SlideShare a Scribd company logo
1 of 77
Download to read offline
C3P: Context-Aware
Crowdsourced Cloud Privacy
1
CloudSpacesPrivacyEnhancingTechnologiesSymposium,2014
2
Filesto
Flowers
Conversion
2
Filesto
Flowers
Conversion
2
Filesto
Flowers
Conversion
2
Filesto
Flowers
Conversion
2
Filesto
Flowers
Conversion
3
60%
increase in corporate data shared to the cloud in 2015
Source: Elastica’s Q2 2015 Shadow Data Report
3
20%
of files shared to the cloud contain protected data
60%
increase in corporate data shared to the cloud in 2015
Source: Elastica’s Q2 2015 Shadow Data Report
3
20%
of files shared to the cloud contain protected data
60%
of sensitive files contain PII
30%
…contain health info
60%
increase in corporate data shared to the cloud in 2015
Source: Elastica’s Q2 2015 Shadow Data Report
3
20%
of files shared to the cloud contain protected data
60%
of sensitive files contain PII
30%
…contain health info
Emergence of“Shadow IT”
60%
increase in corporate data shared to the cloud in 2015
Source: Elastica’s Q2 2015 Shadow Data Report
You cannot use
cloud services.
You are fully
protected.
Your files are
always
encrypted
before
uploading.
Anti-Snooping Tools for the Cloud
Examples:
4
You cannot
run
software.
You are fully
protected.
Your files are
always
quarantined.
WhatifAntivirusSoftwarewasSimilar?
5
Obstacles
Privacy vs. Services dilemma
Obstacles
Privacy vs. Services dilemma
Context-dependence
of privacy
Obstacles
I dedicate the rest of
my life for sorting out
sensitive from non-sensitive
files on my HD
Privacy vs. Services dilemma
Context-dependence
of privacy
Manual effort and expertise
for assessing data sensitivity
6
What is needed?
Ensure serviceable protection
instead of brute encryption.
What is needed?
Ensure serviceable protection
instead of brute encryption.
Account for the metadata,
sharing environment, and
data content.
What is needed?
I dedicate the rest of
my life for sorting out
sensitive from non-sensitive
files on my HD
Ensure serviceable protection
instead of brute encryption.
Account for the metadata,
sharing environment, and
data content.
Automatically estimate the
sensitivity of shared data.
7
Introducing C3P
Various levels of information hiding
8
Introducing C3P
Define data in terms of context
Various levels of information hiding
8
Introducing C3P
I dedicate the rest of
my life for sorting out
sensitive from non-sensitive
files on my HD
Private crowdsourcing mechanism for
gathering people privacy policies
Define data in terms of context
Various levels of information hiding
8
Introducing C3P
I dedicate the rest of
my life for sorting out
sensitive from non-sensitive
files on my HD
Private crowdsourcing mechanism for
gathering people privacy policies
Psychologically grounded approach
for estimating sensitivity
Define data in terms of context
Various levels of information hiding
8
Fine-Grained Policies
9
Defining Data through Context
10
Content Metadata Environment
Defining Data through Context
10
Content Metadata Environment
Defining Data through Context
10
Content Metadata Environment
Location
Data
TopicMedia
Home
Office
Document
Software
Financial
Educational
Context Vocabulary
11
PrivacyPreserving Crowdsourcing
12
Business Me ColleagueFinancial Me Stranger Faces Home Friend
Financial Me Stranger
Business Me Colleague
Faces Home Friend
I dedicate the rest of
my life for sorting out
sensitive from non-sensitive
files on my HD
User 1 User 2 User 3
PrivacyPreserving Crowdsourcing
12
Business Me ColleagueFinancial Me Stranger Faces Home Friend
Financial Me Stranger
Business Me Colleague
Faces Home Friend
Faces Home Friend
Sharing Operation Context
I dedicate the rest of
my life for sorting out
sensitive from non-sensitive
files on my HD
User 1 User 2 User 3
PrivacyPreserving Crowdsourcing
12
Business Me ColleagueFinancial Me Stranger Faces Home Friend
Financial Me Stranger
Business Me Colleague
Faces Home Friend
Faces Home Friend
Work
Sea
Colleague
Family
Sharing Operation Context
I dedicate the rest of
my life for sorting out
sensitive from non-sensitive
files on my HD
User 1 User 2 User 3
PrivacyPreserving Crowdsourcing
12
Business Me ColleagueFinancial Me Stranger Faces Home Friend
Financial Me Stranger
Business Me Colleague
Faces Home Friend
Faces Home Friend
Work
Sea
Colleague
Family
Forward-Anonymity
K-anonymity
Sharing Operation Context
I dedicate the rest of
my life for sorting out
sensitive from non-sensitive
files on my HD
User 1 User 2 User 3
Faces Home Friend
Context
SensitivityEstimationusingItemResponseTheory
13
Faces Home Friend
SensitivityEstimationusingItemResponseTheory
13
Faces Home Friend
High Sensitivity
75%
 
