Principles and Applications of Secure Multiparty Computation

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Principles and Applications of Secure Multiparty Computation"

Transcription

1 Principles and Applications of Secure Multiparty Computation Krista Grothoff Lehrstuhl für Sicherheit in der Informatik/ I20 Prof. Dr. Claudia Eckert Technische Universtität München Krista Grothoff (Lehrstuhl I20, TUM) Principles and Applications of SMC / 30

2 Overview 1 Organisation and Requirements 2 Assessment 3 Course calendar 4 Literature Search 5 Seminar themes 6 Topic assignment 7 Next steps Krista Grothoff (Lehrstuhl I20, TUM) Principles and Applications of SMC / 30

3 Organisation Seminar will be conducted in the style of a scientific conference: 1 Orientation phase (ca. 2 weeks) 2 Report phase (ca. 4 weeks) 3 Review phase (ca. 2 weeks) 4 Revision phase (ca. 2 weeks) 5 Presentation and discussion (Block presentations) Krista Grothoff (Lehrstuhl I20, TUM) Principles and Applications of SMC / 30

4 Requirements (1) Report Submission of a ca. 15-page scientific paper Use of L A TEX is required for all Formatting with the Springer Verlag L A TEX style (LNCS) Reviews Each student will complete an anonymous review of another student s paper Length of review: ca. one page Additionally, each student will receive a review from an instructor Krista Grothoff (Lehrstuhl I20, TUM) Principles and Applications of SMC / 30

5 Requirements (2) Presentation Preparation of a presentation 45 minute lecture (max. 20 slides) 15 minutes of discussion at the conclusion Krista Grothoff (Lehrstuhl I20, TUM) Principles and Applications of SMC / 30

6 Assessment Grades will include all individual contributions to the seminar and will be assessed according to the following schema: Written report (50%) Submitted review (15%) Presentation (25%) Participation in the discussion (10%) For successful completion of this seminar, you are expected to complete all tasks and actively participate until the end! Krista Grothoff (Lehrstuhl I20, TUM) Principles and Applications of SMC / 30

7 Course calendar Distribution of topics and kickoff Classes begin Appointments for first meeting st Meeting: Results of literature search, Outline of report Deadline for submission of first version of report Distribution of review assignments Deadline for submission of reviews Reviews returned Bis Submission of final version of report Presentations (block) End of classes Krista Grothoff (Lehrstuhl I20, TUM) Principles and Applications of SMC / 30

8 Course calendar April 2012 M Tu W Th Fr Sa Su June 2012 M Tu W Th Fr Sa Su May 2012 M Tu W Th Fr Sa Su July 2012 M Tu W Th Fr Sa Su Krista Grothoff (Lehrstuhl I20, TUM) Principles and Applications of SMC / 30

9 Literature Search Goals: Finding literature related to the topic To be able to 1 identify, 2 understand, 3 explain, and 4 support significant arguments, techniques or technology... Structuring subject matter Outline Krista Grothoff (Lehrstuhl I20, TUM) Principles and Applications of SMC / 30

10 Research & Sources (1) Good Journals, Books, Library Krista Grothoff (Lehrstuhl I20, TUM) Principles and Applications of SMC / 30

11 Research & Sources (2) Bad Heise-Newsticker Wikipedia Twitter feeds in general: Website XYZ Krista Grothoff (Lehrstuhl I20, TUM) Principles and Applications of SMC / 30

12 Access to literature Author websites Authors often place copies of their publications on their own homepages Other sources can be found via Google Scholar, CiteseerX, etc... via Springer, ACM, IEEE Fee-based download of publications TUM has full access Requires use of a proxy server: wwwcache.informatik.tu-muenchen.de, Port 8080 Automatic proxy configuration: Access is limited to the TUM / LRZ networks Krista Grothoff (Lehrstuhl I20, TUM) Principles and Applications of SMC / 30

13 Organisation Before we get to content... Questions, comments, discussions? Krista Grothoff (Lehrstuhl I20, TUM) Principles and Applications of SMC / 30

14 Overview Instructor: Krista Grothoff, Lst. I20 Topics: 1 Fundamentals of SMC - Basic protocols 2 Security definition in secure multiparty computation 3 Languages and Frameworks for SMC 4 Secure auctions and elections 5 Privacy-preserving data mining and databases 6 Collaborative intrusion detection and auditing 7 Secure calculation of approximations and statistics 8 Secure supply chain management 9 Privacy-preserving benchmarking and forecasting Krista Grothoff (Lehrstuhl I20, TUM) Principles and Applications of SMC / 30

15 Seminar Topics (1) 1. Fundamentals of SMC - Basic protocols (2 people) Arithmetic circuit representations: BGW (Ben-Or, Goldwasser and Wigderson) CCD (Chaum, Crepeau and Damgard) Binary circuit representations: Yao s Garbled Circuits GMW (Goldreich, Micali and Wigderson) Introduce basic concepts, discuss protocols, their significance to SMC in general, extensions and implementations, results Krista Grothoff (Lehrstuhl I20, TUM) Principles and Applications of SMC / 30

16 Seminar Topics (2) 2. Security definition in secure multiparty computation Security in SMC is generally composed of three parts: The adversarial model The real vs. ideal model paradigm The network model Introduce the basic concepts and variations used in security definitions for secure multiparty computation Explain and examine how different choices in the adversarial and network models impact various SMC formulations and implementations (esp. regarding security) Krista Grothoff (Lehrstuhl I20, TUM) Principles and Applications of SMC / 30

