Integrity and Privacy in the Cloud: Efficient Algorithms for Secure And

Total Page:16

File Type:pdf, Size:1020Kb

Integrity and Privacy in the Cloud: Efficient Algorithms for Secure And Abstract of “Integrity and Privacy in the Cloud: Efficient algorithms for secure and privacy-preserving processing of outsourced data” by Esha Ghosh, Ph.D., Brown University, April 2018. An integral component of the modern computing era is the ability to outsource data and computation to remote cloud service providers or CSPs. The advent of cloud services, however, raises important challenges of in terms of integrity and privacy of data and computation. As soon as users delegate computation to cloud platforms (such as Microsoft Azure or Amazon AWS), concerns related to integrity of the results arise. For example, have all correct inputs been used in the computation? Were all the computation steps applied in the correct order? Have the results been delivered untampered? Moreover, in the face of an alarming number of data breaches and massive surveillance programs around the globe, the privacy of outsourced data is becoming more important than ever. This thesis focuses on designing efficient privacy-preserving and verifiable data processing queries for a rich class of data structures along with prototype implementation and experimental validation. In particular, we focus on the following setting: how can a trusted data owner outsource her data to an untrusted server, such that the server will not be able to cheat while answering queries on the stored data. In other words, we require the server to produce a cryptographic proof for each answer it produces. Moreover, we require the proofs to be privacy-preserving, i.e., they should not leak any information about the data structure or the updates on it besides what can be inferred from the answers. We also consider another dimension of privacy for verifiable outsourced data-processing, namely, encrypting the outsourced data. More concretely, we consider the setting where the data structure is encrypted before outsourcing using a customized encryption scheme that allows the server to compute queries on the encrypted data. Furthermore, the client can efficiently check if the server has correctly computed the answer. In this thesis, we focus on range queries, closest point queries, dictionary queries, set algebraic queries and reachability and shortest path queries on general graphs. Integrity and Privacy in the Cloud: Efficient algorithms for secure and privacy-preserving processing of outsourced data by Esha Ghosh A dissertation submitted in partial fulfillment of the requirements for the Degree of Doctor of Philosophy in the Department of Computer Science at Brown University Providence, Rhode Island April 2018 © Copyright 2018 by Esha Ghosh This dissertation by Esha Ghosh is accepted in its present form by the Department of Computer Science as satisfying the dissertation requirement for the degree of Doctor of Philosophy. Date Roberto Tamassia, Director Recommended to the Graduate Council Date Anna Lysyanskaya, Reader Date Seny Kamara, Reader Approved by the Graduate Council Date Andrew G. Campbell Dean of the Graduate School iii Acknowledgements It is a great pleasure to thank everybody without whose continuous support, this thesis would not have materi- alized. First and foremost, I thank my adviser Roberto Tamassia. Roberto has been a truly supportive adviser, an inspiring mentor and a great role model to me. He has always made himself available for me, be it for research meetings or for ethical advice. Roberto’s kind and graceful advising style and his approach towards inclusiveness and diversity is a great source of inspiration for me. I feel truly honored to be his student. I am very thankful to my committee members Anna Lysyanskaya and Seny Kamara who followed my research closely and have mentored me throughout my Ph.D journey. I had the wonderful opportunity to collaborate with Seny towards the end of my Ph.D. I thank Sorin Istrail and John Savage for following my research from time to time and for their great words of encouragement. My heartfelt thanks to Ugur Cetintemel for his insightful career advice and support. I had the pleasure to collaborate with Michael Goodrich in the earlier half of my PhD. Michael’s enthu- siasm and self-critical approach to research greatly shaped my perspective on research. Olya Ohrimenko has been a wonderful mentor, my internship host (at Microsoft Research) and collaborator on multiple projects. She