Large

group_project

Visible to the public TWC: Large: Collaborative: Computing Over Distributed Sensitive Data

Information about individuals is collected by a variety of organizations including government agencies, banks, hospitals, research institutions, and private companies. In many cases, sharing this data among organizations can bring benefits in social, scientific, business, and security domains, as the collected information is of similar nature, of about similar populations. However, much of this collected data is sensitive as it contains personal information, or information that could damage an organization's reputation or competitiveness.

group_project

Visible to the public Spreading SEEDs: Large-Scale Dissemination of Hands-on Labs for Security Education

This capacity building project seeks to addresses the lack of opportunities for students for experiential learning of Cybersecurity. Although there is no overall shortage of labs anymore, many instructors do not feel comfortable using them in their courses. This project has a potential to help many instructors to provide hands-on learning opportunities to their students. The project is based on the 30 SEED labs, which were developed and tested by the PI over the last ten years and are used by over 150 instructors from 26 countries.

group_project

Visible to the public NeTS: Large: Collaborative Research: Measuring and Modeling the Dynamics of IPv4 Address Exhaustion

Today's Internet has some 1.7 billion users, fosters an estimated $1.5 trillion in annual global economic benefits, and is widely agreed to offer a staggering array of societal benefits. The network sees enormous demand---on the order of 40 Tbps of inter-domain traffic and an annual growth rate of 44.5%. Remarkably, in spite of the Internet's importance and rapid growth, the core protocols that support its basic functions (i.e., addressing, naming, routing) have seen little fundamental change over time.

group_project

Visible to the public TC: Large: Collaborative Research: Privacy-Enhanced Secure Data Provenance

Data provenance refers to the history of the contents of an object and its successive transformations. Knowledge of data provenance is beneficial to many ends, such as enhancing data trustworthiness, facilitating accountability, verifying compliance, aiding forensics, and enabling more effective access and usage controls. Provenance data minimally needs integrity assurance to realize these benefits.

group_project

Visible to the public TC: Large: Collaborative Research: Practical Secure Two-Party Computation: Techniques, Tools, and Applications

Many compelling applications involve computations that require sensitive data from two or more individuals. For example, as the cost of personal genome sequencing rapidly plummets many genetics applications will soon be within reach of individuals such as comparing one?s genome with the genomes of different groups of participants in a study to determine which treatment is likely to be most effective. Such comparisons could have tremendous value, but are currently infeasible because of the privacy concerns both for the individual and study participants.

group_project

Visible to the public TC: Large: Collaborative Research: Privacy-Enhanced Secure Data Provenance

Data provenance refers to the history of the contents of an object and its successive transformations. Knowledge of data provenance is beneficial to many ends, such as enhancing data trustworthiness, facilitating accountability, verifying compliance, aiding forensics, and enabling more effective access and usage controls. Provenance data minimally needs integrity assurance to realize these benefits.

group_project

Visible to the public TC: Large: Collaborative Research: Practical Secure Two-Party Computation: Techniques, Tools, and Applications

Many compelling applications involve computations that require sensitive data from two or more individuals. For example, as the cost of personal genome sequencing rapidly plummets many genetics applications will soon be within reach of individuals such as comparing one?s genome with the genomes of different groups of participants in a study to determine which treatment is likely to be most effective. Such comparisons could have tremendous value, but are currently infeasible because of the privacy concerns both for the individual and study participants.

group_project

Visible to the public TC: Large: Securing the Open Softphone

Mobile phones are in the midst of a dramatic transformation; they are becoming highly powerful sensor-rich software-controlled computing and communication devices. These "softphones" are increasingly entrusted with maintaining users' electronic identity, calendars, social networks, and even bank accounts. However, the vast increases in the flexibility of softphones comes with equally large security issues and opportunities, some of which we are only beginning to understand.

group_project

Visible to the public TC: Large: Nudging Users Towards Privacy

Making the "right'' privacy decision --- that is, balancing revelation and protection of personal information in ways that maximize a user's welfare --- is difficult. The complexity is such that our judgments in this area are prone to errors, leading to decisions that we may later stand to regret. These errors stem from lack of information or computational ability; but also from problems of self-control and limited self-insight.

group_project

Visible to the public TC: Large: Collaborative Research: Practical Privacy: Metrics and Methods for Protecting Record-level and Relational Data

Safely managing the release of data containing confidential information about individuals is a problem of great societal importance. Governments, institutions, and researchers collect data whose release can have enormous benefits to society by influencing public policy or advancing scientific knowledge. But dissemination of these data can only happen if the privacy of the respondents' data is preserved or if the amount of disclosure is limited.