17 Seminar Topics (3) 3. Languages and Frameworks for SMC What specialized frameworks and languages exist for implementation of SMC solutions? Describe the underlying theoretical approaches these are based on Introduce, compare and evaluate implementations 4. Secure auctions and elections Without a trusted third party, how does one conduct private secret ballots? How does one conduct a secure auction without learning the bids from that auction? Introduce, compare and evaluate approaches and implementations of secure auction protocols Krista Grothoff (Lehrstuhl I20, TUM) Principles and Applications of SMC / 30

18 Seminar Topics (4) 5. Privacy-preserving data mining and databases How does one make queries without revealing the query to the database server? How does one retrieve content without the server supplying that content knowing what it is? How does one get aggregate data from multiple sources without any party having to reveal the actual content of their data? privacy-preserving queries/private Information Retrieval privacy-preserving data mining (aggregate data, etc) Introduce fundamental concepts and problem, introduce, compare and evaluate approaches and implementations Krista Grothoff (Lehrstuhl I20, TUM) Principles and Applications of SMC / 30

19 Seminar Topics (5) 6. Collaborative intrusion detection and auditing Entities often want external correlation and corroboration for detected network anomalies However, don t want to disclose internal information (or that they might be under attack) Describe fundamentals of problem and solutions, compare and rate implementations and solutions Krista Grothoff (Lehrstuhl I20, TUM) Principles and Applications of SMC / 30

20 Seminar Topics (6) 7. Secure calculation of approximations and statistics Many fields and problems have massive data sets Prohibitive cost of function computation over large datasets means approximations are often used Discuss fundamentals of SMC approaches to secure approximation computation, secure statistical computations Compare and rate approaches and solutions Krista Grothoff (Lehrstuhl I20, TUM) Principles and Applications of SMC / 30

21 Seminar Topics (7) 8. Secure supply chain management How can multiple mutually distrusting actors in a supply chain ensure that they are all able to plan and make decisions based upon accurate data to optimize effectiveness of the supply chain without directly revealing that data and losing competitive advantage? Discuss the roots of the problem, describe fundamentals and security of solutions 9. Privacy-preserving benchmarking and forecasting Without revealing internal data, businesses want to: compare against other businesses collaborate to forecast demand, trends, etc Describe fundamentals of problem and solutions, compare and rate implementations and solutions Krista Grothoff (Lehrstuhl I20, TUM) Principles and Applications of SMC / 30

22 Topic assignment 1 Fundamentals of SMC - Basic protocols (2 people) 2 Security definition in secure multiparty computation 3 Languages and Frameworks for SMC 4 Secure auctions and elections 5 Privacy-preserving data mining and databases (2 people) 6 Collaborative intrusion detection and auditing 7 Secure calculation of approximations and statistics 8 Secure supply chain management 9 Privacy-preserving benchmarking and forecasting Krista Grothoff (Lehrstuhl I20, TUM) Principles and Applications of SMC / 30

23 Next steps ToDos in the orientation phase 1 Literature search 2 Create outline 3 Make appointment with instructor 4 Register for Seminar- Prüfung in TUMonline Krista Grothoff (Lehrstuhl I20, TUM) Principles and Applications of SMC / 30

The Role of Cryptography in Database Security

The Role of Cryptography in Database Security The Role of Cryptography in Database Security Ueli Maurer Department of Computer Science ETH Zurich CH-8092 Zurich, Switzerland maurer@inf.ethz.ch ABSTRACT In traditional database security research, the

More information

A generalized Framework of Privacy Preservation in Distributed Data mining for Unstructured Data Environment

A generalized Framework of Privacy Preservation in Distributed Data mining for Unstructured Data Environment www.ijcsi.org 434 A generalized Framework of Privacy Preservation in Distributed Data mining for Unstructured Data Environment V.THAVAVEL and S.SIVAKUMAR* Department of Computer Applications, Karunya University,

More information

Seminar TK: Ubiquitous Computing

Seminar TK: Ubiquitous Computing Seminar TK: Ubiquitous Computing Seminar 4 CP, Summer Term 2014 Immanuel Schweizer schweizer@tk.informatik.tu-darmstadt.de Based on slides by Dr. Leonardo Martucci, Florian Volk General Information What?

More information

DATA MINING - 1DL360

DATA MINING - 1DL360 DATA MINING - 1DL360 Fall 2013" An introductory class in data mining http://www.it.uu.se/edu/course/homepage/infoutv/per1ht13 Kjell Orsborn Uppsala Database Laboratory Department of Information Technology,

More information

A Secure Model for Medical Data Sharing

A Secure Model for Medical Data Sharing International Journal of Database Theory and Application 45 A Secure Model for Medical Data Sharing Wong Kok Seng 1,1,Myung Ho Kim 1, Rosli Besar 2, Fazly Salleh 2 1 Department of Computer, Soongsil University,

More information

Secure Multi-Party Computation in Networks Over A Cross Domain Privacy Preserving Firewall Optimization

Secure Multi-Party Computation in Networks Over A Cross Domain Privacy Preserving Firewall Optimization Asia-pacific Journal of Multimedia Services Convergence with Art, Humanities and Sociology Vol.1, No.2 (2011), pp. 93-100 http://dx.doi.org/10.14257/ajmscahs.2011.12.06 Secure Multi-Party Computation in

More information

FairplayMP A System for Secure Multi-Party Computation

FairplayMP A System for Secure Multi-Party Computation FairplayMP A System for Secure Multi-Party Computation Assaf Ben-David School of Engineering and Computer Science The Hebrew University Jerusalem 91904, Israel Noam Nisan Google Tel Aviv and School of