SensitivityEstimationusingItemResponseTheory
13
Faces Home Friend
High Sensitivity
75%
 
High
Privacy Attitude
75%
SensitivityEstimationusingItemResponseTheory
13
Faces Home Friend
High Sensitivity
75%
 
High
Privacy Attitude
75%
SensitivityEstimationusingItemResponseTheory
13
Faces Home Friend
High Sensitivity
75%
 
High
Privacy Attitude
75%
SensitivityEstimationusingItemResponseTheory
13
Faces Home Friend
High Sensitivity
75%
 
High
Privacy Attitude
75%
SensitivityEstimationusingItemResponseTheory
13
Faces Home Friend
High Sensitivity
75%
Group
Invariance
Faces Home Friend
Faces Home Friend
 
 
High
Privacy Attitude
75%
SensitivityEstimationusingItemResponseTheory
13
Faces Home Friend
High Sensitivity
75%
Group
Invariance
Faces Home Friend
Faces Home Friend
 
Item
Invariance
 
 
Connectingthe Dots
14Client
Server
?
Connectingthe Dots
14Client
Server
?
Connectingthe Dots
14
Financial Me Stranger
Client
Server
Context
Extraction
?
Connectingthe Dots
14
Financial Me Stranger
Client
Server
Context
Extraction
Sensitivity
Request
?
Connectingthe Dots
14
Financial Me Stranger
Client
Server
Sensitivity
Reply
?
Connectingthe Dots
14
Financial Me Stranger
Client
Server
Sensitivity
Reply
Policy
Decision
?
Connectingthe Dots
14
Financial Me Stranger
Client
Server
Policy
Decision
Data
Sharing
?
Connectingthe Dots
14
Financial Me Stranger
Client
Server
Crowdsourcing
?
Connectingthe Dots
14
Financial Me Stranger
Client
Server
Crowdsourcing
? Sensitivity
Computation
Evaluation
15
C3P
IRTModelsFitPrivacy-AwareCloudSharing?
16
81
96
IRTModelsFitPrivacy-AwareCloudSharing?
• Ex: With which privacy level would you
share a project presentation with a friend?
16
81
96
IRTModelsFitPrivacy-AwareCloudSharing?
• Ex: With which privacy level would you
share a project presentation with a friend?
• Standardized Infit Statistic:
• (x-axis values should lie in [-2,2])
16
81
96
Dichotomous case
Sensitivity
Infit t-statistic
A dot
represents a
context
IRTModelsFitPrivacy-AwareCloudSharing?
• Ex: With which privacy level would you
share a project presentation with a friend?
• Standardized Infit Statistic:
• (x-axis values should lie in [-2,2])
16
81
96
Dichotomous case
Sensitivity
Infit t-statistic
A dot
represents a
context
IRTModelsFitPrivacy-AwareCloudSharing?
• Ex: With which privacy level would you
share a project presentation with a friend?
• Standardized Infit Statistic:
• (x-axis values should lie in [-2,2])
16
81
96
Polytomous case
Infit t-statistic
Sensitivity
Dichotomous case
Sensitivity
Infit t-statistic
A dot
represents a
context
IRTModelsFitPrivacy-AwareCloudSharing?
• Ex: With which privacy level would you
share a project presentation with a friend?
• Standardized Infit Statistic:
• (x-axis values should lie in [-2,2])
16
81
96
Polytomous case
Infit t-statistic
Sensitivity
Dichotomous case
Sensitivity
Infit t-statistic
A dot
represents a
context
IRTModelsFitPrivacy-AwareCloudSharing?
• Ex: With which privacy level would you
share a project presentation with a friend?
• Standardized Infit Statistic:
• (x-axis values should lie in [-2,2])
16
81
96
Yes!
Polytomous case
Infit t-statistic
Sensitivity
Dichotomous case
Sensitivity
Infit t-statistic
A dot
represents a
context
TemporalCostofCrowdsourcing&Privacy
17
Zipf context distribution
500
3125
30000
av.: 1 Item/6 hours
• Synthetic Dataset:
TemporalCostofCrowdsourcing&Privacy
k
 
