Advertisement

Protecting Persons While Protecting the People

Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers

  • Cecilia S. Gal
  • Paul B. Kantor
  • Michael E. Lesk
Conference proceedings ISIPS 2008

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5661)

Table of contents

  1. Front Matter
  2. The Challenges of Seeking Security While Respecting Privacy

    1. Paul B. Kantor, Michael E. Lesk
      Pages 1-10
  3. Section One: Statement of the Problem

  4. Section Two: Theoretical Approaches to the Problem

    1. Slava Kisilevich, Yuval Elovici, Bracha Shapira, Lior Rokach
      Pages 63-81
    2. Stephen E. Fienberg, Yuval Nardi, Aleksandra B. Slavković
      Pages 82-94
  5. Section Three: Practical Approaches to the Problem

    1. Joan T. McNamara
      Pages 95-103
    2. Mark Goldberg, Malik Magdon-Ismail, Stephen Kelley, Konstantin Mertsalov
      Pages 104-114
    3. Roshan K. Thomas, Ravi Sandhu, Elisa Bertino, Budak Arpinar, Shouhuai Xu
      Pages 115-121
  6. Back Matter

About these proceedings

Introduction

The Second Annual Workshop on Privacy and Security, organized by the Center for Interdisciplinary Studies in Information Privacy and Security of the School of C- munication and Information at Rutgers University, was held on May 12, 2008 at the Hyatt Regency, New Brunswick, New Jersey, USA. A few of the papers in this volume were produced through a multi-step process. First, we recorded the talk given by each author at the workshop in May 2008. Next, we transcribed the recording. The authors then produced a draft of their paper from these transcriptions, refining each draft until the final version. Although the papers are not verbatim transcriptions of the talks given, some do retain the informal and conv- sational quality of the presentations. In one instance we have included some material from the question-and-answer period after the talk, since the material covered proved to be relevant and interesting. The majority of authors, however, preferred to include a more formal paper based on the material presented at the workshop.

Keywords

anonymity communication monitoring cryptanalysis data anon data mining data stream analysis dataveillance encryption identity theft information sharing personal information privacy security suspicious activity web monitoring

Editors and affiliations

  • Cecilia S. Gal
    • 1
  • Paul B. Kantor
    • 1
  • Michael E. Lesk
    • 1
  1. 1.School of Communication and InformationRutgers UniversityNew BrunswickUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-10233-2
  • Copyright Information Springer-Verlag Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-10232-5
  • Online ISBN 978-3-642-10233-2
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site