More information

Application Development for Mobile and Ubiquitous Computing

Application Development for Mobile and Ubiquitous Computing Department of Computer Science Institute for System Architecture, Chair for Computer Networks Application Development for Mobile and Ubiquitous Computing Seminar Introduction Dr. Ing. Thomas Springer Technische

More information

Associate Prof. Dr. Victor Onomza Waziri

Associate Prof. Dr. Victor Onomza Waziri BIG DATA ANALYTICS AND DATA SECURITY IN THE CLOUD VIA FULLY HOMOMORPHIC ENCRYPTION Associate Prof. Dr. Victor Onomza Waziri Department of Cyber Security Science, School of ICT, Federal University of Technology,

More information

Web Mining Seminar CSE 450. Spring 2008 MWF 11:10 12:00pm Maginnes 113

Web Mining Seminar CSE 450. Spring 2008 MWF 11:10 12:00pm Maginnes 113 CSE 450 Web Mining Seminar Spring 2008 MWF 11:10 12:00pm Maginnes 113 Instructor: Dr. Brian D. Davison Dept. of Computer Science & Engineering Lehigh University davison@cse.lehigh.edu http://www.cse.lehigh.edu/~brian/course/webmining/

More information

NOWHERE - An Open Service Architecture to support Agents and Services within the Semantic Web

NOWHERE - An Open Service Architecture to support Agents and Services within the Semantic Web NOWHERE - An Open Service Architecture to support Agents and Services within the Semantic Web Nicola Dragoni, Mauro Gaspari, and Davide Guidi Dipartimento di Scienze dell Informazione, University of Bologna,

More information

TUMonline The service portal for study and teaching

TUMonline The service portal for study and teaching TUMonline The service portal for study and teaching Introduction for students winter semester 2013/14 Information and instructions under: http://www.it.tum.de/en/tumonline/studying/ 1 Contents 4 Getting

More information

Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge

Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge Mitgliederversammlung EIKON e.v. 26. Februar 2014 Prof. Dr.-Ing. Georg Sigl Lehrstuhl für Sicherheit in

More information

15.00 15.30 30 XML enabled databases. Non relational databases. Guido Rotondi

15.00 15.30 30 XML enabled databases. Non relational databases. Guido Rotondi Programme of the ESTP training course on BIG DATA EFFECTIVE PROCESSING AND ANALYSIS OF VERY LARGE AND UNSTRUCTURED DATA FOR OFFICIAL STATISTICS Rome, 5 9 May 2014 Istat Piazza Indipendenza 4, Room Vanoni

More information

University of Cambridge: Programme Specifications

University of Cambridge: Programme Specifications University of Cambridge: Programme Specifications Every effort has been made to ensure the accuracy of the information contained in this programme specification. At the time of publication, the programme

More information

CS 207 - Data Science and Visualization Spring 2016

CS 207 - Data Science and Visualization Spring 2016 CS 207 - Data Science and Visualization Spring 2016 Professor: Sorelle Friedler sorelle@cs.haverford.edu An introduction to techniques for the automated and human-assisted analysis of data sets. These

More information

Introduction to Database Systems CS4320. Instructor: Christoph Koch koch@cs.cornell.edu CS 4320 1

Introduction to Database Systems CS4320. Instructor: Christoph Koch koch@cs.cornell.edu CS 4320 1 Introduction to Database Systems CS4320 Instructor: Christoph Koch koch@cs.cornell.edu CS 4320 1 CS4320/1: Introduction to Database Systems Underlying theme: How do I build a data management system? CS4320

More information

Modeling, Optimization, and Simulation in Operations Management

Modeling, Optimization, and Simulation in Operations Management 1 Modeling, Optimization, and Simulation in Operations Management Course information Course Title Course Type ECTS 6 SWS Language Prerequisites Grading Deliverables Exam Online Registration Syllabus Winter

More information

Matching oblivious tranfer: How to exchange valuable data

Matching oblivious tranfer: How to exchange valuable data SCIS 2002 The 2002 Symposium on Cryptography and Information Security Shirahama,Japan, Jan.29-Feb.1,2002 The Institute of Electronics, Information and Communication Engineers Matching oblivious tranfer:

More information

CSE598k / CSE545 Advanced Network Security

CSE598k / CSE545 Advanced Network Security CSE598k / CSE545 Advanced Network Security Lecture 1 - Introduction Prof. Patrick McDaniel Systems and Internet Infrastructure Security Laboratory (SIIS) 1 Oops... 2 Network Security No really good definition,

More information

Technical notes on online applications

Technical notes on online applications Technical notes on online applications Inhalt General... 2 Photo... 2 Health insurance... 3 Courses... 3 Grade entry... 3 Uploading and downloading documents... 3 Erroneous entry? Don't panic!... 4 Submitting

More information

Software Development and Evolution

Software Development and Evolution Software Development and Evolution Seminar in Advanced Software Engineering, FS 2016 Thomas Fritz & André Meyer Organizational Announcements 3 rd year and up (prerequisite: Software Engineering) Language

More information

A Blueprint for Universal Trust Management Services

A Blueprint for Universal Trust Management Services A Blueprint for Universal Trust Management Services Tomasz Kaszuba Krzysztof Rzadca Adam Wierzbicki Grzegorz Wierzowiecki Polish-Japanese Institute of Information Technology Warsaw, Poland adamw@pjwstk.edu.pl

More information

Librarian s skills for eresearch support:

Librarian s skills for eresearch support: Librarian s skills for eresearch support: joint project at TUM and CPUT Dr Caroline Leiss Janine Lockhart IATUL 2015 - Hannover, Germany Introduction and background Academic libraries are planning or supporting

More information

How to IT. TUM IT services. set@fs.tum.de. October 9th, 2015. set@fs.tum.de () How to IT October 9th, 2015 1 / 14