17
Zipf context distribution
500
3125
30000
av.: 1 Item/6 hours
• Synthetic Dataset:
TemporalCostofCrowdsourcing&Privacy
k
 
17
Zipf context distribution
500
3125
30000
av.: 1 Item/6 hours
• Synthetic Dataset:
Crowdsourcing cost: Hit rate (HR) from 0 to 90% in 10 days
TemporalCostofCrowdsourcing&Privacy
k
 
17
Zipf context distribution
500
3125
30000
av.: 1 Item/6 hours
• Synthetic Dataset:
Crowdsourcing cost: Hit rate (HR) from 0 to 90% in 10 days
Anonymity cost: HR difference starts high but vanishes in 10 days.
EffectofSharingBehaviorontheTemporalCost
18
Anonymity Parameter K=3
500
3125
30000
av.: 1 Item/6 hours
• Synthetic Dataset:
EffectofSharingBehaviorontheTemporalCost
18
Effect: Long tail distribution is of lower temporal cost.
Anonymity Parameter K=3
500
3125
30000
av.: 1 Item/6 hours
• Synthetic Dataset:
RobustnessTowardsMaliciousUsers?
19
• Test:
• Assign sensitivities to items
and attitudes to people.
• Honest users choose policies
according to the model.
• Malicious users choose
policies at random.
RobustnessTowardsMaliciousUsers?
19
• Test:
• Assign sensitivities to items
and attitudes to people.
• Honest users choose policies
according to the model.
• Malicious users choose
policies at random.
RobustnessTowardsMaliciousUsers?
19
• Test:
• Assign sensitivities to items
and attitudes to people.
• Honest users choose policies
according to the model.
• Malicious users choose
policies at random.
RobustnessTowardsMaliciousUsers?
19
• Test:
• Assign sensitivities to items
and attitudes to people.
• Honest users choose policies
according to the model.
• Malicious users choose
policies at random.
Preset
Sensitivity
Computed
Sensitivity-Check
RobustnessTowardsMaliciousUsers?
19
• Test:
• Assign sensitivities to items
and attitudes to people.
• Honest users choose policies
according to the model.
• Malicious users choose
policies at random.
Preset
Sensitivity
Computed
Sensitivity-Check
Tolerance: 25% malicious: ≈8% difference, 50% malicious: ≈17% difference
FutureWork
• Recommendation of policies to users
• Batch sensitivity analysis
• Considering probabilistic attacks on the scheme
• Working with IRT alternatives.
20
ELO MF
21
22
PrivyShare
PrivyShare-Desktop
PrivyShareBenefits
• Works with any cloud service
23
PrivyShareBenefits
• Works with any cloud service
• Provides“Sensitivity as a Service”
23
PrivyShareBenefits
• Works with any cloud service
• Provides“Sensitivity as a Service”
• Offers fine grained protection
• Metadata cleaning
• Face Blurring
• Encryption
• Encryption + Auxiliary Information (automatic summaries, blurred
thumbnails)
23
24
PrivyShare
PrivyShare-Browser
PrivySeal:Dealingwith3rdPartyCloudApps
25
PrivySeal
privyseal.epfl.ch
26
Questions
hamzaharkous.com
Images/MediaCredits
•Pixel77
•Freepik

