Instructor:
Course Schedule:
Course Program:
Prerequisites
A working knowledge of distributed systems, multiagent systems and artificial intelligence will considerably help. You will be doing various projects. You need to be fluent in one programming language, preferably in Java.
Course Work
Each meeting will have roughly one and a half hours of lecture and an hour of discussion on either previously assigned papers or on some systems. When you are assigned a paper, you are expected to write 400-500 words about each paper and turn it in as hard copy during class. Explain the problem the paper is addressing, its proposed solution, contribution, and your comments on the proposed approach. Everyone will do 3+ projects individually. The projects will constitute a significant part of this course. There will be in-class project presentations. There will be one take home final.
Tentative Schedule
Date | Topic | Class Work | To-Do |
---|---|---|---|
9/2/2016 | What is privacy? Why it matters? Case Studies. |
|
Read:
|
16/2/2016 | Privacy Policies: Specification, Requirements, Languages (Role-Based Access Control, XACML, P3P, Relation-Based Access Control) |
Read:
Fong, Philip WL. "Relationship-based access control: protection model and policy language." Proceedings of the first ACM conference on Data and application security and privacy. ACM, 2011.
|
|
23/2/2016 |
Privacy Policies: Specification, Requirements, Languages |
Read: Hu, H., Ahn, G.J. and Jorgensen, J., 2013. Multiparty access control for online social networks: model and mechanisms. Knowledge and Data Engineering, IEEE Transactions on, 25(7), pp.1614-1627. | |
1/3/2016 | Preventing Privacy Violations (Agreement Technologies) | Read: Such, J. M., & Rovatsos, M. (2016). Privacy Policy Negotiation in Social Media. ACM Transactions on Autonomous and Adaptive Systems, 11(1), | |
8/3/2016 | Detecting Privacy Violations (Data mining for personal information) | ||
15/3/2016 | Project Presentation | J. M. Such, N. Criado. Resolving Multi-party Privacy Conflicts in Social Media. IEEE Transactions on Knowledge and Data Engineering. In press | |
22/3/2016 | Detecting Privacy Violations (Graph-based approaches, Semantic approaches) |
Fang, Lujun, and Kristen LeFevre. "Privacy wizards for social networking sites." Proceedings of the 19th international conference on World wide web. ACM, 2010. | |
29/3/2016 | Learning Privacy Requirements | ||
5/4/2016 | Project Presentation |
|
|
12/4/2016 | Learning Privacy Requirements | ||
19/4/2016 | Spring Break | ||
26/4/2016 | Distributed OSN Architecutes |
|
|
3/5/2016 | Distributed OSN Architecutes | ||
10/5/2016 | Project Presentation |
Grading:
Paper Presentation | 15% |
Project | 30% |
Final | 25% |
Class Participation | 10% |
Paper Critiques | 20% |
Notes:
Academic Integrity
Please read the university policy on cheating and what counts as cheating. Do not copy your answers from other sources (including friends, or books). If you think the answer to a question exists in a book, then read the section carefully and write down the answer in your own words. The same policy holds for the project and the exams. Copying text from a source (including a Web page) will count as cheating even if you list the source in your references. NO EXCEPTIONS.