How to IT. TUM IT services. set@fs.tum.de. October 9th, 2015. set@fs.tum.de () How to IT October 9th, 2015 1 / 14 How to IT TUM IT services set@fs.tum.de October 9th, 2015 set@fs.tum.de () How to IT October 9th, 2015 1 / 14 1 TUMonline 2 Moodle 3 Access to the Internet 4 Free software 5 Good scientific practices set@fs.tum.de

More information

Privacy-Preserving Social Network Analysis for Criminal Investigations

Privacy-Preserving Social Network Analysis for Criminal Investigations Privacy-Preserving Social Network Analysis for Criminal Investigations Florian Kerschbaum SAP Research Karlsruhe, Germany florian.kerschbaum@sap.com Andreas Schaad SAP Research Karlsruhe, Germany andreas.schaad@sap.com

More information

Master Seminar Cloud Computing

Master Seminar Cloud Computing Master Seminar Cloud Computing PD Dr.-Ing. Dennis Pfisterer Institut für Telematik, Universität zu Lübeck www.itm.uni-luebeck.de/people/pfisterer What these slides are all about... Present the topics of

More information

Information Security and Cryptography

Information Security and Cryptography Information Security and Cryptography Fundamentals and Applications June 1-3, 2015 Zurich, Switzerland Lecturers: David Basin, ETH Zurich Ueli Maurer, ETH Zurich ATG www.infsec.ch Program Starting 09:00

More information

How to Write a Paper and Get It Published

How to Write a Paper and Get It Published How to Write a Paper and Get It Published Stefan Wagner Dr. Stefan Wagner Perlen der Informatik, 04.12.2009 Fakultät für Informatik Lehrstuhl für Software & Systems Engineering 1 Part I: Writing "Piled

More information

Spring 2013 CS 6930 Advanced Topics in Web Security and Privacy - 3 Credit Hours Syllabus and Course Policies

Spring 2013 CS 6930 Advanced Topics in Web Security and Privacy - 3 Credit Hours Syllabus and Course Policies Spring 2013 CS 6930 Advanced Topics in Web Security and Privacy - 3 Credit Hours Syllabus and Course Policies Instructor Chuan Yue Email cyue@uccs.edu Phone 719-255-5155 Course Day & Time Tuesday, Thursday

More information

Multi-Party Computations: Past and Present

Multi-Party Computations: Past and Present Invited Talk: Multi-Party Computations: Past and Present Shafi Goldwasser Cryptography is traditionally concerned with two users, Alice and Bob, who want to communicate privately and authentically over

More information

Voucher Web Metering Using Identity Management Systems

Voucher Web Metering Using Identity Management Systems Voucher Web Metering Using Identity Management Systems Fahad Alarifi Abstract Web Metering is a method to find out content and services exposure to visitors. This paper proposes a visitor centric voucher

More information

DATA MINING - 1DL105, 1DL025

DATA MINING - 1DL105, 1DL025 DATA MINING - 1DL105, 1DL025 Fall 2009 An introductory class in data mining http://www.it.uu.se/edu/course/homepage/infoutv/ht09 Kjell Orsborn Uppsala Database Laboratory Department of Information Technology,

More information

IST659 Database Admin Concepts & Management Syllabus Spring 2012. Location: Time: Office Hours:

IST659 Database Admin Concepts & Management Syllabus Spring 2012. Location: Time: Office Hours: Instructor: Withro H. Wiggins Phone: (315) 446-5418 (Home) Email: wwiggins@syr.edu Office: Adjunct Location: Time: Office Hours: Blackboard Wednesday - Tuesday by appointment (online) Course Description

More information

DELEGATING LOG MANAGEMENT TO THE CLOUD USING SECURE LOGGING

DELEGATING LOG MANAGEMENT TO THE CLOUD USING SECURE LOGGING Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 3, Issue.

More information

Massive Cloud Auditing using Data Mining on Hadoop

Massive Cloud Auditing using Data Mining on Hadoop Massive Cloud Auditing using Data Mining on Hadoop Prof. Sachin Shetty CyberBAT Team, AFRL/RIGD AFRL VFRP Tennessee State University Outline Massive Cloud Auditing Traffic Characterization Distributed

More information

for High Performance Computing

for High Performance Computing Technische Universität München Institut für Informatik Lehrstuhl für Rechnertechnik und Rechnerorganisation Automatic Performance Engineering Workflows for High Performance Computing Ventsislav Petkov

More information

CSE 107 Course Information

CSE 107 Course Information Computer Science and Engineering, UCSD Fa17 CSE 107: Introduction to Modern Cryptography Instructor: Mihir Bellare Course Information January 10, 2017 CSE 107 Course Information Lectures: T and Th, 8:00

More information

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application Layer Chapter 5: Security Concepts for Networks Firewalls Intrusion Detection

More information

On the Performance Measurements for Privacy Preserving Data Mining

On the Performance Measurements for Privacy Preserving Data Mining On the Performance Measurements for Privacy Preserving Data Mining Nan Zhang, Wei Zhao, and Jianer Chen Department of Computer Science, Texas A&M University College Station, TX 77843, USA {nzhang, zhao,

More information

Supervision Agreement for doctoral programs at the Technische Universität München Graduate Center of TUM School of Education

Supervision Agreement for doctoral programs at the Technische Universität München Graduate Center of TUM School of Education Supervision Agreement for doctoral programs at the Technische Universität München Graduate Center of TUM School of Education Degree-awarding institution: This agreement reflects the current planning horizon;