has been a source of unwavering support throughout these years. I am particularly thankful to the security group at Brown; it is a remarkable place for exchanging ideas and sharing constructive criticism. The CS department at Brown could not have fostered such a great academic environment without tremendous contributions from the TStaff and AStaff members. My sincere thanks to Lauren Clarke, Genie DeGouveia, Donald Johwa, Jesse Polhemus, Dawn Reed, Frank Pari and to all other staff members. I am grateful to all my other collaborators, namely, Christian Cachin, Jan Camenisch, Melissa Chase, Angelo De Caro, Apoorvaa Deshpande, Dario Fiore, Cedric Fournet, Markulf Kohlweiss, Dimitrios Pa- padopoulos, Bryan Parno, Alessandro Sorniotti, Björn, Tackman and Nikos Triandopoulos. My collaboration with them has been a great learning experience. A special thanks to my internship mentors Alessandro and Angelo for hosting me at IBM Zurich. I tremendously enjoyed my time at IBM. Thanks to Roberto and the support from my Microsoft research Dissertation Grant, I also had the opportunity to work with a group of bright undergrad and masters students at Brown, Talley Amir, Nick Cunningham and Harjasleen Mal- vai. I thank Donghoon Chang, Melissa Chase, Jonathan Katz, Satya Lokam, Dahlia Malkhi, Charalampos Papamanthou and Sushmita Ruj for hosting me for short visits during my Ph.D. Thanks to Anubhav, Apoorvaa, Cindy, Elizabeth, Evgenios, Jasper, Krishna, Prannath, Sasha, Yizhen and Zhiyu for being such great friends and for making my stay in Providence so fond. A very special thanks to iv Chaya for always being there, every step of the way and for making New York, home. Sajin has been a tremendous source of strength and support during the final years of my Ph.D. I could not have undertaken this journey, far away from home, if not for the unconditional support of my family. Throughout my life, their love and support has given me the courage to pursue my interests unapologetically and has made me the person I am today. v Contents List of Tables ix List of Figures x 1 Introduction 1 2 Efficient Verifiable Range and Closest Point Queries in Zero-Knowledge 4 2.1 Introduction . .4 2.2 Related Work . .6 2.3 Preliminaries . .8 2.4 Model . 10 2.4.1 Security Properties . 10 2.5 Our Construction . 12 2.5.1 Range Query Construction . 13 2.5.2 Closest Point Query . 15 2.5.3 Complexity Analysis for RQ ............................. 16 2.6 Security Analysis . 17 2.6.1 Proof of Soundness . 17 2.6.2 Proof of Zero-Knowledge . 18 2.7 Experiments on Synthetic Data . 19 2.7.1 Data . 19 2.7.2 Setup Phase . 20 2.7.3 Range Query Phase . 20 2.7.4 Server Storage Cost . 21 2.7.5 Comparison with Ostrovsky et al. [123] . 22 2.7.6 Closest Point Query . 23 2.8 Experiments on Real-World Data . 23 2.8.1 Enron Data . 23 2.8.2 Boston Taxi Data . 24 2.8.3 Performance . 24 vi 2.9 Conclusion . 25 3 Zero-Knowledge Accumulators and Set Operations 26 3.1 Introduction . 26 3.2 Preliminaries . 30 3.3 Zero-Knowledge Universal Accumulators . 34 3.3.1 Security Properties . 38 3.4 A Zero-knowledge accumulator from the q-Strong Bilinear Diffie-Hellman Assumption . 41 3.5 Zero-Knowledge Authenticated Set Collection (ZKASC) . 45 3.5.1 Model . 46 3.5.2 Security Properties . 47 3.6 Zero-Knowledge Authenticated Set Collection Construction . 49 3.6.1 Setup and Update Algorithms . 50 3.6.2 Set Algebra Query and Verify Algorithms . 53 3.6.3 Subset Query . 53 3.6.4 Set Intersection Query . 54 3.6.5 Set Union . 56 3.6.6 Set Difference Query . 58 3.6.7 Efficiency Comparison with the Scheme of [127] . 59 3.6.8 Security Proofs . 60 3.7 Conclusion . 68 4 Efficient and Verifiable Graph Encryption Schemes for Shortest Path Queries 71 4.1 Introduction . 71 4.1.1 Our Techniques and Contributions . 72 4.2 Related work . 73 4.3 Preliminaries . 74 4.3.1 Abstract data types and data structures. 74 4.3.2 Structured Encryption . 75 4.4 Graph Encryption for SPSP Queries . 77 4.4.1 Security . 79 4.5 Achieving security in the malicious model . 84 4.6 Experiments . 85 4.6.1 System specifications, Primitives and Data Sets . 85 4.6.2 Graph Dataset . 85 4.6.3 Setup . 86 4.6.4 Search . 87 4.7 Conclusion . 87 vii 5 Efficient and Verifiable Reachability Queries on General Graphs in Zero-Knowledge 90 5.1 Introduction . 90 5.1.1 Related Work . 91 5.1.2 Our Contribution . 91 5.2 Preliminaries . 92 5.2.1 Unforgeable Signature Scheme . 93 5.2.2 Aggregate Signature Scheme . 93 5.2.3 Commitment Scheme . 94 5.2.4 Zero-Knowledge Authenticated Data Structure . 95 5.2.5 Model . ..