More Related Content

Viewers also liked

Dissecting and Mitigating the Privacy Risk of Personal Cloud Apps (at PETS 2016)
Dissecting and Mitigating the Privacy Risk of Personal Cloud Apps (at PETS 2016)Dissecting and Mitigating the Privacy Risk of Personal Cloud Apps (at PETS 2016)
Dissecting and Mitigating the Privacy Risk of Personal Cloud Apps (at PETS 2016)Hamza Harkous
 
viaprinto Motivkalender 2014 - Mit Ihrem Gratis-Werbeeindruck
viaprinto Motivkalender 2014 - Mit Ihrem Gratis-Werbeeindruckviaprinto Motivkalender 2014 - Mit Ihrem Gratis-Werbeeindruck
viaprinto Motivkalender 2014 - Mit Ihrem Gratis-Werbeeindruckviaprinto
 
(Métodos Inv.) Tema 7 - El método en la Inv. Cientifica
(Métodos Inv.) Tema 7 - El método en la Inv. Cientifica(Métodos Inv.) Tema 7 - El método en la Inv. Cientifica
(Métodos Inv.) Tema 7 - El método en la Inv. Cientificamdelriomejia
 
OEB12: Enhancing participatory culture: iCollab pre-conference workshop
OEB12: Enhancing participatory culture: iCollab pre-conference workshopOEB12: Enhancing participatory culture: iCollab pre-conference workshop
OEB12: Enhancing participatory culture: iCollab pre-conference workshopIlona Buchem
 
A stronger wffp eng
A stronger wffp engA stronger wffp eng
A stronger wffp engNAFSO
 
Propuesta corporativa split billin (1)
Propuesta corporativa split billin (1)Propuesta corporativa split billin (1)
Propuesta corporativa split billin (1)Hef Kardona
 
Casas patrimoniales - barrio orellana
Casas patrimoniales - barrio orellanaCasas patrimoniales - barrio orellana
Casas patrimoniales - barrio orellanaEmilia Vásquez
 
Implementering Fronter Högasten RååSödra, JonasHogasten
Implementering Fronter Högasten RååSödra, JonasHogastenImplementering Fronter Högasten RååSödra, JonasHogasten
Implementering Fronter Högasten RååSödra, JonasHogastenjonashogasten
 
NetTask Lync Roadshow - Microsoft Cloud Strategy - Peter Gröpper
NetTask Lync Roadshow - Microsoft Cloud Strategy - Peter GröpperNetTask Lync Roadshow - Microsoft Cloud Strategy - Peter Gröpper
NetTask Lync Roadshow - Microsoft Cloud Strategy - Peter GröpperNetTask GmbH
 
Metodología de la evaluación de las formaciones en Francia: criterios, refere...
Metodología de la evaluación de las formaciones en Francia: criterios, refere...Metodología de la evaluación de las formaciones en Francia: criterios, refere...
Metodología de la evaluación de las formaciones en Francia: criterios, refere...Consejo de Rectores de Panamá
 
Jan Mag 2010 Final
Jan Mag 2010 FinalJan Mag 2010 Final
Jan Mag 2010 Finalkarlw78
 
ATHI RIVER RFC jamii telekom sponsorship
ATHI RIVER RFC jamii telekom sponsorshipATHI RIVER RFC jamii telekom sponsorship
ATHI RIVER RFC jamii telekom sponsorshipohweeeezy
 