More information

CSE 5392 Sensor Network Security

CSE 5392 Sensor Network Security About Instructor CSE 5392 Sensor Network Security Course Introduction Dr. Donggang Liu, assistant professor, CSE department http://ranger.uta.edu/~dliu dliu@cse.uta.edu Tel: (817) 272-0741 Office: 330NH

More information

CSE391: Cloud Computing CSE 391: Cloud Computing

CSE391: Cloud Computing CSE 391: Cloud Computing CSE 391: Cloud Computing Introduction Course Overview Course Topics Grading Logistics Academic Integrity Policy Today s Lecture Course Overview (1/2) Caveat 1: This is a special topics elective. Caveat

More information

Legally Enforceable Fairness in Secure Two-Party Computation

Legally Enforceable Fairness in Secure Two-Party Computation Legally Enforceable Fairness in Secure Two-Party Computation Yehuda Lindell Department of Computer Science Bar-Ilan University, Israel. lindell@cs.biu.ac.il Abstract In the setting of secure multiparty

More information

IEEE JAVA Project 2012

IEEE JAVA Project 2012 IEEE JAVA Project 2012 Powered by Cloud Computing Cloud Computing Security from Single to Multi-Clouds. Reliable Re-encryption in Unreliable Clouds. Cloud Data Production for Masses. Costing of Cloud Computing

More information

Course Design Document. IS417: Data Warehousing and Business Analytics

Course Design Document. IS417: Data Warehousing and Business Analytics Course Design Document IS417: Data Warehousing and Business Analytics Version 2.1 20 June 2009 IS417 Data Warehousing and Business Analytics Page 1 Table of Contents 1. Versions History... 3 2. Overview

More information

Li Xiong, Emory University

Li Xiong, Emory University Healthcare Industry Skills Innovation Award Proposal Hippocratic Database Technology Li Xiong, Emory University I propose to design and develop a course focused on the values and principles of the Hippocratic

More information

CHF 201, Introduction to Child Development Academ-e Spring 2010 Online, 3 Credit Hours University of Maine January 11, 2010 February 26, 2010

CHF 201, Introduction to Child Development Academ-e Spring 2010 Online, 3 Credit Hours University of Maine January 11, 2010 February 26, 2010 CHF 201, Introduction to Child Development Academ-e Spring 2010 Online, 3 Credit Hours University of Maine January 11, 2010 February 26, 2010 Instructor: Barbara Howard Office: 122 Chadbourne Hall Telephone:

More information

IST359 INTRODUCTION TO DATABASE MANAGEMENT SYSTEMS

IST359 INTRODUCTION TO DATABASE MANAGEMENT SYSTEMS IST359 INTRODUCTION TO DATABASE MANAGEMENT SYSTEMS 1. COURSE DETAILS COURSE (SECTION): IST359 (M005) TERM: Fall 2012 INSTRUCTOR: Yang Wang PHONE: 443-3744 (Office) OFFICE: Hinds 342 EMAIL: ywang@syr.edu

More information

**Beyond our textbook, supplemental readings and handouts will be distributed in class and posted online. * * * Course Requirements

**Beyond our textbook, supplemental readings and handouts will be distributed in class and posted online. * * * Course Requirements ENG 259: Technical Writing Section 0914 (11574): TU 10:30 AM 12:45 PM, TH 10:30 AM 11:30 AM Spring I 2013 Richard Dragan, Ph.D. Office: M- 111G Office Hrs.: M 12:00 pm 1:00 pm, TU 1:15 pm 3:15 pm, (& by

More information

Portfolio Theory & Asset Pricing

Portfolio Theory & Asset Pricing Portfolio Theory & Asset Pricing How to find scientific papers* Univ.-Prof. Dr. Christoph Kaserer Lehrstuhl für Finanzmanagement und Kapitalmärkte Technische Universität München Arcisstr. 21 D-80290 München

More information

Introducing SAP NetWeaver in education: The impact of a SOA based platform

Introducing SAP NetWeaver in education: The impact of a SOA based platform Introducing SAP NetWeaver in education: The impact of a SOA based platform Dr. Holger Wittges, Valentin Nicolescu, Prof. Dr. Helmut Krcmar Technische Universität München Chair for Information Systems Lecturers

More information

Privacy Preserving Mining of Transaction Databases Sunil R 1 Dr. N P Kavya 2

Privacy Preserving Mining of Transaction Databases Sunil R 1 Dr. N P Kavya 2 IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 04, 2014 ISSN (online): 2321-0613 Privacy Preserving Mining of Transaction Databases Sunil R 1 Dr. N P Kavya 2 1 M.Tech

More information

International MBA Program, Full-time MBA Program Degree Thesis Guidelines

International MBA Program, Full-time MBA Program Degree Thesis Guidelines Graduate School of Commerce (Waseda Business School) International MBA Program, Full-time MBA Program Degree Thesis Guidelines *Note: Templates are available for download from the following URLs. http://www.waseda.jp/gradcom/student/degree_thesis_mba_fulltime_global_en.html

More information

DSBA/MBAD 6211 Advanced Business Analytics UNC Charlotte Fall 2015

DSBA/MBAD 6211 Advanced Business Analytics UNC Charlotte Fall 2015 DSBA/MBAD 6211 Advanced Business Analytics UNC Charlotte Fall 2015 Instructor: Dr. Kexin Zhao Office: 351B Friday Phone: 704-687-7637 Email: kzhao2@uncc.edu Class Hours: Monday 5:30-8:15pm Classroom: Center

