Sean PeisertACM Distinguished Member |
||
Upcoming activities:
IEEE Security & Privacy (ongoing)
NSA SoS Best Paper Competition (annually, deadlines in April) IEEE Cybersecurity Award for Practice (annually, deadlines in July) NSF Cybersecurity Summit (Oct. 7–10 2024) IEEE S&P (Oakland) 2025 (May 12–15, 2025) CSET 2025 (Aug 2025) NSPW 2025 Aug–Oct, 2024)
|
Research
I3P Data SanitizationThis seed project looked at defining means for understanding what data can be sanitized, and how. Traditionally, techniques for sanitizing or anonymizing data have included masking, adding noise, or enforcing regularity. They typically also assume a "closed world." However, these techniques often either make data unusable for research or operational purposes or fail to completely sanitize the data. Thus, our data sanitization work builds on past techniques by also using an "open world" assumption. We also ask, what are the relationships between data fields that would need to be made (e.g., by making associations from external datasets) in order to reveal certain information? Alternatively, what associations need to be protected in order to conceal certain information? Finally, given policy constraints by the different stakeholders (e.g., the person who the data that describes, operational personnel, and research personnel), can dataset X be sanitized in a way that satisfies the policies of all of those people, or would certain compromises to one or more policies need to be made? If so, what?Researchers involved: Faculty:
Sponsor: Institute for Information Infrastructure Protection (I3P) Publications resulting from this project:
Personal use of the material posted on this page is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the original publishers. This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
Last modified: Sunday, 30-Sep-2018 10:15:30 PDT |