The Commodity Crunch: Value at Risk from Deforestation
The Commodity Crunch: Value at Risk from DeforestationThe Commodity Crunch: Value at Risk from Deforestation
The Commodity Crunch: Value at Risk from DeforestationSustainable Brands
 

Viewers also liked (20)

Dissecting and Mitigating the Privacy Risk of Personal Cloud Apps (at PETS 2016)
Dissecting and Mitigating the Privacy Risk of Personal Cloud Apps (at PETS 2016)Dissecting and Mitigating the Privacy Risk of Personal Cloud Apps (at PETS 2016)
Dissecting and Mitigating the Privacy Risk of Personal Cloud Apps (at PETS 2016)
 
viaprinto Motivkalender 2014 - Mit Ihrem Gratis-Werbeeindruck
viaprinto Motivkalender 2014 - Mit Ihrem Gratis-Werbeeindruckviaprinto Motivkalender 2014 - Mit Ihrem Gratis-Werbeeindruck
viaprinto Motivkalender 2014 - Mit Ihrem Gratis-Werbeeindruck
 
(Métodos Inv.) Tema 7 - El método en la Inv. Cientifica
(Métodos Inv.) Tema 7 - El método en la Inv. Cientifica(Métodos Inv.) Tema 7 - El método en la Inv. Cientifica
(Métodos Inv.) Tema 7 - El método en la Inv. Cientifica
 
OEB12: Enhancing participatory culture: iCollab pre-conference workshop
OEB12: Enhancing participatory culture: iCollab pre-conference workshopOEB12: Enhancing participatory culture: iCollab pre-conference workshop
OEB12: Enhancing participatory culture: iCollab pre-conference workshop
 
Mc aese
Mc aese Mc aese
Mc aese
 
Bd euregio en
Bd euregio enBd euregio en
Bd euregio en
 
A stronger wffp eng
A stronger wffp engA stronger wffp eng
A stronger wffp eng
 
Propuesta corporativa split billin (1)
Propuesta corporativa split billin (1)Propuesta corporativa split billin (1)
Propuesta corporativa split billin (1)
 
Ascoltare con itelligenza
Ascoltare con itelligenzaAscoltare con itelligenza
Ascoltare con itelligenza
 
Casas patrimoniales - barrio orellana
Casas patrimoniales - barrio orellanaCasas patrimoniales - barrio orellana
Casas patrimoniales - barrio orellana
 
Implementering Fronter Högasten RååSödra, JonasHogasten
Implementering Fronter Högasten RååSödra, JonasHogastenImplementering Fronter Högasten RååSödra, JonasHogasten
Implementering Fronter Högasten RååSödra, JonasHogasten
 
Presentation1
Presentation1Presentation1
Presentation1
 
NetTask Lync Roadshow - Microsoft Cloud Strategy - Peter Gröpper
NetTask Lync Roadshow - Microsoft Cloud Strategy - Peter GröpperNetTask Lync Roadshow - Microsoft Cloud Strategy - Peter Gröpper
NetTask Lync Roadshow - Microsoft Cloud Strategy - Peter Gröpper
 
Metodología de la evaluación de las formaciones en Francia: criterios, refere...
Metodología de la evaluación de las formaciones en Francia: criterios, refere...Metodología de la evaluación de las formaciones en Francia: criterios, refere...
Metodología de la evaluación de las formaciones en Francia: criterios, refere...
 
Tema 5. dinamica_de_la_geosfera__0
Tema 5. dinamica_de_la_geosfera__0Tema 5. dinamica_de_la_geosfera__0
Tema 5. dinamica_de_la_geosfera__0
 
San anton 2014
San anton 2014San anton 2014
San anton 2014
 
Sharepointtest
SharepointtestSharepointtest
Sharepointtest
 
Jan Mag 2010 Final
Jan Mag 2010 FinalJan Mag 2010 Final
Jan Mag 2010 Final
 
ATHI RIVER RFC jamii telekom sponsorship
ATHI RIVER RFC jamii telekom sponsorshipATHI RIVER RFC jamii telekom sponsorship
ATHI RIVER RFC jamii telekom sponsorship
 
