DIMACS/DyDAn Workshop on Internet Privacy: Facilitating Seamless Data Movement with Appropriate Controls

September 18 - 19, 2008
DIMACS Center, CoRE Building, Rutgers University, Piscataway, NJ

Dan Boneh, Stanford University, dabo at cs.stanford.edu
Ed Felten, Princeton University, felten at cs.princeton.edu
Helen Nissenbaum, New York University, helen.nissenbaum at nyu.edu
Presented under the auspices of the DIMACS Special Focus on Algorithmic Foundations of the Internet, the DIMACS Special Focus on Communication Security and Information Privacy and the Center for Dynamic Data Analysis (DyDAn).

In current fielded systems such as SSL and IPsec, "privacy'' is mostly about encrypting data in transit from one party to another, so that eavesdroppers cannot overhear it. However, this approach to sensitive information has proved inadequate for the kinds of activities now taking place on the Internet. There are growing concerns over the amount of information being collected by data brokers, as well as concerns about the ability of merchants, banks, and the large data brokers themselves to secure that information from malicious use. The problem is compounded by the fact that there are multiple stakeholders---such as data subjects, data owners, data collectors, and data service providers---and these stakeholders may have differing views about which uses are appropriate and which are not.

A number of steps towards solutions have been proposed, including various mechanisms for balancing privacy and accountability, privacy- preserving data mining, privacy enforcement, and privacy policy languages and frameworks. Working towards a complete solution to this problem, this workshop will address technical issues, such as the application of cryptography to allow selected uses and disallow others; mechanisms for policy enforcement and policy reconciliation in a decentralized, distributed setting; and the massive scale of modern databases. It will also to address social, philosophical, and legal issues to determine which kinds of controls should be considered appropriate, how technology and public policy can interact to achieve privacy goals, and when and how law enforcement or domestic security needs affect the architecture requirements for deployed networks and database systems.

We are soliciting contributed talks. Please see the call for papers.

Workshop topics include (but are not limited to):

Next: Call for Participation
Workshop Index
DIMACS Homepage
Contacting the Center
Document last modified on May 1, 2008.