CmpE 59B Sp. Tp. Privacy Manag. in Online Soc. Netw. 2017 Spring

Instructor: 

Course Schedule: 

TTT 234 BM A3 | BM A3 | BM A3

Course Program: 

Prerequisites

A working knowledge of  distributed systems, multiagent systems and artificial intelligence will considerably help. You will be doing various projects. You need to be fluent in one programming language, preferably in Java.

Course Work

Each meeting will have roughly one and a half hours of lecture and an hour of discussion on either previously assigned papers or on some systems. When you are assigned a paper, you are expected to write 400-500 words about each paper and turn it in as hard copy during class. Explain the problem the paper is addressing, its proposed solution, contribution, and your comments on the proposed approach. Everyone will do 3+ projects individually. The projects will constitute a significant part of this course. There will be in-class project presentations. There will be one take home final.

Tentative Schedule

Date Topic Class Work To-Do
3/2/2017  What is privacy? Why it matters? Case Studies.

Read:

  • Privacy and IoT, Gilad Rosner, O’Reily
  • Such et al, “A Survey of Privacy in MAS”, Knowledge Engineering Review, 2012
7/2/2017 Privacy Policies: Specification, Requirements, Languages
  (Role-Based Access Control, XACML, P3P, Relation-Based Access Control)

Read:

  • S Gurses, C Diaz, "Two tales of privacy in online social networks", IEEE Security & Privacy, 11 (3), 29-37
  • Fong, Philip WL. "Relationship-based access control: protection model and policy language." Proceedings of the first ACM conference on Data and application security and privacy. ACM, 2011.
14/2/2017

Privacy Policies: Specification, Requirements, Languages
 (Collaborative approaches)

  •  Hu, H., Ahn, G.J. and Jorgensen, J., 2013. Multiparty access control for online social networks: model and mechanisms. Knowledge and Data Engineering, IEEE Transactions on, 25(7), pp.1614-1627.
  • Kökciyan, N., & Yolum, P. (2016). P ri G uard: A Semantic Approach to Detect Privacy Violations in Online Social Networks. IEEE Transactions on Knowledge and Data Engineering, 28(10), 2724-2737.
21/2/2017 Preventing Privacy Violations (Agreement Technologies)  

Read:

  • Squicciarini, A. C., Shehab, M., & Paci, F. (2009, April). Collective privacy management in social networks. In Proceedings of the 18th international conference on World wide web (pp. 521-530). ACM.
  • Such, J. M., & Rovatsos, M. (2016). Privacy Policy Negotiation in Social Media. ACM Transactions on Autonomous and Adaptive Systems11(1),
28/2/2017 Detecting Privacy Violations (Agreement Technologies)

Read:

  • J. M. Such, N. Criado.  Resolving Multi-party Privacy Conflicts in Social Media. IEEE Transactions on Knowledge and Data Engineering. In press
  • N. Kokciyan, N. Yagikci, P. Yolum. An Argumentation Approach for Resolving Privacy Disputes in Online Social Networks. ACM Transactions on Internet Technology, To appear.

 

7/3/2017 Detecting Privacy Violations (Learning)  

Read:

Vanetti, M., Binaghi, E., Ferrari, E., Carminati, B., & Carullo, M. (2013). A system to filter unwanted messages from OSN user walls. IEEE Transactions on Knowledge and data Engineering, 25(2), 285-297.

Squicciarini, A. C., Lin, D., Sundareswaran, S., & Wede, J. (2015). Privacy policy inference of user-uploaded images on content sharing sites. IEEE transactions on knowledge and data engineering, 27(1), 193-206.

14/3/2017 Setting Privacy Constraints

Read:

  • Fang, L., & LeFevre, K. (2010, April). Privacy wizards for social networking sites. In Proceedings of the 19th international conference on World wide web (pp. 351-360). ACM.
  • Klemperer, P., Liang, Y., Mazurek, M., Sleeper, M., Ur, B., Bauer, L., ... & Reiter, M. (2012, May). Tag, you can see it!: Using tags for access control in photo sharing. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 377-386). ACM.
21/3/2017  Self-Censorship for Privacy

Read:

  • Lampinen, A., Lehtinen, V., Lehmuskallio, A., & Tamminen, S. (2011, May). We're in it together: interpersonal management of disclosure in social network services. In Proceedings of the SIGCHI conference on human factors in computing systems (pp. 3217-3226). ACM.
  • Sleeper, M., Balebako, R., Das, S., McConahy, A. L., Wiese, J., & Cranor, L. F. (2013, February). The post that wasn't: exploring self-censorship on facebook. In Proceedings of the 2013 conference on Computer supported cooperative work (pp. 793-802). ACM.
 
28/3/2017  Social Network Analysis for Privacy  

Read:

  • Akcora, Cuneyt, Barbara Carminati, and Elena Ferrari. "Privacy in social networks: How risky is your social graph?." In Data Engineering (ICDE), 2012 IEEE 28th International Conference on, pp. 9-19. IEEE, 2012.
  • Strufe, Thorsten. "Safebook: A privacy-preserving online social network leveraging on real-life trust." IEEE Communications Magazine (2009): 95.
4/4/2017 Recommending Privacy Settings   Read:
  • Ilia, P., Carminati, B., Ferrari, E., Fragopoulou, P., & Ioannidis, S.(2017, March). SAMPAC: Socially-Aware collaborative Multi-Party Access Control. In Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy (pp. 71-82). ACM
  • Albertini, D. A., Carminati, B., & Ferrari, E. (2016, November). Privacy Settings Recommender for Online Social Network. In Collaboration and Internet Computing (CIC), 2016 IEEE 2nd International Conference on (pp.514-521). IEEE.

 

11/4/2017 Distributed OSN Architecutes
  • Paul, Thomas, Antonino Famulari, and Thorsten Strufe. "A survey on decentralized online social networks." Computer Networks 75 (2014): 437-452.
18/4/2017 Spring Break    
25/4/2017  Learning Privacy Requirements    
2/5/2017 Project Presentations    
9/5/2017      

 

Bize Ulaşın

Bilgisayar Mühendisliği Bölümü, Boğaziçi Üniversitesi,
34342 Bebek, İstanbul, Türkiye

  • Telefon: +90 212 359 45 23/24
  • Faks: +90 212 2872461
 

Bizi takip edin

Sosyal Medya hesaplarımızı izleyerek bölümdeki gelişmeleri takip edebilirsiniz