Recommended publications
  • Nil Ib N O Ir Ali Mi S Na El Oo B Ilp Itl
    ecneicS retupmoC retupmoC ecneicS ecneicS - o t- o l t aA l aA DD DD 9 9 / / OOnn BBiilliinneeaarr TTeecchhnniiqquueess ffoorr 0202 0202 a p pa p r p a r K a K ii t t t aM t aM SSiimmiillaarriittyy SSeeaarrcchh aanndd BBoooolleeaann MMaattrriixx M ultiplication Multiplication MMaatttit iK Kaarprpppaa noi taci lpi t luM xi r taM naelooB dna hcraeS yt i ral imiS rof seuqinhceT raeni l iB nO noi taci lpi t luM xi r taM naelooB dna hcraeS yt i ral imiS rof seuqinhceT raeni l iB nO BBUUSSININESESS + + ECECOONNOOMMY Y NSI I NBS NBS 879 - 879 - 259 - 259 - 06 - 06 - 5198 - 5198 7 - 7 ( p ( r p i n r t i n t de ) de ) AARRT T+ + NSI I NBS NBS 879 - 879 - 259 - 259 - 06 - 06 - 6198 - 6198 4 - 4 ( ( dp f dp ) f ) DDESESIGIGNN + + NSI I NSS NSS 9971 - 9971 - 4394 4394 ( p ( r p i n r t i n t de ) de ) AARRCCHHITIETCECTUTURRE E NSI I NSS NSS 9971 - 9971 - 2494 2494 ( ( dp f dp ) f ) SSCCIEINENCCE E+ + TETCECHHNNOOLOLOGGY Y tirvn tlaA ot laA ot isrevinU yt isrevinU yt CCRROOSSSOOVEVRE R ceic fo o oohcS f l cS o oohcS i f l cS i ecne ecne DDOOCCTOTORRAAL L ecneicS retupmoC retupmoC ecneicS ecneicS DDISISSERERTATTAITOIONNS S DDOOCCTOTORRAAL L +hfbjia*GMFTSH9 +hfbjia*GMFTSH9 fi.otlaa.www . www a . a a l a t o l t . o fi . fi DDISISSERERTATTAITOIONNS S ot laA ytot laA isrevinU yt isrevinU 0202 0202 Aalto University publication series DOCTORAL DISSERTATIONS 9/2020 On Bilinear Techniques for Similarity Search and Boolean Matrix Multiplication Matti Karppa A doctoral dissertation completed for the degree of Doctor of Science (Technology) to be defended, with the permission of the Aalto University School of Science, at a public examination held at the lecture hall T2 of the school on 24 January 2020 at 12.
    [Show full text]
  • On-Device Machine Learning: an Algorithms and Learning Theory Perspective
    On-Device Machine Learning: An Algorithms and Learning Theory Perspective SAUPTIK DHAR, America Research Center, LG Electronics JUNYAO GUO, America Research Center, LG Electronics JIAYI (JASON) LIU, America Research Center, LG Electronics SAMARTH TRIPATHI, America Research Center, LG Electronics UNMESH KURUP, America Research Center, LG Electronics MOHAK SHAH, America Research Center, LG Electronics The predominant paradigm for using machine learning models on a device is to train a model in the cloud and perform inference using the trained model on the device. However, with increasing number of smart devices and improved hardware, there is interest in performing model training on the device. Given this surge in interest, a comprehensive survey of the field from a device-agnostic perspective sets the stage for both understanding the state-of-the-art and for identifying open challenges and future avenues of research. However, on-device learning is an expansive field with connections to a large number of related topics in AI and machine learning (including online learning, model adaptation, one/few-shot learning, etc.). Hence, covering such a large number of topics in a single survey is impractical. This survey finds a middle ground by reformulating the problem of on-device learning as resource constrained learning where the resources are compute and memory. This reformulation allows tools, techniques, and algorithms from a wide variety of research areas to be compared equitably. In addition to summarizing the state-of-the-art, the survey also identifies a number of challenges and next steps for both the algorithmic and theoretical aspects ofon-device learning. ACM Reference Format: Sauptik Dhar, Junyao Guo, Jiayi (Jason) Liu, Samarth Tripathi, Unmesh Kurup, and Mohak Shah.
