Proceedings of the 2017 Workshop on Women in Cyber Security最新文献

筛选
英文 中文
Keynote: Security and Privacy in the Age of IoT 主题演讲:物联网时代的安全与隐私
Proceedings of the 2017 Workshop on Women in Cyber Security Pub Date : 2017-10-30 DOI: 10.1145/3139531.3139539
A. Cárdenas
{"title":"Keynote: Security and Privacy in the Age of IoT","authors":"A. Cárdenas","doi":"10.1145/3139531.3139539","DOIUrl":"https://doi.org/10.1145/3139531.3139539","url":null,"abstract":"In this talk I will summarize three papers from our research group [1-3] studying areas where IoT technologies are having profound implications on our expectations of security, safety, and privacy. Sexual preferences are one of our most intimate and private choices, and new IoT devices, while facilitating and expanding how partners can enjoy sexual intimacy can also put at risk their privacy and safety. The first part of the talk will focus on ourwork analyzing three smart vibrators [3]. We found several vulnerabilities that can lead to privacy and even sexual assault. We discuss this work in the context of liberty and morals legislation.","PeriodicalId":295031,"journal":{"name":"Proceedings of the 2017 Workshop on Women in Cyber Security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115444803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Keynote: Human-Centric Cyber 主题演讲:以人为中心的网络
Proceedings of the 2017 Workshop on Women in Cyber Security Pub Date : 2017-10-30 DOI: 10.1145/3139531.3139538
D. Staheli
{"title":"Keynote: Human-Centric Cyber","authors":"D. Staheli","doi":"10.1145/3139531.3139538","DOIUrl":"https://doi.org/10.1145/3139531.3139538","url":null,"abstract":"In this keynote, I will discuss the importance of human factors in cyber security and highlight lessons learned from conducting user-centered design activities with cyber security analysts. As network traffic volume, interconnectedness of devices, and sophistication of cyber threats all continue to increase, so do concerns about the complexity of providing cyber security. Many research efforts focus on the technology aspects of cyber security; few focus on studying the challenges faced by the human ecosystem of analysts, operators, and senior leaders. User-centered design can help uncover unmet needs and gather requirements to build effective systems to support those that perform cyber security work. Design methods in this domain can help establish user needs, identify opportunities for technology to assist, and evaluate concepts - in this, talk we will discuss examples of each. Ultimately, by embracing the human element of cyber, and positioning the human as the focal point of the research process, we can help the technology community be more efficient at building effective tools. We encourage future cyber security projects to broaden the research methodologies, methods, and techniques at their disposal in order to more completely explore this space. The talk will draw from research experience and field work with users on a number of cyber security research projects. Topics covered will include formative user research and the user-centered design process [1, 2], situation awareness prototyping efforts [3, 4], and evaluation methods for cyber security visualization tools [5].","PeriodicalId":295031,"journal":{"name":"Proceedings of the 2017 Workshop on Women in Cyber Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131037542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Keynote: Research Challenges and Opportunities in IoT Security 主题演讲:物联网安全的研究挑战与机遇
Proceedings of the 2017 Workshop on Women in Cyber Security Pub Date : 2017-10-30 DOI: 10.1145/3139531.3139535
E. Bertino
{"title":"Keynote: Research Challenges and Opportunities in IoT Security","authors":"E. Bertino","doi":"10.1145/3139531.3139535","DOIUrl":"https://doi.org/10.1145/3139531.3139535","url":null,"abstract":"The Internet of Things (IoT) paradigm refers to the network of physical objects or 'things' embedded with electronics, software, sensors, and connectivity to enable objects to exchange data with servers, centralized systems, and/or other connected devices based on a variety of communication infrastructures. IoT makes it possible to sense and control objects creating opportunities for more direct integration between the physical world and computer-based systems. IoT will usher automation in a large number of application domains, ranging from manufacturing and energy management (e.g. SmartGrid), to healthcare management and urban life (e.g. SmartCity). However, because of its fine-grained, continuous and pervasive data acquisition and control capabilities, IoT raises concerns about security. IoT systems are at risk for several reasons. They do not have well defined perimeters, are highly dynamic, and continuously change because of mobility. In addition IoT systems are highly heterogeneous with respect to communication medium and protocols, platforms, and devices. IoT systems may also include 'objects' not designed to be connected to the Internet. Finally, IoT systems, or portions of them, may be physically unprotected and/or controlled by different parties. Attacks, against which there are