• Save
Karen Sollins (MIT, US): Privacy: Can we afford not to?
Upcoming SlideShare
Loading in...5

Karen Sollins (MIT, US): Privacy: Can we afford not to?



Karen Sollins (MIT, US): Privacy: Can we afford not to?

Karen Sollins (MIT, US): Privacy: Can we afford not to?



Total Views
Views on SlideShare
Embed Views



0 Embeds 0

No embeds



Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment

Karen Sollins (MIT, US): Privacy: Can we afford not to? Karen Sollins (MIT, US): Privacy: Can we afford not to? Presentation Transcript

  • Privacy: Can we afford not to? Dr. Karen Sollins MIT Computer Science and Artificial Intelligence Laboratory FIA Meeting, Gent, Belgium, December 17, 2010
  • What is it about privacy? About The subject: usually a person Identity: set of attributes or claims Separation of inherent or assigned attributes from profiled information Policies about what to share and what not Not about complete isolation
  • Interesting attributes Identification: name, government id number, address, etc. Authorship: linking identity to resources Communication: Others with whom have communicated Usage: Objects, services, and other resources used View slide
  • What if we could not control these? Identification: invasion of privacy, masquerading, failure of business relationships, Authorship: failure of legal contracts, freedom of speech Communication: failure of freedom of association Usage: failure of freedom of thought Consider: requirements of diplomacy, intelligence gathering, proprietary and confidential business Consider: confidentiality of doctor-patient and attorney-client relationships View slide
  • Consequences of Internet devoid of privacy No commercial substrate No social substrate No civil substrate Likely: walled gardens in stove-pipe constructions, privacy only controllable in restricted communities
  • Where does that leave us? Reality: privacy will not be perfect Privacy is not about complete hiding, but controlled sharing with enforcement Privacy will exist in some form, because social, business, and civil arenas cannot exist without them Question: at which layer in the architecture?
  • Which architectural layer? App space: user involvement and control Can be end-to-end Transport: Narrow waist of the architecture – locus of homogeneity VERY difficult to change Below transport: apparent walled gardens, isolation