    [Show full text]
  • Algorithms and Data Structures for Strings, Points and Integers Or, Points About Strings and Strings About Points
    Downloaded from orbit.dtu.dk on: Sep 23, 2021 Algorithms and Data Structures for Strings, Points and Integers or, Points about Strings and Strings about Points Vind, Søren Juhl Publication date: 2015 Document Version Publisher's PDF, also known as Version of record Link back to DTU Orbit Citation (APA): Vind, S. J. (2015). Algorithms and Data Structures for Strings, Points and Integers: or, Points about Strings and Strings about Points. Technical University of Denmark. DTU Compute PHD-2015 No. 366 General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. Users may download and print one copy of any publication from the public portal for the purpose of private study or research. You may not further distribute the material or use it for any profit-making activity or commercial gain You may freely distribute the URL identifying the publication in the public portal If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. Algorithms and Data Structures for Strings, Points and Integers or, Points about Strings and Strings about Points Søren Vind Ph.D. Thesis PHD-2015-366 ISSN: 0909-3192 DTU Compute Department of Applied Mathematics and Computer Science Technical University of Denmark Richard Petersens Plads Building 324 2800 Kongens Lyngby, Denmark Phone +45 4525 3031 [email protected] www.compute.dtu.dk PHD-2015-366 ISSN: 0909-3192 Abstract This dissertation presents our research in the broad area of algorithms and data struc- tures.
    [Show full text]
  • ABSTRACT Adaptive Constraint Reduction for Convex Quadratic
    ABSTRACT Title of dissertation: Adaptive Constraint Reduction for Convex Quadratic Programming and Training Support Vector Machines Jin Hyuk Jung, Doctor of Philosophy, 2008 Dissertation directed by: Professor Dianne P. O'Leary Department of Computer Science Convex quadratic programming (CQP) is an optimization problem of minimiz- ing a convex quadratic objective function subject to linear constraints. We pro- pose an adaptive constraint reduction primal-dual interior-point algorithm for convex quadratic programming with many more constraints than variables. We reduce the computational effort by assembling the normal equation matrix with a subset of the constraints. Instead of the exact matrix, we compute an approximate matrix for a well chosen index set which includes indices of constraints that seem to be most crit- ical. Starting with a large portion of the constraints, our proposed scheme excludes more unnecessary constraints at later iterations. We provide proofs for the global convergence and the quadratic local convergence rate of an affine scaling variant. A similar approach can be applied to Mehrotra's predictor-corrector type algorithms. An example of CQP arises in training a linear support vector machine (SVM), which is a popular tool for pattern recognition. The difficulty in training a support vector machine (SVM) lies in the typically vast number of patterns used for the training process. In this work, we propose an adaptive constraint reduction primal- dual interior-point method for training the linear SVM with l1 hinge loss. We reduce the computational effort by assembling the normal equation matrix with a subset of well-chosen patterns. Starting with a large portion of the patterns, our proposed scheme excludes more and more unnecessary patterns as the iteration proceeds.