established defense techniques in the context of conventional information systems and mobile environments, are thus much more difficult to protect against in the IoT. IoT systems thus offer challenging research opportunities in many different areas of cyber security, ranging from cryptographic protocols and public key infrastructures to application and data security. In this talk, after outlining key challenges in IoT security, we present initial approaches to securing IoT data, including firewall techniques to prevent IoT devices from being compromised and used by botnets.","PeriodicalId":295031,"journal":{"name":"Proceedings of the 2017 Workshop on Women in Cyber Security","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134414532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Session details: Privacy, Society, and Me 会议细节:隐私,社会和我
Proceedings of the 2017 Workshop on Women in Cyber Security Pub Date : 2017-10-30 DOI: 10.1145/3256009
B. Thuraisingham
{"title":"Session details: Privacy, Society, and Me","authors":"B. Thuraisingham","doi":"10.1145/3256009","DOIUrl":"https://doi.org/10.1145/3256009","url":null,"abstract":"","PeriodicalId":295031,"journal":{"name":"Proceedings of the 2017 Workshop on Women in Cyber Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122197835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Security Challenges 会议细节:安全挑战
Proceedings of the 2017 Workshop on Women in Cyber Security Pub Date : 2017-10-30 DOI: 10.1145/3256008
D. Yao
{"title":"Session details: Security Challenges","authors":"D. Yao","doi":"10.1145/3256008","DOIUrl":"https://doi.org/10.1145/3256008","url":null,"abstract":"","PeriodicalId":295031,"journal":{"name":"Proceedings of the 2017 Workshop on Women in Cyber Security","volume":"514 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123203208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proceedings of the 2017 Workshop on Women in Cyber Security 2017年女性参与网络安全研讨会论文集
Proceedings of the 2017 Workshop on Women in Cyber Security Pub Date : 2017-10-30 DOI: 10.1145/3139531
D. Yao, E. Bertino
{"title":"Proceedings of the 2017 Workshop on Women in Cyber Security","authors":"D. Yao, E. Bertino","doi":"10.1145/3139531","DOIUrl":"https://doi.org/10.1145/3139531","url":null,"abstract":"It is our great pleasure to welcome you to the 2017 Women in Cyber Security Workshop - CyberW'17. The mission of this workshop is multi-fold. First and foremost, we hope to attract females and people from other underrepresented groups to engage in cutting-edge security and privacy research. Second, we hope to showcase the achievements of outstanding female and minority researchers and leaders and encourage others to take on senior and leadership roles. Last but not the least, the workshop provides an interactive forum for helping people who seek research feedback and career advice. \u0000 \u0000We are extremely honored to have a group of outstanding security and privacy researchers, whose mindsets are aligned with the CyberW missions, to give two (2) insightful opening remarks and six (6) technical keynotes. The open remarks are: \u0000Why a Cyber Security Career for a Woman?, Dr. Bhavani Thuraisingham (Louis A. Beecherl, Jr. Distinguished Professor, Executive Director of the Cyber Security Research Institute, University of Texas at Dallas) \u0000Truth, Social Justice (and the American Way?), Dr. David Evans (Professor, University of Virginia) \u0000 \u0000 \u0000 \u0000The technical keynotes are: \u0000The Evolutionary Mess: Computing and Cybersecurity Come of Age, Dr. Stephanie Forrest (Center Director of the Biodesign Institute and Professor, Arizona State University) \u0000Research Challenges and Opportunities in IoT Security, Dr. Elisa Bertino (Samuel Conte Term Professor, Research Director of CERIAS, Director of Cyber Center, Purdue University) \u0000Privacy in Today's World, Dr. Rebecca Wright (Professor, Director of DIMACS, Rutgers University) \u0000Privacy and Trust: Friend or Foe, Dr. Ling Liu (Professor, Director of Distributed Data Intensive Systems Lab, Georgia Institute of Technology) \u0000Human-Centric Cyber, Diane Staheli (Technical Staff, Assistant Group Leader, MIT Lincoln Laboratory) \u0000Security and Privacy in the Age of IoT, Dr. Alvaro Cardenas (Assistant Professor, University of Texas at Dallas)","PeriodicalId":295031,"journal":{"name":"Proceedings of the 2017 Workshop on Women in Cyber Security","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114837244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Inclusive Excellence 会议细节:包容性卓越
Proceedings of the 2017 Workshop on Women in Cyber Security Pub Date : 2017-10-30 DOI: 10.1145/3256007
E. Bertino
{"title":"Session details: Inclusive Excellence","authors":"E. Bertino","doi":"10.1145/3256007","DOIUrl":"https://doi.org/10.1145/3256007","url":null,"abstract":"","PeriodicalId":295031,"journal":{"name":"Proceedings of the 2017 Workshop on Women in Cyber Security","volume":"279 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116562359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Keynote: Truth, Social Justice (and the American Way?) 主题演讲:真理、社会正义(和美国方式?)
