Can Data Provenance Put an End to the Data Breach?
Abstract: In a provenance-aware system, mechanisms gather and report metadata that describes the history of each data object being processed, allowing...
Can Data Provenance Put an End to the Data Breach?
Abstract: In a provenance-aware system, mechanisms gather and report metadata that describes the history of each data object being processed, allowing...
Title: Rethinking Large-Scale Consensus
Abstract: Although distributed consensus has been studied by for three decades, they were not deployed at a large scale until decentralized cryptocurrencies like Bitcoin....
https://umass-amherst.zoom.us/j/96561938920
Title: Randomness Concerns When Deploying Differential Privacy
Simson L. Garfinkel
Senior Computer Scientist
US Census Bureau
Abstract: ...
https://umass-amherst.zoom.us/j/96561938920
Title:
Security & Perception Systems
Abstract:
The advent of the Internet-of-Everything era has opened the doors to security vulnerabilities...
Matt Carter and Flemming Christensen will discuss a high-level overview of Oracle and what they do, tuning a Web Application Firewall to reduce false positives and how to test it, monitoring configuration drift of Infra...
Professor Levine will introduce some of the amazing security, privacy, and forensics research performed by professors and students at UMass Amherst. He will provide a high-level tour of topics such as digital forensics...
Digital technologies, such as mobile devices, IoT devices, social virtual reality, and social networks, play an increasingly significant role in both perpetrating harm to, and creating opportunities for, vulnerable...
The abundance of data, coupled with cheap and widely-available computing and storage, has revolutionized science, industry and government. Now, to a large extent, the bottleneck to obtaining actionable insights lies with...
Algorithmic and data-driven technologies have permeated multiple aspects of our lives making it difficult to be disentangled from the effects of its abuses as well. Moreover, the opaqueness of these technologies...