    [Show full text]
  • Contents U U U
    Contents u u u ACM Awards Reception and Banquet, June 2018 .................................................. 2 Introduction ......................................................................................................................... 3 A.M. Turing Award .............................................................................................................. 4 ACM Prize in Computing ................................................................................................. 5 ACM Charles P. “Chuck” Thacker Breakthrough in Computing Award ............. 6 ACM – AAAI Allen Newell Award .................................................................................. 7 Software System Award ................................................................................................... 8 Grace Murray Hopper Award ......................................................................................... 9 Paris Kanellakis Theory and Practice Award ...........................................................10 Karl V. Karlstrom Outstanding Educator Award .....................................................11 Eugene L. Lawler Award for Humanitarian Contributions within Computer Science and Informatics ..........................................................12 Distinguished Service Award .......................................................................................13 ACM Athena Lecturer Award ........................................................................................14 Outstanding Contribution
    [Show full text]
  • Novel Frameworks for Mining Heterogeneous and Dynamic
    Novel Frameworks for Mining Heterogeneous and Dynamic Networks A dissertation submitted to the Graduate School of the University of Cincinnati in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Department of Electrical and Computer Engineering and Computer Science of the College of Engineering by Chunsheng Fang B.E., Electrical Engineering & Information Science, June 2006 University of Science & Technology of China, Hefei, P.R.China Advisor and Committee Chair: Prof. Anca L. Ralescu November 3, 2011 Abstract Graphs serve as an important tool for discrete data representation. Recently, graph representations have made possible very powerful machine learning algorithms, such as manifold learning, kernel methods, semi-supervised learning. With the advent of large-scale real world networks, such as biological networks (disease network, drug target network, etc.), social networks (DBLP Co- authorship network, Facebook friendship, etc.), machine learning and data mining algorithms have found new application areas and have contributed to advance our understanding of proper- ties, and phenomena governing real world networks. When dealing with real world data represented as networks, two problems arise quite naturally: I) How to integrate and align the knowledge encoded in multiple and heterogeneous networks? For instance, how to find out the similar genes in co-disease and protein-protein inter- action networks? II) How to model and predict the evolution of a dynamic network? A real world exam- ple is, given N years snapshots of an evolving social network, how to build a model that can cap- ture the temporal evolution and make reliable prediction? In this dissertation, we present an innovative graph embedding framework, which identifies the key components of modeling the evolution in time of a dynamic graph.
    [Show full text]
  • Multidimensional and Spatial Structures
    IV Multidimensional and Spatial Structures 16 Multidimensional Spatial Data Structures Hanan Samet ......... 16-1 Introduction • Point Data • Bucketing Methods • Region Data • Rectangle Data • Line Data and Boundaries of Regions • Research Issues and Summary 17 Planar Straight Line Graphs Siu-Wing Cheng....................... 17-1 Introduction • Features of PSLGs • Operations on PSLGs • Winged-Edge • Halfedge • Quadedge • Further Remarks • Glossary 18 Interval, Segment, Range, and Priority Search Trees D. T. Lee .. 18-1 Introduction • Interval Trees • Segment Trees • Range Trees • Priority Search Trees 19 Quadtrees and Octrees Srinivas Aluru ............................... 