The Commodity Crunch: Value at Risk from Deforestation
The Commodity Crunch: Value at Risk from DeforestationThe Commodity Crunch: Value at Risk from Deforestation
The Commodity Crunch: Value at Risk from Deforestation
 

Similar to C3P: Context-Aware Crowdsourced Cloud Privacy (at PETS 2014)

Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.Netskope
 
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...Keith Kraus
 
Meetup presenation 06192013
Meetup presenation 06192013 Meetup presenation 06192013
Meetup presenation 06192013 Sqrrl
 
Get full visibility and find hidden security issues
Get full visibility and find hidden security issuesGet full visibility and find hidden security issues
Get full visibility and find hidden security issuesElasticsearch
 
Make Your Reports Over the Counter
Make Your Reports Over the CounterMake Your Reports Over the Counter
Make Your Reports Over the CounterTIBCO Jaspersoft
 
Don't think DevOps think Compliant Database DevOps
Don't think DevOps think Compliant Database DevOpsDon't think DevOps think Compliant Database DevOps
Don't think DevOps think Compliant Database DevOpsRed Gate Software
 
Enabling Dropbox for Business
Enabling Dropbox for BusinessEnabling Dropbox for Business
Enabling Dropbox for BusinessElastica Inc.
 
2017 12 lab informatics summit
2017 12 lab informatics summit2017 12 lab informatics summit
2017 12 lab informatics summitChris Dwan
 
CONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin NystromCONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin NystromPROIDEA
 
Talk @FH Hagenberg - Data viz in a collaborative mixed reality space
Talk @FH Hagenberg - Data viz in a collaborative mixed reality spaceTalk @FH Hagenberg - Data viz in a collaborative mixed reality space
Talk @FH Hagenberg - Data viz in a collaborative mixed reality spaceStefan Wasserbauer
 
Strengthen Cloud Security
Strengthen Cloud SecurityStrengthen Cloud Security
Strengthen Cloud SecurityLora O'Haver
 
dlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptxdlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptxalex hincapie
 
Privacy Preserved Data Augmentation using Enterprise Data Fabric
Privacy Preserved Data Augmentation using Enterprise Data FabricPrivacy Preserved Data Augmentation using Enterprise Data Fabric
Privacy Preserved Data Augmentation using Enterprise Data FabricAtif Shaikh
 
2016 Cybersecurity Analytics State of the Union
2016 Cybersecurity Analytics State of the Union2016 Cybersecurity Analytics State of the Union
2016 Cybersecurity Analytics State of the UnionCloudera, Inc.
 
Webinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxingWebinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxingCyren, Inc
 
Information security awareness training
Information security awareness trainingInformation security awareness training
Information security awareness trainingSandeep Taileng
 
Beyond a Big Data Pilot: Building a Production Data Infrastructure - Stampede...
Beyond a Big Data Pilot: Building a Production Data Infrastructure - Stampede...Beyond a Big Data Pilot: Building a Production Data Infrastructure - Stampede...
Beyond a Big Data Pilot: Building a Production Data Infrastructure - Stampede...StampedeCon
 
Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionMarketingArrowECS_CZ
 
Veritas Solution Day 2017, France, keynote by Mike Palmer
Veritas Solution Day 2017, France, keynote by Mike PalmerVeritas Solution Day 2017, France, keynote by Mike Palmer
Veritas Solution Day 2017, France, keynote by Mike PalmerVeritas Technologies LLC
 
El contexto de la integración masiva de datos
El contexto de la integración masiva de datosEl contexto de la integración masiva de datos
El contexto de la integración masiva de datosSoftware Guru
 

Similar to C3P: Context-Aware Crowdsourced Cloud Privacy (at PETS 2014) (20)

Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
 
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
 
Meetup presenation 06192013
Meetup presenation 06192013 Meetup presenation 06192013
Meetup presenation 06192013
 