Proceedings of the 2017 Workshop on Women in Cyber Security Pub Date : 2017-10-30 DOI: 10.1145/3139531.3139533
David E. Evans
{"title":"Keynote: Truth, Social Justice (and the American Way?)","authors":"David E. Evans","doi":"10.1145/3139531.3139533","DOIUrl":"https://doi.org/10.1145/3139531.3139533","url":null,"abstract":"In addition to being a long-standing problem in the computer science research literature, bathroom placement raises the complex questions of equality, fairness, and social justice, in a simpler domain than the issues we face in computing. Bathrooms are also something that we can, without much controversy, agree does involve some intrinsic biological differences. In most areas, the issues are not so bare as they are for restrooms, but similar issues arise. One of the great challenges we have in discussing under-representation of women in computing is that equality, fairness, and social justice are often in conflict with each other.","PeriodicalId":295031,"journal":{"name":"Proceedings of the 2017 Workshop on Women in Cyber Security","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125742142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Keynote: Privacy and Trust: Friend or Foe 主题演讲:隐私与信任:是敌是友
Proceedings of the 2017 Workshop on Women in Cyber Security Pub Date : 2017-10-30 DOI: 10.1145/3139531.3139537
Ling Liu
{"title":"Keynote: Privacy and Trust: Friend or Foe","authors":"Ling Liu","doi":"10.1145/3139531.3139537","DOIUrl":"https://doi.org/10.1145/3139531.3139537","url":null,"abstract":"Internet of Things (IoT) and Big Data have fueled the development of fully distributed computational architectures for future cyber systems from data analytics, machine learning (ML) to artificial intelligence (AI). Trust and Privacy become two vital and necessary measures for distributed management of IoT powered big data learning systems and services. However, these two measures have been studied independently in computer science, social science and law. Trust is widely considered as a critical measure for the correctness, predictability, and resiliency (with respect to reliability and security) of software systems, be it big data systems, IoT systems, machine learning systems, or Artificial Intelligence systems. Privacy on the other hand is commonly recognized as a personalization measure for imposing control on the ways of how data is captured, accessed and analyzed, and the ways of how data analytic results from ML models and AI systems should be released and shared. Broadly speaking, in human society, we rely on three types of trust in our everyday work and life to achieve a peaceful mind: (1) verifiable belief-driven trust, (2) statistical evidence based trust, and (3) complex systemwide cognitive trust. Interestingly, privacy has been a more controversial subject. On one hand, privacy is an important built-in dimension of trust, which is deep rooted in human society, and a highly valued virtue in Western civilization. Even though different human beings may have diverse levels of privacy sensitivity, we all trust that our privacy is respected in our social and professional environments, including at home, at work and in social commons. Thus, Privacy is a perfect example of three-fold trust: belief-driven, statistical evident, and complex cognitive trust. On the other hand, many view privacy (and privacy protection) as an antagonistic measure of trust and one is often asked to show trust at the cost of giving up on privacy. Are Privacy and Trust friend or foe? This keynote will share my view to this question from multiple perspectives. I conjecture that the answer to this question can fundamentally change the ways we conduct research in privacy and trust in the next generation of big data enhanced cyber learning systems from data mining, machine learning to artificial intelligence.","PeriodicalId":295031,"journal":{"name":"Proceedings of the 2017 Workshop on Women in Cyber Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126984915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Cybersecurity in Practice 会议详情:网络安全实践
Proceedings of the 2017 Workshop on Women in Cyber Security Pub Date : 2017-10-30 DOI: 10.1145/3256010
Hui Wang
{"title":"Session details: Cybersecurity in Practice","authors":"Hui Wang","doi":"10.1145/3256010","DOIUrl":"https://doi.org/10.1145/3256010","url":null,"abstract":"","PeriodicalId":295031,"journal":{"name":"Proceedings of the 2017 Workshop on Women in Cyber Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128823814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信