More information

Perfectly-Secure MPC with Linear Communication Complexity

Perfectly-Secure MPC with Linear Communication Complexity Perfectly-Secure MPC with Linear Communication Complexity Zuzana Beerliová-Trubíniová and Martin Hirt ETH Zurich, Department of Computer Science, CH-8092 Zurich {bzuzana,hirt}@inf.ethz.ch Abstract. Secure

More information

Master Program Business Information Systems Technology (BIST)

Master Program Business Information Systems Technology (BIST) Master Program Information Systems Technology (BIST) Witold Abramowicz 1, Heinrich C. Mayr 2, Florian Matthes 3, Bernhard Thalheim 4 1 The Poznan University of Economics, Management Information Systems,

More information

Introduction to Database Systems. Course Outline and Organisation. Werner Nutt

Introduction to Database Systems. Course Outline and Organisation. Werner Nutt Introduction to Database Systems Course Outline and Organisation Werner Nutt 1 Aims To be able to use Database Management Systems (DBMSs) successfully, one has to understand the concepts on which they

More information

PIMA COMMUNITY COLLEGE FACULTY SENATE CHARTER [Approved November 4, 2016]

PIMA COMMUNITY COLLEGE FACULTY SENATE CHARTER [Approved November 4, 2016] PIMA COMMUNITY COLLEGE FACULTY SENATE CHARTER [Approved November 4, 2016] I. PURPOSE A. The Faculty Senate is the representative body of all faculty (full- time and adjunct) that participates in the governance

More information

For More Information

For More Information CHILDREN AND FAMILIES EDUCATION AND THE ARTS ENERGY AND ENVIRONMENT HEALTH AND HEALTH CARE INFRASTRUCTURE AND TRANSPORTATION INTERNATIONAL AFFAIRS LAW AND BUSINESS NATIONAL SECURITY POPULATION AND AGING

More information

Healthcare data analytics. Da-Wei Wang Institute of Information Science wdw@iis.sinica.edu.tw

Healthcare data analytics. Da-Wei Wang Institute of Information Science wdw@iis.sinica.edu.tw Healthcare data analytics Da-Wei Wang Institute of Information Science wdw@iis.sinica.edu.tw Outline Data Science Enabling technologies Grand goals Issues Google flu trend Privacy Conclusion Analytics

More information

Course Specification. Siam University. International Business Program. 1. General Information of Course Outline

Course Specification. Siam University. International Business Program. 1. General Information of Course Outline แบบ มคอ.3 Course Specification University Faculty / Department Siam University International Business Program 1. General Information of Course Outline 1. Course Code and Course Name IBM 302 / Production

More information

IST359 - INTRODUCTION TO DATABASE MANAGEMENT SYSTEMS

IST359 - INTRODUCTION TO DATABASE MANAGEMENT SYSTEMS IST359 - INTRODUCTION TO DATABASE MANAGEMENT SYSTEMS 1. COURSE DETAILS Revised: 1/13/2012 COURSE (SECTION): IST359 (M001) TERM: Spring 2012 INSTRUCTOR: Deborah Nosky FINAL EXAM: Tuesday, May 8 th 10:15

More information

K-NN CLASSIFICATION OVER SECURE ENCRYPTED RELATIONAL DATA IN OUTSOURCED ENVIRONMENT

K-NN CLASSIFICATION OVER SECURE ENCRYPTED RELATIONAL DATA IN OUTSOURCED ENVIRONMENT Journal homepage: www.mjret.in K-NN CLASSIFICATION OVER SECURE ENCRYPTED RELATIONAL DATA IN OUTSOURCED ENVIRONMENT Akshay Dabi, Arslan Shaikh, Pranay Bamane, Vivek Thorat, Prof.Popat Borse. Computer Engineering.

More information

Course Organization. Multimedia Information Systems 1 VU (707.020) ( Web Technologies in the future) WS 2015/16. Vedran Sabol.

Course Organization. Multimedia Information Systems 1 VU (707.020) ( Web Technologies in the future) WS 2015/16. Vedran Sabol. Course Organization Multimedia Information Systems 1 VU (707.020) ( Web Technologies in the future) WS 2015/16 Vedran Sabol KTI, TU Graz October 5th 2015 2 Course Multimedia Information Systems 1 VU (707.020)

More information

Let the data speak to you. Look Who s Peeking at Your Paycheck. Big Data. What is Big Data? The Artemis project: Saving preemies using Big Data

Let the data speak to you. Look Who s Peeking at Your Paycheck. Big Data. What is Big Data? The Artemis project: Saving preemies using Big Data CS535 Big Data W1.A.1 CS535 BIG DATA W1.A.2 Let the data speak to you Medication Adherence Score How likely people are to take their medication, based on: How long people have lived at the same address

More information

COMPUTER SCIENCE/ COMPUTER NETWORKING AND TECHNOLOGIES (COSC)

COMPUTER SCIENCE/ COMPUTER NETWORKING AND TECHNOLOGIES (COSC) COMPUTER SCIENCE/ COMPUTER NETWORKING AND TECHNOLOGIES (COSC) Computer Science (COSC) courses are offered by the School of Information Arts and Technologies within the Yale Gordon College of Liberal Arts.

