| 3/2/2017 |
What is privacy? Why it matters? Case Studies. |
|
Read:
- Privacy and IoT, Gilad Rosner, O’Reily
- Such et al, “A Survey of Privacy in MAS”, Knowledge Engineering Review, 2012
|
| 7/2/2017 |
Privacy Policies: Specification, Requirements, Languages
(Role-Based Access Control, XACML, P3P, Relation-Based Access Control) |
|
Read:
- S Gurses, C Diaz, "Two tales of privacy in online social networks", IEEE Security & Privacy, 11 (3), 29-37
- Fong, Philip WL. "Relationship-based access control: protection model and policy language." Proceedings of the first ACM conference on Data and application security and privacy. ACM, 2011.
|
| 14/2/2017 |
Privacy Policies: Specification, Requirements, Languages
(Collaborative approaches)
|
|
- Hu, H., Ahn, G.J. and Jorgensen, J., 2013. Multiparty access control for online social networks: model and mechanisms. Knowledge and Data Engineering, IEEE Transactions on, 25(7), pp.1614-1627.
- Kökciyan, N., & Yolum, P. (2016). P ri G uard: A Semantic Approach to Detect Privacy Violations in Online Social Networks. IEEE Transactions on Knowledge and Data Engineering, 28(10), 2724-2737.
|
| 21/2/2017 |
Preventing Privacy Violations (Agreement Technologies) |
|
Read:
- Squicciarini, A. C., Shehab, M., & Paci, F. (2009, April). Collective privacy management in social networks. In Proceedings of the 18th international conference on World wide web (pp. 521-530). ACM.
- Such, J. M., & Rovatsos, M. (2016). Privacy Policy Negotiation in Social Media. ACM Transactions on Autonomous and Adaptive Systems, 11(1),
|
| 28/2/2017 |
Detecting Privacy Violations (Agreement Technologies) |
|
Read:
- J. M. Such, N. Criado. Resolving Multi-party Privacy Conflicts in Social Media. IEEE Transactions on Knowledge and Data Engineering. In press
- N. Kokciyan, N. Yagikci, P. Yolum. An Argumentation Approach for Resolving Privacy Disputes in Online Social Networks. ACM Transactions on Internet Technology, To appear.
|
| 7/3/2017 |
Detecting Privacy Violations (Learning) |
|
Read:
Vanetti, M., Binaghi, E., Ferrari, E., Carminati, B., & Carullo, M. (2013). A system to filter unwanted messages from OSN user walls. IEEE Transactions on Knowledge and data Engineering, 25(2), 285-297.
Squicciarini, A. C., Lin, D., Sundareswaran, S., & Wede, J. (2015). Privacy policy inference of user-uploaded images on content sharing sites. IEEE transactions on knowledge and data engineering, 27(1), 193-206.
|
| 14/3/2017 |
Setting Privacy Constraints |
|
Read:
- Fang, L., & LeFevre, K. (2010, April). Privacy wizards for social networking sites. In Proceedings of the 19th international conference on World wide web (pp. 351-360). ACM.
- Klemperer, P., Liang, Y., Mazurek, M., Sleeper, M., Ur, B., Bauer, L., ... & Reiter, M. (2012, May). Tag, you can see it!: Using tags for access control in photo sharing. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 377-386). ACM.
|
| 21/3/2017 |
Self-Censorship for Privacy |
|
Read:
-
Lampinen, A., Lehtinen, V., Lehmuskallio, A., & Tamminen, S. (2011, May). We're in it together: interpersonal management of disclosure in social network services. In Proceedings of the SIGCHI conference on human factors in computing systems (pp. 3217-3226). ACM.
-
Sleeper, M., Balebako, R., Das, S., McConahy, A. L., Wiese, J., & Cranor, L. F. (2013, February). The post that wasn't: exploring self-censorship on facebook. In Proceedings of the 2013 conference on Computer supported cooperative work (pp. 793-802). ACM.
|
| 28/3/2017 |
Social Network Analysis for Privacy |
|
Read:
- Akcora, Cuneyt, Barbara Carminati, and Elena Ferrari. "Privacy in social networks: How risky is your social graph?." In Data Engineering (ICDE), 2012 IEEE 28th International Conference on, pp. 9-19. IEEE, 2012.
- Strufe, Thorsten. "Safebook: A privacy-preserving online social network leveraging on real-life trust." IEEE Communications Magazine (2009): 95.
|
| 4/4/2017 |
Recommending Privacy Settings |
|
Read:
- Ilia, P., Carminati, B., Ferrari, E., Fragopoulou, P., & Ioannidis, S.(2017, March). SAMPAC: Socially-Aware collaborative Multi-Party Access Control. In Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy (pp. 71-82). ACM
- Albertini, D. A., Carminati, B., & Ferrari, E. (2016, November). Privacy Settings Recommender for Online Social Network. In Collaboration and Internet Computing (CIC), 2016 IEEE 2nd International Conference on (pp.514-521). IEEE.
|
| 11/4/2017 |
Distributed OSN Architecutes |
|
-
Paul, Thomas, Antonino Famulari, and Thorsten Strufe. "A survey on decentralized online social networks." Computer Networks 75 (2014): 437-452.
|
| 18/4/2017 |
Spring Break |
|
|
| 25/4/2017 |
Learning Privacy Requirements |
|
|
| 2/5/2017 |
Project Presentations |
|
|
| 9/5/2017 |
|
|
|