19-1 Introduction • Quadtrees for Point Data • Spatial Queries with Region Quadtrees • Image Processing Applications • Scientific Computing Applications 20 Binary Space Partitioning Trees Bruce F. Naylor ................... 20-1 Introduction • BSP Trees as a Multi-Dimensional Search Structure • Visibility Or- derings • BSP Tree as a Hierarchy of Regions 21 R-trees Scott Leutenegger and Mario A. Lopez ........................ 21-1 Introduction • Basic Concepts • Improving Performance • Advanced Operations • Analytical Models 22 Managing Spatio-Temporal Data Sumeet Dua and S. S. Iyengar ... 22-1 Introduction and Background • Overlapping Linear Quadtree • 3D R-tree • 2+3 R- tree • HR-tree • MV3R-tree • Indexing Structures for Continuously Moving Objects 23 Kinetic Data Structures Leonidas Guibas ............................ 23-1 Introduction • Motion in Computational Geometry
    [Show full text]
  • A Complete Bibliography of Publications in Communications of the ACM : 2010–2019
    A Complete Bibliography of Publications in Communications of the ACM : 2010{2019 Nelson H. F. Beebe University of Utah Department of Mathematics, 110 LCB 155 S 1400 E RM 233 Salt Lake City, UT 84112-0090 USA Tel: +1 801 581 5254 FAX: +1 801 581 4148 E-mail: [email protected], [email protected], [email protected] (Internet) WWW URL: http://www.math.utah.edu/~beebe/ 11 December 2019 Version 1.130 Title word cross-reference [2146]. 2017 [2336, 2313]. 21st [2065, 2833, 2656, 1052, 2499, 141]. 3 [2677]. 30-year [2751]. 33 [343]. 3G [352]. #1 [667]. 50th [2359]. + [859, 2507]. $1 [1598, 1575]. 10 2 [166]. 3 [1290, 962, 2165, 1291, 2659, 2164,± 1339, 600km [2693]. 2381, 2572, 250, 2747, 2158]. = [859, 378]. b [614]. λ>4 [2041]. n [857]. n = me [1398]. = [377]. = [2507]. 6 Aadhaar [2995]. abbey [2716]. ABCs -bit [614]. -gram [857]. -Spectre [2728]. [2607]. abductive [67]. abilities [2670]. -sweep [2165]. Ability [2582]. Ability-based [2582]. Abolish [1680]. abound [738]. above 12 [337, 1421, 2056, 1824]. 14th [564]. [2633, 186]. abstract [642, 643]. Abstracting [2459, 642, 643]. Abstraction 2.0 [373, 473, 1306, 1650, 33, 501]. 2008 [661, 1020, 2153, 403]. Abstractions [382]. 2009 [12]. 2011 [626, 711]. 2016 1 2 [1060, 1541]. abstracts [1638]. abuse [104, 694, 207, 237]. adults [2332]. advance [552, 1123]. academia [2194, 992]. [1277, 2217]. advanced [1681]. Advances Academic [1098, 2435, 2437, 2071, 2644, [780]. Advancing [1840, 553]. advantage 2284, 2128, 2232, 1159, 2118, 2023, 170]. [2341]. Adventures [1156]. adversarial academic-unit [2023]. academics [1228]. [2604]. Advertising academies [3016].
    [Show full text]
  • Return of Organization Exempt from Income
    r OMB NO 1545-004 Return of Organization Exempt From Income Tax Form Under section 501(c), 527, or 4947(a)(1) of the Internal Revenue Code (except black lung 2004 990 benefit trust or private foundation) Department of the Treasury Open to Public Internal Revenue Service " The organization may have to use a copy of this return to satisfy state reporting requirements. Inspection A For the 2004 calendar year, or tax year beginning JAN 1 2004 and B Check .r C Name of organization D Employer identification number applicable please, use IRS ssociation for Computing Address label or change print or Machinery, Inc . 1J -171+1J Name type =change Number and street (or P.O. box if mail is not delivered to street address) Room/suite E Telephone number Initial See return Specific 1515 Broadway 17th Floor Final Instruc- ~return lions City or town, state or country, and ZIP + 4 F Accounting method U IC-171 $ Accrual aAmended return New York NY 10036 - 5701 Application pending 0 Section 501(c)(3) organizations and 4947(a)(1) nonexempt charitable trusts H and I are not applicable to section 527 organizations. must attach pleted Schedule A (Foror 990-EZ) . H(a) Is this a group return for affiliates? Yes No H(b) If "Yes ;" enter number of affdiates " J Organization type (cneckonly one)10- LXJ 501(c) ( 3 ) 1 cnsert no) L_j 4947(a)(1)orU 52 H(c) Are all affiliates included? N/A D Yes 0 No (If "No ;' attach a list.) K Check here 1[:j if the organization's gross receipts are normally not more than $25,000 .