More information

SURVEY ON: CLOUD DATA RETRIEVAL FOR MULTIKEYWORD BASED ON DATA MINING TECHNOLOGY

SURVEY ON: CLOUD DATA RETRIEVAL FOR MULTIKEYWORD BASED ON DATA MINING TECHNOLOGY SURVEY ON: CLOUD DATA RETRIEVAL FOR MULTIKEYWORD BASED ON DATA MINING TECHNOLOGY 1 Kavya G, 2 K.S. Rajesh 1 P.G Scholar, Dept. of Computer Science & Engineering RajaRajeswari College of Engineering, Bangalore,

More information

ARX A Comprehensive Tool for Anonymizing Biomedical Data

ARX A Comprehensive Tool for Anonymizing Biomedical Data TMF Workshop: Anonymization tools and their practical relevance (for biomedical research) ARX A Comprehensive Tool for Anonymizing Biomedical Data Fabian Prasser, Florian Kohlmayer, Klaus A. Kuhn Lehrstuhl

More information

BACHELOR OF SOCIAL WORK PROGRAM SOCW 402 RESEARCH METHODS FOR SOCIAL CHANGE IN COMMUNITY SOCIAL WORK COURSE OUTLINE

BACHELOR OF SOCIAL WORK PROGRAM SOCW 402 RESEARCH METHODS FOR SOCIAL CHANGE IN COMMUNITY SOCIAL WORK COURSE OUTLINE BACHELOR OF SOCIAL WORK PROGRAM SOCW 402 RESEARCH METHODS FOR SOCIAL CHANGE IN COMMUNITY SOCIAL WORK COURSE OUTLINE Section: F15W70 Semester: Fall 2015 Instructor: Dr. Louise Stern, MSW, PhD Online Office

More information

PBKM: A Secure Knowledge Management Framework

PBKM: A Secure Knowledge Management Framework PBKM: A Secure Knowledge Management Framework (extended abstract) Shouhuai Xu and Weining Zhang Department of Computer Science, University of Texas at San Antonio {shxu,wzhang}@cs.utsa.edu Abstract In

More information

AlienVault Unified Security Management Solution Complete. Simple. Affordable Life Cycle of a log

AlienVault Unified Security Management Solution Complete. Simple. Affordable Life Cycle of a log Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat

More information

Building Decision Tree Classifier on Private Data

Building Decision Tree Classifier on Private Data Building Decision Tree Classifier on Private Data Wenliang Du Zhijun Zhan Center for Systems Assurance Department of Electrical Engineering and Computer Science Syracuse University, Syracuse, NY 13244,

More information

Geography 676 Web Spatial Database Development and Programming

Geography 676 Web Spatial Database Development and Programming Geography 676 Web Spatial Database Development and Programming Instructor: Prof. Qunying Huang Office: 426 Science Hall Tel: 608-890-4946 E-mail: qhuang46@wisc.edu Office Hours: T, R, and F 1:00-2:00 PM

More information

Network Security Exercise #1

Network Security Exercise #1 Computer and Communication Systems Lehrstuhl für Technische Informatik Network Security Exercise #1 Falko Dressler and Christoph Sommer Computer and Communication Systems Institute of Computer Science,

More information

Here s what they said..

Here s what they said.. hosted by the We asked Brunel students what they liked about the way their lecturers were using Blackboard Learn. We received over 450 responses! Here s what they said.. Blackboard-Related student nominations

More information

Lecture 2: Complexity Theory Review and Interactive Proofs

Lecture 2: Complexity Theory Review and Interactive Proofs 600.641 Special Topics in Theoretical Cryptography January 23, 2007 Lecture 2: Complexity Theory Review and Interactive Proofs Instructor: Susan Hohenberger Scribe: Karyn Benson 1 Introduction to Cryptography

More information

Business Intelligence: Using Data for More Than Analytics

Business Intelligence: Using Data for More Than Analytics Business Intelligence: Using Data for More Than Analytics Session 672 Session Overview Business Intelligence: Using Data for More Than Analytics What is Business Intelligence? Business Intelligence Solution

More information

What is Auditing? Auditing. Problems. Uses. Audit System Structure. Logger. Reading: Chapter 24. Logging. Slides by M. Bishop are used.

What is Auditing? Auditing. Problems. Uses. Audit System Structure. Logger. Reading: Chapter 24. Logging. Slides by M. Bishop are used. Reading: Chapter 24 Auditing Slides by M. Bishop are used What is Auditing? Logging» Recording events or statistics to provide information about system use and performance Auditing» Analysis of log records

More information

Business Analytics (AQM5201)

Business Analytics (AQM5201) Prof. Dr. Thomas Cleff Office hours: Thu, 3.30pm-5pm E-mail: thomas.cleff@hs-pforzheim.de Business Analytics (AQM5201) Syllabus Summerterm 2015 Time: Thursday 9.45am-11.15am Room: W2.3.12 Begin: 19 th

More information

Research Article Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation

Research Article Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation e Scientific World Journal, Article ID 413265, 7 pages http://dx.doi.org/10.1155/2014/413265 Research Article Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation Yi Sun, 1 Qiaoyan Wen,

More information

Introduction to Database Systems CS4320/CS5320. CS4320/4321: Introduction to Database Systems. CS4320/4321: Introduction to Database Systems

Introduction to Database Systems CS4320/CS5320. CS4320/4321: Introduction to Database Systems. CS4320/4321: Introduction to Database Systems Introduction to Database Systems CS4320/CS5320 Instructor: Johannes Gehrke http://www.cs.cornell.edu/johannes johannes@cs.cornell.edu CS4320/CS5320, Fall 2012 1 CS4320/4321: Introduction to Database Systems

More information

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education 1.0 PREREQUISITE RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education COURSE OF STUDY 2016-2017 (C)ITM 301 - IT Infrastructure The

More information

HAUPTSEMINAR BETRIEBSSYSTEME (500070)

HAUPTSEMINAR BETRIEBSSYSTEME (500070) HAUPTSEMINAR BETRIEBSSYSTEME (500070)! OPERATING SYSTEMS SEMINAR! CONSENSUS AND CONSISTENCY IN MODERN DISTRIBUTED SYSTEMS Dr. Peter Tröger (peter.troeger@informatik.tu-chemnitz.de)! Group, TU Chemnitz,