Get full visibility and find hidden security issues
Get full visibility and find hidden security issuesGet full visibility and find hidden security issues
Get full visibility and find hidden security issues
 
Make Your Reports Over the Counter
Make Your Reports Over the CounterMake Your Reports Over the Counter
Make Your Reports Over the Counter
 
Don't think DevOps think Compliant Database DevOps
Don't think DevOps think Compliant Database DevOpsDon't think DevOps think Compliant Database DevOps
Don't think DevOps think Compliant Database DevOps
 
Enabling Dropbox for Business
Enabling Dropbox for BusinessEnabling Dropbox for Business
Enabling Dropbox for Business
 
2017 12 lab informatics summit
2017 12 lab informatics summit2017 12 lab informatics summit
2017 12 lab informatics summit
 
CONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin NystromCONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin Nystrom
 
Talk @FH Hagenberg - Data viz in a collaborative mixed reality space
Talk @FH Hagenberg - Data viz in a collaborative mixed reality spaceTalk @FH Hagenberg - Data viz in a collaborative mixed reality space
Talk @FH Hagenberg - Data viz in a collaborative mixed reality space
 
Strengthen Cloud Security
Strengthen Cloud SecurityStrengthen Cloud Security
Strengthen Cloud Security
 
dlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptxdlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptx
 
Privacy Preserved Data Augmentation using Enterprise Data Fabric
Privacy Preserved Data Augmentation using Enterprise Data FabricPrivacy Preserved Data Augmentation using Enterprise Data Fabric
Privacy Preserved Data Augmentation using Enterprise Data Fabric
 
2016 Cybersecurity Analytics State of the Union
2016 Cybersecurity Analytics State of the Union2016 Cybersecurity Analytics State of the Union
2016 Cybersecurity Analytics State of the Union
 
Webinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxingWebinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxing
 
Information security awareness training
Information security awareness trainingInformation security awareness training
Information security awareness training
 
Beyond a Big Data Pilot: Building a Production Data Infrastructure - Stampede...
Beyond a Big Data Pilot: Building a Production Data Infrastructure - Stampede...Beyond a Big Data Pilot: Building a Production Data Infrastructure - Stampede...
Beyond a Big Data Pilot: Building a Production Data Infrastructure - Stampede...
 
Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data Protection
 
Veritas Solution Day 2017, France, keynote by Mike Palmer
Veritas Solution Day 2017, France, keynote by Mike PalmerVeritas Solution Day 2017, France, keynote by Mike Palmer
Veritas Solution Day 2017, France, keynote by Mike Palmer
 
El contexto de la integración masiva de datos
El contexto de la integración masiva de datosEl contexto de la integración masiva de datos
El contexto de la integración masiva de datos
 

Recently uploaded

WSO2Con2024 - Simplified Integration: Unveiling the Latest Features in WSO2 L...
WSO2Con2024 - Simplified Integration: Unveiling the Latest Features in WSO2 L...WSO2Con2024 - Simplified Integration: Unveiling the Latest Features in WSO2 L...
WSO2Con2024 - Simplified Integration: Unveiling the Latest Features in WSO2 L...WSO2
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplatePresentation.STUDIO
 
WSO2CON 2024 - Building a Digital Government in Uganda
WSO2CON 2024 - Building a Digital Government in UgandaWSO2CON 2024 - Building a Digital Government in Uganda
WSO2CON 2024 - Building a Digital Government in UgandaWSO2
 
WSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - KeynoteWSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - KeynoteWSO2
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...Shane Coughlan
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2
 
WSO2Con2024 - Software Delivery in Hybrid Environments
WSO2Con2024 - Software Delivery in Hybrid EnvironmentsWSO2Con2024 - Software Delivery in Hybrid Environments
WSO2Con2024 - Software Delivery in Hybrid EnvironmentsWSO2
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension AidPhilip Schwarz
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastPapp Krisztián
 
