Group Meeting
Schedule
Winter 2006-07
| Date | Speakers | Topics
(with links to notes) |
| Jan 17 |
Everyone | Organizational meeting |
| Jan 24 |
Dilys Thomas | ThreeBallot: Ronald Rivests Voting scheme |
| Jan 31 |
Bob Mungamuru | CIDR Paper: Privacy and Availability |
| Feb 7 |
Dilys Thomas | Probabilistic Anonymity |
| Feb 14 |
Ying Xu | Detecting Keys in a Database |
| Feb 21 |
Sumit Mehra | NISE |
| Feb 28 |
TBD | --- |
| Mar 7 |
Anupam | Vanderbilt |
| Mar 14 |
Japan visitor | Talk |
Previous Quarters
Fall 2006-07
| Date | Speakers | Topics
(with links to notes) |
| Oct 12 |
Everyone | Organizational meeting |
| Oct 19 |
Dilys Thomas | Laws Shaping the field of Privacy. Recent papers in privacy. |
| Oct 26 |
Shubha Nabar | Aggregates on K-Anonymous data. Privacy of the Netflix dataset. |
| Nov 2 |
Bob Mungamuru | Anonymization of Sequential Releases |
| Nov 9 |
Sharada Sundaram | Fine grained Authorization in Databases |
| Nov 16 |
Anupam and Adam | MyHealth portal Privacy issues |
| Nov 23 |
Dilys Thomas | Probabilistic Anonymity |
| Nov 30 |
Vignesh, Dilys, Hector, Rajeev | CIDR paper followup |
| Dec 7 |
To decide | |
Spring 2005-06
| Date | Speakers | Topics
(with links to notes) |
| May. 26 |
Dilys Thomas | Achieving Anonymity via Clustering |
| May. 17 |
Adam Barth | Privacy and Contextual Integrity: Framework and Applications |
| May. 11 |
Krishnaram Kenthapadi | Models and Algorithms for Data Privacy (PhD Defense) |
| Apr. 21 |
Sharada Sundaram | Data Privacy issues at TCS |
| Apr. 14 |
Ying Xu and Bob Mungamuru | CIDR paper follow-up discussion |
Winter 2005-06
| Date | Speakers | Topics
(with links to notes) |
| Mar. 8 |
Matt Blaze | Privacy and Security Challenges/Problems |
| Mar. 1 |
Sachin Lodha and Harrick Vin | Privacy issues faced by Tata Research Development and Design Centre |
| Feb. 22 |
David Mazieres | Asbestos project |
| Feb. 15 |
Rajeev Motwani | Electronic Medical Records |
| Feb. 1 |
Shubha Nabar | Query Auditing: Utility, Updates, and Open Problems |
| Jan. 25 |
Bob Mungamuru | Update about TRUST project |
| Jan. 18 |
Krishnaram Kenthapadi | Deciding agenda for the quarter |
Fall 2005-06
| Date | Speakers | Topics
(with links to notes) |
| Oct. 7 |
Bob Mungamuru | Key Configuration Management: Understanding Alternatives for Safeguarding Data |
| Oct. 14 |
Dilys Thomas | Deriving Private information from Randomized data |
| Oct. 21 |
Ying Xu | On the Quantification of Privacy |
| Oct. 28 |
Shubha Nabar | l-Diversity: Privacy beyond k-anonymity |
| Nov. 4 |
Cynthia Dwork | Differential Privacy |
| Nov. 11 |
Rob Tibshirani | Techniques used in Statistical Analysis of Data Sets |
| Dec. 2 |
Rajeev Motwani | Open Problem Session |
Summer 2004-05
| Date | Speakers | Topics
(with links to notes) |
| Jul. 28 |
Hector Garcia-Molina | Designing Yahoo's Privacy System |
| Aug. 11 |
Ying Xu | Secure XML publishing without information leakage in the presence of data inference |
Spring 2004-05
| Date | Speakers | Topics
(with links to notes) |
| Apr. 7 |
Prat Moghe | Identity Theft - Can we have our electronic cake and eat it too? |
| Apr. 14(a) |
Arvind Arasu | Deriving Private Information from Randomized Data |
| Apr. 14(b) |
Bob Mungamuru | Privacy-Preserving Inter-Database Operations |
| Apr. 21 |
Dilys Thomas | Private Logs for Database Recovery in Anonymous Transactions |
| Apr. 28 |
Canceled |
|
| May 5 |
Krishnaram Kenthapadi | Algorithm Quals: Statistical Databases |
| May 12 |
Canceled (PORTIA site visit) |
|
| May 19 |
Pei Cao | Hippocratic File System: Protecting Privacy in Networked Storage |
| May 26(a) |
Gagan Aggarwal | Privacy-Enhancing k-Anonymization of Customer Data |
| May 26(b) |
Adam Barth | Correcting Privacy Violations in Blind-Carbon-Copy (BCC) Encrypted Email |
| Jun. 2 |
Dilys Thomas | Privacy Preserving OLAP |
| Jun. 9 |
Prasanna Ganesan | New directions related to the P4P vision paper |
Winter 2004-05
| Date | Speakers | Topics
(with links to notes) |
| Jan. 20 |
Krishnaram Kenthapadi | Deciding agenda for the quarter |
| Jan. 27 |
Nina Mishra | Simulatable Auditing |
| Feb. 3 |
Anish Das Sharma | Auditing Compliance with a Hippocratic Database |