More information

Programme specification

Programme specification Programme specification 1. Awarding Institution 2. Teaching Institution 3. Faculty/Department 4. UCAS Code: Pearson (Edexcel) North Kent College Business, Secretarial and Computing I100 5. Final Award

More information

Big Data Analytics. Prof. Dr. Lars Schmidt-Thieme

Big Data Analytics. Prof. Dr. Lars Schmidt-Thieme Big Data Analytics Prof. Dr. Lars Schmidt-Thieme Information Systems and Machine Learning Lab (ISMLL) Institute of Computer Science University of Hildesheim, Germany 33. Sitzung des Arbeitskreises Informationstechnologie,

More information

Graduate School of Commerce Major in Business Administration (MBA Full-Time Program / MOT Program) Degree Thesis Writing Guidelines

Graduate School of Commerce Major in Business Administration (MBA Full-Time Program / MOT Program) Degree Thesis Writing Guidelines Graduate School of Commerce Major in Business Administration (MBA Full-Time Program / MOT Program) Degree Thesis Writing Guidelines October 27, 2008 1. Graduation Requirements

More information

Person Responsible for Module (Name, Mail address): Dr. Javier Soriano, jsoriano@fi.upm.es

Person Responsible for Module (Name, Mail address): Dr. Javier Soriano, jsoriano@fi.upm.es Name of Module: Data Science ECTS: Module-ID: Seminars 4.5 xxx Person Responsible for Module (Name, Mail address): Dr. Javier Soriano, jsoriano@fi.upm.es University: UPM Departments: DLSIIS, DIA, DATSI

More information

Course Syllabus For Operations Management. Management Information Systems

Course Syllabus For Operations Management. Management Information Systems For Operations Management and Management Information Systems Department School Year First Year First Year First Year Second year Second year Second year Third year Third year Third year Third year Third

More information

SAS Visual Analytics 7.1 Video Library: Description and Keyword Search

SAS Visual Analytics 7.1 Video Library: Description and Keyword Search SAS Visual Analytics 7.1 Video Library: Description and Keyword Search SAS Visual Analytics Home Page Analytics Home Page: Basics Analytics Home Page: Additional Features View SAS Visual Analytics Reports

More information

Curriculum for The Bachelor Programme in International Sales and Marketing Management

Curriculum for The Bachelor Programme in International Sales and Marketing Management Curriculum for The Bachelor Programme in International Sales and Marketing Management VIA University College School of Technology and Business, Horsens, Denmark VALID from September 2009 1 Content Section

More information

Final Exercise Let s go Shopping!

Final Exercise Let s go Shopping! Final Exercise Let s go Shopping! Exercise: May 14 & 16, 2012 Report Due Date: Monday May 21, 2012 at 5:15 Introduction As you are aware, difficult economic times and an inability to secure additional

More information

PS 135: Game Theory in the Social Sciences

PS 135: Game Theory in the Social Sciences PS 135: Game Theory in the Social Sciences Prof. Sean Gailmard Dept. of Political Science UC Berkeley Office: 734 Barrows Tel: 510-642-4677 Email: gailmard@berkeley.edu Course Information. Professor: Sean

More information

Strategic Platforms Information Security 2014

Strategic Platforms Information Security 2014 Strategic Platforms Information Security 2014 -------------------------- Data Mining for security process monitoring New authentication mechanism for System Information Call for «Expression of Interest»

More information

On Unconditionally Secure Distributed Oblivious Transfer

On Unconditionally Secure Distributed Oblivious Transfer On Unconditionally Secure Distributed Oblivious Transfer Ventzislav Nikov 1, Svetla Nikova 2, Bart Preneel 2, and Joos Vandewalle 2 1 Department of Mathematics and Computing Science Eindhoven University

More information

GPU Programming in Computer Vision

GPU Programming in Computer Vision Computer Vision Group Prof. Daniel Cremers GPU Programming in Computer Vision Preliminary Meeting Thomas Möllenhoff, Robert Maier, Caner Hazirbas What you will learn in the practical course Introduction

More information

Scientific Method Ref: Vetenskaplig metod, R. Ejvegård, (2a upp.) Studentlitteratur 1996

Scientific Method Ref: Vetenskaplig metod, R. Ejvegård, (2a upp.) Studentlitteratur 1996 Scientific Method Contents Dissertation and research Choice of subject and statement of problem Scientific Methods Scientific Techniques Dissertation Layout Sources, Literature and Footnotes Seminar organisation

More information

Data Warehousing and Data Mining

Data Warehousing and Data Mining Data Warehousing and Data Mining Part I: Data Warehousing Gao Cong gaocong@cs.aau.dk Slides adapted from Man Lung Yiu and Torben Bach Pedersen Course Structure Business intelligence: Extract knowledge

More information

ISQS 3358 BUSINESS INTELLIGENCE FALL 2014

ISQS 3358 BUSINESS INTELLIGENCE FALL 2014 ISQS 3358 BUSINESS INTELLIGENCE FALL 2014 Instructor: Dr. Miguel. I. Aguirre-Urreta, Ph.D. Office: BA E322 Phone: 806.834.0765 Email: miguel.aguirre-urreta@ttu.edu Office Hours Tuesdays and Thursdays from

More information

MicroStrategy PRIME High Performance In-memory Analytics

MicroStrategy PRIME High Performance In-memory Analytics MicroStrategy PRIME High Performance In-memory Analytics 1 Speaker Introduction Bala Chandran Dir. Enterprise BI, MicroStrategy 15 years of experience implementing and designing Big Data and Analytics

More information