) |
Oct. 7 |
Bob Mungamuru | Key Configuration Management: Understanding Alternatives for Safeguarding Data |
Oct. 14 |
Dilys Thomas | Deriving Private information from Randomized data |
Oct. 21 |
Ying Xu | On the Quantification of Privacy |
Oct. 28 |
Shubha Nabar | l-Diversity: Privacy beyond k-anonymity |
Nov. 4 |
Cynthia Dwork | Differential Privacy |
Nov. 11 |
Rob Tibshirani | Techniques used in Statistical Analysis of Data Sets |
Dec. 2 |
Rajeev Motwani | Open Problem Session |
Summer 2004-05
Date | Speakers | Topics
(with links to notes) |
Jul. 28 |
Hector Garcia-Molina | Designing Yahoo's Privacy System |
Aug. 11 |
Ying Xu | Secure XML publishing without information leakage in the presence of data inference |
Spring 2004-05
Date | Speakers | Topics
(with links to notes) |
Apr. 7 |
Prat Moghe | Identity Theft - Can we have our electronic cake and eat it too? |
Apr. 14(a) |
Arvind Arasu | Deriving Private Information from Randomized Data |
Apr. 14(b) |
Bob Mungamuru | Privacy-Preserving Inter-Database Operations |
Apr. 21 |
Dilys Thomas | Private Logs for Database Recovery in Anonymous Transactions |
Apr. 28 |
Canceled |
|
May 5 |
Krishnaram Kenthapadi | Algorithm Quals: Statistical Databases |
May 12 |
Canceled (PORTIA site visit) |
|
May 19 |
Pei Cao | Hippocratic File System: Protecting Privacy in Networked Storage |
May 26(a) |
Gagan Aggarwal | Privacy-Enhancing k-Anonymization of Customer Data |
May 26(b) |
Adam Barth | Correcting Privacy Violations in Blind-Carbon-Copy (BCC) Encrypted Email |
Jun. 2 |
Dilys Thomas | Privacy Preserving OLAP |
Jun. 9 |
Prasanna Ganesan | New directions related to the P4P vision paper |
Winter 2004-05
Date | Speakers | Topics
(with links to notes) |
Jan. 20 |
Krishnaram Kenthapadi | Deciding agenda for the quarter |
Jan. 27 |
Nina Mishra | Simulatable Auditing |
Feb. 3 |
Anish Das Sharma | Auditing Compliance with a Hippocratic Database |
Feb. 10 |
Canceled |
|
Feb. 17 (a) |
Dilys Thomas | Discussion on CIDR paper implementation |
Feb. 17 (b) |
Ying Xu | Follow-up on Auditing Compliance paper |
Feb. 24 |
Hector Garcia-Molina | Exploring Group Encryption for a Database System |
Mar. 3 |
Canceled |
|
Mar. 10 |
Cynthia Dwork | Helping Kinsey Compute: Statistics with Secrecy |
Mar. 17 |
Krishnaram Kenthapadi | Privacy-Preserving Set Operations |
Fall 2004-05
Date | Speakers | Topics
(with links to notes) |
Oct. 7 |
Krishnaram Kenthapadi | Deciding agenda for the quarter |
Oct. 14 |
Krishnaram Kenthapadi | Privacy: A Machine Learning View |
Oct. 21 |
Adam Barth | Access Policy Languages and Privacy |
Oct. 28 |
Prasanna Ganesan | CIDR
paper review discussion |
Nov. 4 (a) |
Eu-Jin Goh | Towards Universal Computation on Encrypted Data |
Nov. 4 (b) |
Mayank Bawa | Problems related to P4P paper |
Nov. 11 |
Adrian Lane | Securing Consumable Information |
Nov. 18 |
Qi Su | Summer
work at IBM Almaden |
Dec. 2 |
Sergio Marti | Managing
RFID Data |
Summer 2003-04
Date | Speakers | Topics
