[Busec] [BUsec] meeting on Tuesday cancelled
goldbe at cs.bu.edu
Sun Feb 19 09:55:01 EST 2012
Unfortunately, our Tuesday speaker (Shyam Gollakota) had to cancel, so we
will have no group meeting this week. We pick up again the following
Thursday 11am in MCS148 with David Xiao visiting from France and the
following Tuesday 11am with our own Ben Fuller. In the meantime, I'm
re-forwarding info about the CIS seminar with Burt Kaliski at MIT on
Thursday at 4PM.
Calendar here, and abstracts below.
Title: Privacy, incentives, and truthfulness.
Speaker: David Xiao
Thursday March 1, 11AM
Abstract: Privacy has become an ever more pressing concern as we
conduct more and more of our lives in public forums such as the
Internet. One privacy question that has received much study is how a
database curator may output "sanitized" data that does not reveal too
much information about any particular individual. This criteria has
been formalized as differential privacy, proposed originally by Dwork
et al. (TCC '06 and ICALP '06), which captures the idea that "the
presence or absence of any individual's data does not change the
distribution of the sanitized data by much". This guarantee has been
interpreted to mean that individuals should be comfortable revealing
their information, since their participation barely changes the
In this talk, we advocate combining the study of privacy in
conjunction with game theory, since individuals need to be motivated
by some incentive in order to part with their private information. We
focus on the notion of truthfulness, which says that a mechanism
should be designed so that it is in the individuals' own interest to
give their true information. We show that there exist games for which
differentially private mechanisms, in particular the exponential
mechanism of McSherry and Talwar (FOCS '07), do not motivate the
individuals to participate truthfully. On the positive side, we show
that a wide class of games do admit differentially
private, truthful, and efficient mechanisms.
Finally, we explore the possibility of tradeoffs between utility and
privacy. This is because individuals may be willing to give up some
privacy if they receive enough utility from a game, and vice versa. We
show that, under a natural measure of information cost, certain
differentially private mechanisms such as releasing a differentially
private histogram or a differentially private synthetic database may
reveal so much information that individuals would rather suffer the
consequences of lying rather than have their information published.
---------- Forwarded message ----------
From: Be Blackburn <be at csail.mit.edu>
Date: Fri, Feb 17, 2012 at 1:43 PM
Subject: [Cis-seminars] Verisign Information Session- Thurs, 2/23 in
32-882, Stata Center
To: cis-seminars at csail.mit.edu
Speaker: Dr. Burt Kaliski, CTO Verisign
Date: Thursday, Feb 23 4:00-5:00pm
Location: CSAIL Hewlett Reading Room, 8th floor 32-882
Verisign is one of the Internet’s original “cloud service providers.”
Launched out of RSA Data Security, the company was among the first to
offer public-key certificates over the Internet. Today, Verisign’s
primary business is the operation of the top-level authoritative
registries for the more 110 million domain names including .com, .net,
In this session, Dr. Burt Kaliski, Chief Technology Officer of
Verisign and an MIT Alumnus, will present an overview of Verisign Labs
including: innovation, applied research, and how Verisign engages
universities. Dr. Kaliski will discuss two current research projects:
• At Black Hat 2011, Artem Dinaburg introduced a “bit-squatting”
attack against DNS where an attacker registers new domain names that
differ by one bit from popular ones, in order to collect traffic
intended for those names when bit errors occur during communications
or storage. Verisign Labs’ analysis, based on actual DNS traffic data,
highlights some interesting features both of bit-error rates and of
the traffic to popular domain names and their single-bit variants.
• Attacks on certificate authorities are becoming a significant
concern. At the same time, DNSSEC has begun to be established as a
mechanism for securing information distributed in DNS records. The new
DANE protocol being developed in the IETF leverages DNSSEC to enable a
domain name owner to inform relying parties which certificates and
certificate authorities it trusts. Verisign Labs’ research in this
area illustrates effective ways to combine assurance that can be
provided by certificate authorities, with the assurance from DNS.
Dr. Kaliski will also share information about Verisign’s recently
announced Internet Infrastructure Grant Program
(http://www.verisigninc.com/grants) where Verisign is seeking
proposals for research topics focused on an Internet that is available
and secure in all countries, supporting a range of infrastructures,
given the reality that people and organizations are relying to a
growing extent on mobile devices of all kinds for their connectivity.
Dr. Burt Kaliski is the chief technology officer at Verisign, Inc. In
this role, he is responsible for the company’s long-term technology
vision. Dr. Kaliski is working with other executives to turn the
vision into near-term value for the company’s business units and
Prior to joining Verisign in 2011, Dr. Kaliski served as the founding
director of the EMC Innovation Network, the global collaboration among
EMC’s research and advanced technology groups and its university
partners. He joined EMC from RSA Security, where he served as vice
president of research and chief scientist.
Dr. Kaliski started his career at the RSA startup that came out of MIT
in the 1980s, where as the founding scientist of RSA Laboratories, his
contributions included the development of the Public-Key Cryptography
Standards (PKCS), now widely deployed for internet security.
Dr. Kaliski has held appointments as a guest professor at Wuhan
University's College of Computer Science, and as a guest professor and
member of the international advisory board of Peking University's
School of Software and Microelectronics. He has also taught at
Stanford University and Rochester Institute of Technology.
Dr. Kaliski is a trustee emeritus of the Massachusetts Technology
Leadership Council, and a member of the Institute of Electrical and
Electronics Engineers (IEEE) Computer Society and Tau Beta Pi. Dr.
Kaliski received his bachelor’s, master’s and Ph.D. degrees in
computer science from the Massachusetts Institute of Technology, where
his research focused on cryptography.
Cis-seminars mailing list
Cis-seminars at lists.csail.mit.edu
Computer Science, Boston University
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the Busec