08.21.08 Thu.
|
- We will
discuss the current privacy issues and some related privacy laws.
- Murat
will lead the discussion based on the following papers :
|
08.26.08 Tue.
|
- Overview of current privacy laws. We
will focus on HIPAA law.
- Murat will lead the discussion.
|
08.28.08 Thu.
|
- Formal
privacy definitions: k-anonymity and
l-diversity
- Murat will
lead the discussion based on the following papers:
|
09.02.08 Tue.
|
- Formal
privacy definitions cont.: t-closeness and m-invariance
- Mustafa
and Tyrone will
lead the discussion based on the following papers:
|
09.04.08 Thu.
|
- Formal privacy
definitions cont. : differential privacy
- Murat will lead the
discussion based on the following paper:
|
09.09.08 Tue.
|
- Other anonymization techniques.
- Philip and Raymond will lead the discussion based on
the following
papers:
|
09.11.08 Thu.
|
- Statistical
Database Security
- Ali will lead the discussion based on the first three
sections of the following paper:
|
09.16.08 Tue.
|
- Statistical Database Security
- Scott will lead the discussion based on the sections
4,5,6,7 and 8 of the following paper:
|
09.18.08 Thu.
|
- Crypto techniques for privacy-preserving data mining
- Murat will lead the discussion based on the following
book chapter:
- "A Survey of Privacy-preserving Methods Across
Horizontally Partitioned Data" by Kantarcioglu
|
09.23.08 Tue.
|
- Crypto techniques for privacy-preserving data mining
- Murat will lead the discussion based on the
following
book chapter:
- "A Survey of Privacy-preserving Methods Across
Vertically Partitioned Data" by Vaidya
|
09.25.08 Thu.
|
- Crypto techniques for privacy-preserving data mining
- Murat will lead the discussion based on the following
papers:
|
09.30.08 Tue.
|
- Data perturbation based techniques for
privacy-preserving data
mining
- Zhong and Vishwath will lead the discussion based on
the following
papers:
|
10.02.08 Thu.
|
- Data perturbation based techniques
for privacy-preserving data
mining
- Scott will lead the discussion based
on
the following papers:
|
10.07.08 Tue.
|
- Data perturbation techniques for
privacy-preserving data
mining
- Richard and Zhong will lead the
discussion based on
the following papers:
|
10.09.08 Thu.
|
- Social network data privacy
- Robert will lead the discussion based
on
the following papers:
|
10.14.08 Tue.
|
- Social network data privacy
- Raymond and Murat will lead the
discussion
based on the following papers:
|
10.16.08 Thu.
|
- Social network data privacy
- Murat will lead the discussion based
on the following papers:
|
10.21.08 Tue.
|
- Social network data privacy
- Murat will lead the discussion based
on the following papers:
|
10.23.08 Thu.
|
- Health-care data privacy
- Tyrone will lead the discussion based
on
the following paper:
|
10.28.08 Tue.
|
- Health-care data privacy
- Mustafa and Richard will lead the
discussion based on
the following papers:
|
10.30.08 Thu.
|
- Privacy issues related to Surfing
the internet
- Philip will lead the discussion based
on
the following papers:
|
11.04.08 Tue.
|
- Identity Theft
- Vishwath will
lead the discussion
based on
the following papers:
|
11.06.08 Thu.
|
- Privacy issues related to Homeland
Security
- Ali will lead the discussion based on
the following papers:
|
11.11.08 Tue.
|
- Privacy issues related to location
aware services
- Robert will lead the discussion based
on
the following papers:
|
11.13.08 Thu.
|
- Privacy economics
- Murat will lead the discussion based on the following papers:
|
11.18.08 Tue.
|
- Privacy economics
- Murat will lead the discussion based
on the following paper:
|
11.20.08 Thu.
|
- Future of Data privacy
- Project Presentation: Ali
|
11.25.08 Tue.
|
- Project presentation: Scott
- Project presentation: Mustafa
- Project presentation: Richard
|
11.27.08 Thu.
|
|
12.02.08 Tue.
|
- Project presentation: Tyronne
- Project presentation: Zhong
- Project presentation: Raymond
|
12.04.08
Thu. |
- Project presentation: Philip
- Project presentation: Robert
- Project presentation: Vishwath
|