(with links to notes) |
Jun. 24 |
Krishnaram Kenthapadi | Anonymizing Tables for Privacy Protection |
Jul. 1 |
Rajeev Motwani | CIDR paper discussion |
Jul. 9 |
Utkarsh Srivastava Dilys Thomas |
Summary of Bala Iyer papers |
Jul. 16 |
Prasanna Ganesan | CIDR paper: Discussion of outline |
Jul. 23 |
Prasanna Ganesan | CIDR paper: Discussion of first draft |
Jul. 30 |
Prasanna Ganesan | CIDR paper: Final draft revision |
Aug. 5 |
Prasanna Ganesan | CIDR paper: Discussion of open problems |
Aug. 13 |
Rebecca Wright | Privacy-Preserving Bayesian Network Structure Computation on Distributed Heterogeneous Data |
Spring 2003-04
Date | Speakers | Topics
(with links to notes) |
Mar. 31 |
Canceled |
|
Apr. 7 |
Jason Hong | An Architecture for Privacy-Sensitive Ubiquitous Computing |
Apr. 14 |
Ying Xu | Secure Computation of Set Intersection |
Apr. 22 |
Katherine Walker Michael Samols |
Email Postage: A Secure and Efficient Approach |
Apr. 29 |
Rajeev Motwani | Discussion of Open Problems |
May 6 |
Dilys Thomas | Fine
Grained Access Control and Secure Multiparty Computation |
May 13 |
Cynthia Dwork | Toward
Privacy in Public Databases (contd.) |
May 20 |
Ying Xu | Hiding
Sensitive Rules in Data Mining |
May 27 |
Bala Iyer | Database Privacy: SQL processing of Encrypted Data |
Jun. 3 |
Rajeev Motwani | CIDR
paper discussion |
Jun. 10 |
Prasanna Ganesan | CIDR
paper discussion (contd.) |
Winter 2003-04
Date | Speakers | Topics
(with links to notes) |
Jan. 14 |
Rajat Mukherjee | Privacy and Trust in Social Networks [ Abstract ] |
Jan. 21 |
Nina Mishra | Statistical Databases: Query Restriction [ PS ] [ References ] |
Jan. 28 |
Dilys Thomas | Privacy in Data Mining |
Feb. 4 |
Hector Garcia-Molina | (a) Vision
Paper Discussion (b) SERF project and Information Privacy |
Feb. 11 |
Nobuyuki Osaki | Regulatory Compliance Solutions for Security and Privacy [ Abstract ] |
Feb. 18 |
Dan Boneh | New Life for Group Signatures [ PDF ] |
Feb. 25 |
Cynthia Dwork | Toward
Privacy in Public Databases |
Mar. 3 |
Shubha Nabar | Privacy Preserving Data Mining |
Mar. 10 |
Kobbi Nissim | Privacy
and Usability of Multi-attribute Databases [ PDF ] |
Fall 2003-04
Date | Speakers | Topics
(with links to notes) |
Oct. 8 |
Dilys Thomas | Overview
of Database Privacy |
Oct. 15 |
Mayank Bawa | Privacy through Anonymity
|
Oct. 22 |
||
Oct. 29 |
Gagan Aggarwal | Secure Multiparty Computation, Oblivious Transfer
[ PS ] |
Nov. 5 |
Krishnaram Kenthapadi |
Broadcast Encryption, Searchable Public Key Encryption [ PS ] |
Nov. 12 |
Krishnaram Kenthapadi | Private Information Retrieval [ PS ] |
Nov. 19 |
Eu-Jin Goh | How to Search on Encrypted
Data [ PS ][ Slides ] |
Nov. 26 |
Utkarsh Srivastava | P3P and Hippocratic Databases |
Dec. 3 |
Michael Abbott | Privacy/Security issues in Web
Services [ Abstract
] |
Dec. 10 (a) |
Ying Xu | Access Control |
Dec. 10 (b) |
Mayank Bawa | Individual Centric Privacy |
Please send an email to Dilys Thomas to reserve a time for your talk.