Privacy: Can we afford not to?
Dr. Karen Sollins
MIT Computer Science and Artificial Intelligence Laboratory
FIA Meeting, ...
What is it about privacy?
About
The subject: usually a person
Identity: set of attributes or claims
Separation of inherent...
Interesting attributes
Identification: name, government id number, address, etc.
Authorship: linking identity to resources...
What if we could not control these?
Identification: invasion of privacy, masquerading, failure of business relationships, ...
Consequences of Internet devoid of  privacy
No commercial substrate
No social substrate
No civil substrate
Likely: walled ...
Where does that leave us?
Reality: privacy will not be perfect
Privacy is not about complete hiding, but controlled sharin...
Which architectural layer?
App space: 
user involvement and control
Can be end-to-end
Transport: 
Narrow waist of the arch...
Upcoming SlideShare
Loading in …5
×

Karen Sollins (MIT, US): Privacy: Can we afford not to?

1,306 views

Published on

Karen Sollins (MIT, US): Privacy: Can we afford not to?

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,306
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Karen Sollins (MIT, US): Privacy: Can we afford not to?

  1. 1. Privacy: Can we afford not to? Dr. Karen Sollins MIT Computer Science and Artificial Intelligence Laboratory FIA Meeting, Gent, Belgium, December 17, 2010
  2. 2. What is it about privacy? About The subject: usually a person Identity: set of attributes or claims Separation of inherent or assigned attributes from profiled information Policies about what to share and what not Not about complete isolation
  3. 3. Interesting attributes Identification: name, government id number, address, etc. Authorship: linking identity to resources Communication: Others with whom have communicated Usage: Objects, services, and other resources used
  4. 4. What if we could not control these? Identification: invasion of privacy, masquerading, failure of business relationships, Authorship: failure of legal contracts, freedom of speech Communication: failure of freedom of association Usage: failure of freedom of thought Consider: requirements of diplomacy, intelligence gathering, proprietary and confidential business Consider: confidentiality of doctor-patient and attorney-client relationships
  5. 5. Consequences of Internet devoid of privacy No commercial substrate No social substrate No civil substrate Likely: walled gardens in stove-pipe constructions, privacy only controllable in restricted communities
  6. 6. Where does that leave us? Reality: privacy will not be perfect Privacy is not about complete hiding, but controlled sharing with enforcement Privacy will exist in some form, because social, business, and civil arenas cannot exist without them Question: at which layer in the architecture?
  7. 7. Which architectural layer? App space: user involvement and control Can be end-to-end Transport: Narrow waist of the architecture – locus of homogeneity VERY difficult to change Below transport: apparent walled gardens, isolation

×