CS 465/765 Privacy in a Networked World

CS 465A / CS 765A Privacy in a Networked World

Prof. Rebecca Wright
Spring 2005

Time: Tuesday and Thursdays, 9:30am - 10:45am
Location: Tuesdays, Burchard 430
Thursdays, Pierce 116

In addition to this web page, the course mailing list is a primary source for announcements and other course information. All students in the course should be subscribed to the list.

Course description

Go to: Syllabus | Reading and other resources | Grading | Projects

Increasing use of computers and networks in business, government, recreation, and almost all aspects of daily life has led to a proliferation of online sensitive data, i.e., data that, if used improperly, can harm the data subjects. As a result, concern about the ownership, control, privacy, and accuracy of these data has become a top priority. This course focuses on both the technical challenges of handling sensitive data and the policy and legal issues facing data subjects, data owners, and data users.

Specific topics to be discussed may include:

This course is suitable for advanced undergraduate computer science majors, graduate students in computer science, and students in technology management or other majors with some computer science background. Course readings will draw on a variety of sources, including both technical materials and the popular press. The course will include a privacy-related project. Projects are largely student-directed, and can include activities such as a programming project, a research paper describing new results (or documenting failed attempts to obtain such results), a survey article describing the state of the art in a particular research area, or an article suitable for the popular press.

We will start some of our class meetings with a discussion of one or more privacy-related case studies. For each, we will frame our discussion around a series of questions. Please bring the questions with you to every class.

Grading

Half of your grade is determined by a course project, which is due in four "deliverables". 35% of your grade is based on your the quality and quantity of your participation in class discussion. Quantity without quality will be penalized. The remaining 15% of your grade is based on a 75-minute in-class final exam.

10% Project: initial proposals. Due Feb. 3
10% Project: revised proposals. Due Feb. 17
15% Project: status reports. Due Mar. 31
15% Project: final reports. Due Apr. 28
35% Class participation. Throughout
15% In-class final exam. May 3

Each project component is due at the start of class on the specified day. Lateness on any project deliverable will be penalized at a rate of 5% of the available points per day.

Syllabus

The following is a schedule showing class dates, assignment due dates, and a partial list of topics.

Date Topics Assigned Reading Material
Tues, Jan 18 What is privacy?
Thur, Jan 20 Cryptography basics Garfinkel, Chapters 1 and 2
Privacy Tradeoffs: Myth or Reality?
Tues, Jan 25 Discuss class projects Garfinkel, Chapters 3, 4, and 5
Thur, Jan 27 Threats to privacy Garfinkel, Chapters 6, 7, and 8
Tues, Feb 1 Approaches to protecting privacy Garfinkel, Chapters 9 and 10
Thur, Feb 3 Approaches to protecting privacy, cont'd
Initial project proposals due
Tues, Feb 8 Mix nets Garfinkel, Chapter 11
Untraceable electronic mail, return addresses, and digital pseudonyms, by David Chaum (see required reading for links).
Thur, Feb 10 Mix nets, cont'd
Initial project proposals returned
O'Harrow, Intro, Chapters 1 and 2
Tues, Feb 15 Case study: strip searches
Anonymous web browsing: Crowds
O'Harrow, Chapters 3, 4, and 5
Crowds: Anonymity for Web Transactions
Thur, Feb 17 Case study: Use of SSN as student ID
Anonymous web browsing, cont'd
Revised project proposals due
Tues, Feb 22 Monday schedule: No class
Thur, Feb 24 No class
Tues, Mar 1 Cancelled due to snow.
Revised project proposals returned
O'Harrow, Chapters 6, 7, and 8
Thur, Mar 3 P3P and related tools, I Chapter 1 of Web Privacy with P3P
Tues, Mar 8 P3P and related tools, II User Interfaces for Privacy Agents
O'Harrow, Chapter 9
Thur, Mar 10 P3P and related tools, III Specifying Privacy Policies with P3P and EPAL: Lessons Learned
O'Harrow, Chapter 10
Tues, Mar 15 national security and privacy, I The U.S. Department of Homeland Security's Privacy Office : the body of the 2004 annual report is required reading (linked under "The Body") from that page.
Thur, Mar 17 national security and privacy, II EPIC's Privacy Act of 1974 page.
EPIC's PATRIOT Act page.
Tues, Mar 22 Spring Break: No class
Thur, Mar 24 Spring Break: No class
Tues, Mar 29 Case study: RFID in the workplace
RFID and privacy
Radio-Frequency Identification: Security Risks and Challenges
(The case study document is not required reading, but is linked at left in case you want to read it.)
Thur, Mar 31 RFID, ctd.
health information and privacy
Project status reports due
Summary of the HIPAA Privacy Rule
Tues, Apr 5 Case study: medical records and health decisions
health information and privacy, ctd
Hippocratic Databases
Hippocratic Databases
Thur, Apr 7 census data and privacy, statistical databases
Project status reports returned
Security-control methods for statistical databases: a comparative study
(You should read pages 515-522 in detail, and can skim the rest.)
Tues, Apr 12 Guest lecturer: Michael Freedman, NYU
Anonymity systems and censorship-resistant systems
Protecting Freedom of Information Online with Freenet
Thur, Apr 14 privacy-preserving data mining, I From SIGKDD Explorations, Volume 4, Issue 2, you should read:
Data Mining, National Security, Privacy and Civil Liberties
Randomization in Privacy Preserving Data Mining
Cryptographic Techniques for Privacy-Preserving Data Mining
Tues, Apr 19 privacy-preserving data mining, II Experimental Analysis of Privacy-Preserving Statistics Computation, and
From SIGKDD Explorations, Volume 4, Issue 2, you should read:
Tools for Privacy Preserving Distributed Data Mining
Thur, Apr 21 Guest lecturer: Prof. Joan Feigenbaum, Yale University
Privacy and the Law
Privacy and Human Rights 2003 Overview
A term paper discussing conflicts between privacy legislation in different countries
Tues, Apr 26 Final project presentations
Class will run 30-40 minutes overtime.
Thur, Apr 28 Final project presentations
Final project reports due
Class will run 10 minutes overtime.
Tues, May 3 FINAL EXAM

Required Reading and Other Resources

Course readings will draw on a variety of sources, including both technical materials and the popular press.

Required reading:

You are responsible for reading the assigned material for each class before the class, so that you can participate fully in class discussions.

Additional required readings may be added later.

Other Resources:

Some readings and other resources you may find interesting and/or helpful for your project as below. More will be added throughout the semester.

Projects

Half of your grade will be determined by a privacy-related course project, which is due in four "deliverables", as detailed above. Projects are largely student-directed, and can include activities such as a programming project, a research paper describing new results (or documenting failed attempts to obtain such results), a survey article describing the state of the art in a particular research area, a "term paper", or an article suitable for the popular press. See more information about the projects, including a detailed description of your responsibilities and suggestions for possible projects.


Last updated 4/13/05 by
rwright (at) cs.stevens.edu
Copyright © 2005 Rebecca N. Wright