| Feb. 10 |
Canceled |
|
| Feb. 17 (a) |
Dilys Thomas | Discussion on CIDR paper implementation |
| Feb. 17 (b) |
Ying Xu | Follow-up on Auditing Compliance paper |
| Feb. 24 |
Hector Garcia-Molina | Exploring Group Encryption for a Database System |
| Mar. 3 |
Canceled |
|
| Mar. 10 |
Cynthia Dwork | Helping Kinsey Compute: Statistics with Secrecy |
| Mar. 17 |
Krishnaram Kenthapadi | Privacy-Preserving Set Operations |
Fall 2004-05
| Date | Speakers | Topics
(with links to notes) |
| Oct. 7 |
Krishnaram Kenthapadi | Deciding agenda for the quarter |
| Oct. 14 |
Krishnaram Kenthapadi | Privacy: A Machine Learning View |
| Oct. 21 |
Adam Barth | Access Policy Languages and Privacy |
| Oct. 28 |
Prasanna Ganesan | CIDR
paper review discussion |
| Nov. 4 (a) |
Eu-Jin Goh | Towards Universal Computation on Encrypted Data |
| Nov. 4 (b) |
Mayank Bawa | Problems related to P4P paper |
| Nov. 11 |
Adrian Lane | Securing Consumable Information |
| Nov. 18 |
Qi Su | Summer
work at IBM Almaden |
| Dec. 2 |
Sergio Marti | Managing
RFID Data |
Summer 2003-04
| Date | Speakers | Topics
(with links to notes) |
| Jun. 24 |
Krishnaram Kenthapadi | Anonymizing Tables for Privacy Protection |
| Jul. 1 |
Rajeev Motwani | CIDR paper discussion |
| Jul. 9 |
Utkarsh Srivastava Dilys Thomas |
Summary of Bala Iyer papers |
| Jul. 16 |
Prasanna Ganesan | CIDR paper: Discussion of outline |
| Jul. 23 |
Prasanna Ganesan | CIDR paper: Discussion of first draft |
| Jul. 30 |
Prasanna Ganesan | CIDR paper: Final draft revision |
| Aug. 5 |
Prasanna Ganesan | CIDR paper: Discussion of open problems |
| Aug. 13 |
Rebecca Wright | Privacy-Preserving Bayesian Network Structure Computation on Distributed Heterogeneous Data |
Spring 2003-04
| Date | Speakers | Topics
(with links to notes) |
| Mar. 31 |
Canceled |
|
| Apr. 7 |
Jason Hong | An Architecture for Privacy-Sensitive Ubiquitous Computing |
| Apr. 14 |
Ying Xu | Secure Computation of Set Intersection |
| Apr. 22 |
Katherine Walker Michael Samols |
Email Postage: A Secure and Efficient Approach |
| Apr. 29 |
Rajeev Motwani | Discussion of Open Problems |
| May 6 |
Dilys Thomas | Fine
Grained Access Control and Secure Multiparty Computation |
| May 13 |
Cynthia Dwork | Toward
Privacy in Public Databases (contd.) |
| May 20 |
Ying Xu | Hiding
Sensitive Rules in Data Mining |
| May 27 |
Bala Iyer | Database Privacy: SQL processing of Encrypted Data |
| Jun. 3 |
Rajeev Motwani | CIDR
paper discussion |
| Jun. 10 |
Prasanna Ganesan | CIDR
paper discussion (contd.) |
Winter 2003-04
| Date | Speakers | Topics
(with links to notes) |
| Jan. 14 |
Rajat Mukherjee | Privacy and Trust in Social Networks [ Abstract ] |
| Jan. 21 |
Nina Mishra | Statistical Databases: Query Restriction [ PS ] [ References ] |
| Jan. 28 |
Dilys Thomas | Privacy in Data Mining |
| Feb. 4 |
Hector Garcia-Molina | (a) Vision
Paper Discussion (b) SERF project and Information Privacy |
| Feb. 11 |
Nobuyuki Osaki | Regulatory Compliance Solutions for Security and Privacy [ Abstract ] |
| Feb. 18 |
Dan Boneh | New Life for Group Signatures [ PDF ] |
| Feb. 25 |
Cynthia Dwork | Toward
Privacy in Public Databases |
| Mar. 3 |
Shubha Nabar | Privacy Preserving Data Mining |
| Mar. 10 |
Kobbi Nissim | Privacy
and Usability of Multi-attribute Databases [ PDF ] |
Fall 2003-04
| Date | Speakers | Topics
(with links to notes) |
| Oct. 8 |
Dilys Thomas | Overview
of Database Privacy |
| Oct. 15 |
Mayank Bawa | Privacy through Anonymity
|
| Oct. 22 |
||
| Oct. 29 |
Gagan Aggarwal | Secure Multiparty Computation, Oblivious Transfer
[ PS ] |
| Nov. 5 |
Krishnaram Kenthapadi |
Broadcast Encryption, Searchable Public Key Encryption [ PS ] |
| Nov. 12 |
Krishnaram Kenthapadi | Private Information Retrieval [ PS ] |
| Nov. 19 |
Eu-Jin Goh | How to Search on Encrypted
Data [ PS ][ Slides ] |
| Nov. 26 |
Utkarsh Srivastava | P3P and Hippocratic Databases |
| Dec. 3 |
Michael Abbott | Privacy/Security issues in Web
Services [ Abstract
] |
| Dec. 10 (a) |
Ying Xu | Access Control |
| Dec. 10 (b) |
Mayank Bawa | Individual Centric Privacy |
Please send an email to Dilys Thomas to reserve a time for your talk.