Division of Information & Intelligent Systems (IIS)

group_project

Visible to the public TC: Small: Towards Automating Privacy Controls for Online Social Networks

For millions of Internet users today, controlling information access on Online Social Networks (OSNs) such as Facebook and LinkedIn is a difficult challenge. Privacy controls in current systems do not provide the necessary level of flexibility and usability to their users. Some systems like MySpace and LinkedIn allow users to grant all-or-nothing access control to their profiles. While simple to use, these controls are imprecise and can easily leak data to unintended recipients or prevent the legitimate sharing of data.

group_project

Visible to the public TC:Small: A Formal Inter-Disciplinary Study of the Impact of Security Awareness Efforts on User Behavior

Given the diverse and complex nature of computer security, a natural response of the academic and industrial community has been to study how one can create technical solutions to the problem. Although the technical solutions to various problems can be quite effective, the underlying premise of many of the solutions is predicated upon an informed awareness of the user of the importance of avoiding risky behavior.

group_project

Visible to the public TC: Small: Online Privacy and Senior Citizens: A Socio-Technical Multi-Perspective Framework for Trustworthy Operations

This projects investigates the external and internal factors (e.g., demographic, personal, and psychological aspects) that impact senior citizens' online privacy behavior. The multi-perspective approach to address this question consists of surveys (standardized), intensive in-person interviews, focus groups, key stroke logging and log analysis and scenario based questionnaires to understand online privacy behavior and attitude.

group_project

Visible to the public CT-ISG: Collaborative Research: Router Models and Downscaling Tools for Scalable Security Experiments

It is critical to protect the Internet from attacks such as denial of service, and attacks on inter-domain routing. Although several defenses have been proposed, actual deployments have been limited. A primary reason for this lack of deployment is that most defenses have not been validated under realistic conditions, or at sufficiently large scales. Many attacks also have second-order effects that are not well understood. This is because it is difficult to incorporate all the protocols involved at any reasonable scale in analytical, simulation, or emulation models or testbeds.

group_project

Visible to the public CT-ISG: Collaborative Research: Router Models and Downscaling Tools

It is critical to protect the Internet from attacks such as denial of service, and attacks on inter-domain routing. Although several defenses have been proposed, actual deployments have been limited. A primary reason for this lack of deployment is that most defenses have not been validated under realistic conditions, or at sufficiently large scales. Many attacks also have second-order effects that are not well understood. This is because it is difficult to incorporate all the protocols involved at any reasonable scale in analytical, simulation, or emulation models or testbeds.

group_project

Visible to the public CT-T: Goal-Oriented Privacy-Preservation

Access to many important datasets in health care, biomedical informatics, sociology, and homeland security is restricted by HIPAA regulations on the release of detailed "microdata", impeding basic research in fields dependent on such data, and the problem will only get worse as more medical data is collected. A primary focus of this project is to "unlock" such critical datasets by developing techniques and tools to anonymize very large databases. Such tools will facilitate the release of datasets to researchers, while insuring that the privacy of individuals is maintained.

group_project

Visible to the public TC: Small: Scalable Censorship Resistant Overlay Networks

Freedom of speech is a founding principle of democratic society, and the Internet has become one of the most effective and common means of conveying expression that is likely to be controversial or suppressed. One threat to the freedom of speech online is the now widespread practice of Internet censorship by both private and state interests. These censors use a variety of social and technological means to limit availability or expression of information, stifling the democratic process.

group_project

Visible to the public EAGER: Usable Location Privacy in Geo-Social Networks

This project is focused on a potentially transformational research study involving the simultaneous investigation of usability and security/privacy technologies for location-based geo-social applications, with the objective of studying the usability, feasibility, and scalability of privacy-preserving and secure location-aware geo-social networking platforms for mobile devices. The approach is based on a belief that usability and security/privacy are addressed properly and most effectively from the start.

group_project

Visible to the public EAGER: Privacy with Respect to Private Corporations in the 21st Century: Legal and Computer Security Issues

This project addresses the question: What privacy rules should bind private corporations? It does so through a collaboration between a legal scholar knowledgeable about computer science issues and a computer scientist knowledgeable about legal and policy issues. The common themes running

group_project

Visible to the public EAGER: Quantifying Information Security Risks in Complex Systems at the Interface of Users, Policies, and Technologies

This proposal represents an opportunity to seed a highly innovative interdisciplinary research project that has the potential for significant practical and theoretical impact for the management of information security ? an area which is receiving more and more public attention. During the past decade, research in information security has expanded from a purely technical focus to a more general technology-economic focus.