Protecting Privacy in Terrorist Tracking Applications - PowerPoint PPT Presentation

1 / 5
About This Presentation
Title:

Protecting Privacy in Terrorist Tracking Applications

Description:

Earlier life: MLS databases. Detect inference channels from unclassified to classified data ... Search through (encrypted) logs to prove abuse. Trust issues ... – PowerPoint PPT presentation

Number of Views:40
Avg rating:3.0/5.0
Slides: 6
Provided by: teres51
Category:

less

Transcript and Presenter's Notes

Title: Protecting Privacy in Terrorist Tracking Applications


1
Protecting Privacy in Terrorist Tracking
Applications
  • Teresa Lunt, PI

Jessica Staddon, Dirk Balfanz Glenn Durfee, Tomas
Uribe (SRI) Diana Smetters, Jim Thornton Paul
Aoki, Brent Waters (intern) David Woodruff
(intern)
2
Privacy Appliance
  • Standalone devices
  • Under private control
  • Better assurance of correct operation
  • Sits between the analyst and each private data
    source
  • Easily added to an enterprises computing
    infrastructure
  • Like firewalls
  • Benefits
  • Private data stays in private hands
  • Privacy controls isolated from the government

3
Access Control
4
Inference Tool
  • Earlier life MLS databases
  • Detect inference channels from unclassified to
    classified data
  • Now Privacy-Protection
  • Detect inference channels from non-sensitive to
    sensitive data
  • Example
  • Select count(name) where gender female
  • Select avg(grade) where gender female

1
5
Systems Issues
  • Logging
  • Log classified stuff at third-party sites!
  • Search through (encrypted) logs to prove abuse.
  • Trust issues
  • Finally a legitimate use for Palladium!
  • This is a big system!
Write a Comment
User Comments (0)
About PowerShow.com