WSO2Con2024 - From Blueprint to Brilliance: WSO2's Guide to API-First Enginee...
WSO2Con2024 - From Blueprint to Brilliance: WSO2's Guide to API-First Enginee...WSO2Con2024 - From Blueprint to Brilliance: WSO2's Guide to API-First Enginee...
WSO2Con2024 - From Blueprint to Brilliance: WSO2's Guide to API-First Enginee...WSO2
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisamasabamasaba
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2
 
WSO2Con2024 - Organization Management: The Revolution in B2B CIAM
WSO2Con2024 - Organization Management: The Revolution in B2B CIAMWSO2Con2024 - Organization Management: The Revolution in B2B CIAM
WSO2Con2024 - Organization Management: The Revolution in B2B CIAMWSO2
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2
 
WSO2CON2024 - Why Should You Consider Ballerina for Your Next Integration
WSO2CON2024 - Why Should You Consider Ballerina for Your Next IntegrationWSO2CON2024 - Why Should You Consider Ballerina for Your Next Integration
WSO2CON2024 - Why Should You Consider Ballerina for Your Next IntegrationWSO2
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2
 
WSO2CON 2024 - Not Just Microservices: Rightsize Your Services!
WSO2CON 2024 - Not Just Microservices: Rightsize Your Services!WSO2CON 2024 - Not Just Microservices: Rightsize Your Services!
WSO2CON 2024 - Not Just Microservices: Rightsize Your Services!WSO2
 
Artyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxArtyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxAnnaArtyushina1
 

Recently uploaded (20)

WSO2Con2024 - Simplified Integration: Unveiling the Latest Features in WSO2 L...
WSO2Con2024 - Simplified Integration: Unveiling the Latest Features in WSO2 L...WSO2Con2024 - Simplified Integration: Unveiling the Latest Features in WSO2 L...
WSO2Con2024 - Simplified Integration: Unveiling the Latest Features in WSO2 L...
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
WSO2CON 2024 - Building a Digital Government in Uganda
WSO2CON 2024 - Building a Digital Government in UgandaWSO2CON 2024 - Building a Digital Government in Uganda
WSO2CON 2024 - Building a Digital Government in Uganda
 
WSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - KeynoteWSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - Keynote
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
WSO2Con2024 - Software Delivery in Hybrid Environments
WSO2Con2024 - Software Delivery in Hybrid EnvironmentsWSO2Con2024 - Software Delivery in Hybrid Environments
WSO2Con2024 - Software Delivery in Hybrid Environments
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
WSO2Con2024 - From Blueprint to Brilliance: WSO2's Guide to API-First Enginee...
WSO2Con2024 - From Blueprint to Brilliance: WSO2's Guide to API-First Enginee...WSO2Con2024 - From Blueprint to Brilliance: WSO2's Guide to API-First Enginee...
WSO2Con2024 - From Blueprint to Brilliance: WSO2's Guide to API-First Enginee...
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
 
WSO2Con2024 - Organization Management: The Revolution in B2B CIAM
WSO2Con2024 - Organization Management: The Revolution in B2B CIAMWSO2Con2024 - Organization Management: The Revolution in B2B CIAM
WSO2Con2024 - Organization Management: The Revolution in B2B CIAM
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
WSO2CON2024 - Why Should You Consider Ballerina for Your Next Integration
WSO2CON2024 - Why Should You Consider Ballerina for Your Next IntegrationWSO2CON2024 - Why Should You Consider Ballerina for Your Next Integration
WSO2CON2024 - Why Should You Consider Ballerina for Your Next Integration
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
 
WSO2CON 2024 - Not Just Microservices: Rightsize Your Services!
WSO2CON 2024 - Not Just Microservices: Rightsize Your Services!WSO2CON 2024 - Not Just Microservices: Rightsize Your Services!
WSO2CON 2024 - Not Just Microservices: Rightsize Your Services!
 
Artyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxArtyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptx
 

C3P: Context-Aware Crowdsourced Cloud Privacy (at PETS 2014)