Division of Computer and Network Systems (CNS)
group_project
Submitted by Matthew Wright on Sun, 04/22/2018 - 8:45pm
Overlay anonymity systems like Tor are effective against many kinds of attacks on privacy, but they have significantly slower network performance than regular Internet traffic. The purpose of this project is to explore the design of anon.next, an anonymity system for the next-generation Internet. In anon.next, we embed anonymizing proxies into new Internet architectures, so that the network itself can provide efficient and effective privacy protection in a way that overlay designs cannot. This project seeks to make major advances in two areas key to the design of anon.next.
group_project
Submitted by taugust on Sun, 04/22/2018 - 8:42pm
Security risks associated with software that communicates over networks have become an increasingly costly problem for consumers, firms, and governments. A key characteristic of any interconnected system (e.g., network software such as Apache HTTP server, the smart grid, and airline baggage operations) is that choices made in the design, deployment, and usage of these systems can have significant implications for security risk.
group_project
Submitted by Tadayoshi Kohno on Sun, 04/22/2018 - 8:31pm
Modern automobiles are no longer mere mechanical devices; they are pervasively monitored and controlled by dozens of digital computers coordinated via internal vehicular networks and bridged to external networks as well. While this transformation has driven major advancements in efficiency, safety and convenience, it has also introduced a broad range of new potential risks.
group_project
Submitted by Marianne Winslett on Sun, 04/22/2018 - 7:42pm
Traditional security authorization decisions are black and white: a user either satisfies a particular access policy or does not. This rigidity is a handicap in our complex and unpredictable world. As a result, even security-conscious organizations typically grossly overprovision principals with access rights and/or underconstrain access policies to ensure that principals can always carry out the organization's mission effectively and respond to unexpected opportunities and challenges.
group_project
Submitted by Bradley Malin on Sun, 04/22/2018 - 7:39pm
Insufficient attention has been given to enterprise Identity and Access Management (IAM) as a process that needs to be carried out on a continuing basis in the presence of change and evolution. In particular, there is little formal support for how IAM can exploit experience the enterprise collects over time.
group_project
Submitted by David Liebovitz on Sun, 04/22/2018 - 7:30pm
Insufficient attention has been given to enterprise Identity and Access Management (IAM) as a process that needs to be carried out on a continuing basis in the presence of change and evolution. In particular, there is little formal support for how IAM can exploit experience the enterprise collects over time.
group_project
Submitted by Gerome Miklau on Sun, 04/22/2018 - 7:28pm
The goal of this research project is to enable statistical analysis and knowledge discovery on networks without violating the privacy of participating entities. Network data sets record the structure of computer, communication, social, or organizational networks, but they often contain highly sensitive information about individuals. The availability of network data is crucial for analyzing, modeling, and predicting the behavior of networks.
group_project
Submitted by Marguerite Zarrillo on Sun, 04/22/2018 - 7:25pm
Pay-as-you-Go investigates security and privacy for Integrated Transportation Payment Systems (ITPS). The research addresses integrated payments for trains, subways, buses, ferries, and recharging of electric cars, as well as toll collection for roads, bridges, and tunnels. Multi-disciplinary aspects include novel cryptographic protocols and lightweight implementations of privacy-preserving payment systems. Challenges include providing security and privacy in a low-cost, usable, and reliable manner.
group_project
Submitted by Adam Lee on Sun, 04/22/2018 - 7:22pm
Traditional security authorization decisions are black and white: a user either satisfies a particular access policy or does not. This rigidity is a handicap in our complex and unpredictable world. As a result, even security-conscious organizations typically grossly overprovision principals with access rights and/or underconstrain access policies to ensure that principals can always carry out the organization's mission effectively and respond to unexpected opportunities and challenges.
group_project
Submitted by Anna Lysyanskaya on Sun, 04/22/2018 - 7:20pm
Pay-as-you-Go investigates security and privacy for Integrated Transportation Payment Systems (ITPS). The research addresses integrated payments for trains, subways, buses, ferries, and recharging of electric cars, as well as toll collection for roads, bridges, and tunnels. Multi-disciplinary aspects include novel cryptographic protocols and lightweight implementations of privacy-preserving payment systems. Challenges include providing security and privacy in a low-cost, usable, and reliable manner.