    [Show full text]
  • Accountable Algorithms
    Accountable Algorithms Joshua Alexander Kroll ADissertation Presented to the Faculty of Princeton University in Candidacy for the Degree of Doctor of Philosophy Recommended for Acceptance by the Department of Computer Science Adviser: Professor Edward W. Felten September 2015 c Copyright by Joshua Alexander Kroll, 2015. All rights reserved. Abstract Important decisions about people are increasingly made by algorithms: Votes are counted; voter rolls are purged; financial aid decisions are made; taxpayers are chosen for audits; air travelers are selected for search; credit eligibility decisions are made. Citizens, and society as a whole, have an interest in making these processes more transparent. Yet the full basis for these decisions is rarely available to a↵ected people: the algorithm or some inputs may be secret; or the implementation may be secret; or the process may not be precisely described. A person who suspects the process went wrong has little recourse. And an oversight authority who wants to ensure that decisions are made according to an acceptable policy has little assurance that pro↵ered decision rules match decisions for actual users. Traditionally, Computer Science addresses these problems by demanding a spec- ification of the desired behavior, which can be enforced or verified. But this model is poorly suited to real-world oversight tasks, where specifications are complicated or might not be known in advance; laws are often ambiguous precisely because it would be politically (and practically) infeasible to give a precise description of their meaning. People do their best to approximate what they believe the law will allow and disputes about what is acceptable happen after-the-fact via expensive investiga- tion and adjudication (e.g., in a court or legislature).
    [Show full text]
  • Department Newsletter Spring 2013
    COMPUTER SCIENCE UNIVERSITY OF MARYLAND Department Newsletter Spring 2013 Chair’s Message This spring saw an impressive start with the overwhelming success of February’s CS Welcome to the spring 2013 edition of UMD’s undergraduate internship and career fair. For the Department of Computer Science newsletter. first time, the event was moved to the Samuel Our department turns 40 this year, continuing its Riggs Alumni Center with approximately 525 legacy as one of the oldest CS collegiate programs students and 72 companies in attendance. Also in in the country. I began my appointment as Chair February was the Department’s 23rd annual High on July 1, 2012 and would like to thank Prof. Larry School Programming Contest with 30 teams from Davis for his 12 years of dedicated service to the Maryland, Virginia and the D.C. metropolitan area. department as Chair. I have been a UMD faculty member for 21 years, Two prestigious speakers will arrive to UMD in and previously served as late April: Jennifer Chayes (Managing Director of the Associate Chair for Microsoft Research New England) and Maneesh Graduate Education for Agrawala (Professor at UC Berkeley). four years. In addition to the events above, this newsletter During this academic contains articles about The Corporate Partners year, the Department Program, led by Eric Chapman. The purpose of the had three teams partnership, which is joint with the Department participate in the Mid- and UMIACS, is to facilitate internship, career and Atlantic regional of research opportunities with our students and the ACM International faculty members. Collegiate Programming Samir Khuller Contest where they all I would like to thank our current partners for CS Department Chair ranked in the top 10 spots.
    [Show full text]
  • Most Prolific DBLP Authors
    Most Prolific DBLP Authors http://www.informatik.uni-trier.de/~ley/db/indices/a-tree/prolific/index... Most Prolific DBLP Authors number of publications / names 484 Philip S. Yu 428 Chin-Chen Chang 421 Elisa Bertino 415 Edwin R. Hancock 412 Sudhakar M. Reddy 410 Grzegorz Rozenberg 393 Alberto L. Sangiovanni-Vincentelli 390 Thomas S. Huang 378 Micha Sharir - Kang G. Shin 375 Wei Wang 373 Mahmut T. Kandemir 349 Wen Gao 345 Irith Pomeranz 341 Hector Garcia-Molina 339 Moshe Y. Vardi 336 Joseph Y. Halpern 329 Noga Alon 322 Anil K. Jain 321 Sushil Jajodia - Ming Li - Wei Li 318 Sajal K. Das 317 Jiawei Han 316 Kaushik Roy - Donald F. Towsley 312 Hans-Peter Seidel 311 Jack Dongarra 302 Josef Kittler 297 Azriel Rosenfeld 296 Christos H. Papadimitriou 293 HongJiang Zhang 286 Mario Piattini - Moti Yung 278 Francky Catthoor 275 Witold Pedrycz 274 Leonidas J. Guibas 273 Kurt Mehlhorn 272 Stephan Olariu 1/26 2008/4/14 上午 11:38 Most Prolific DBLP Authors http://www.informatik.uni-trier.de/~ley/db/indices/a-tree/prolific/index... 268 Christoph Meinel - Ugo Montanari 266 Horst Bunke - Niraj K. Jha - Massoud Pedram 263 Divyakant Agrawal - Michel Raynal - Jie Wu 262 Tharam S. Dillon 261 Hsinchun Chen - John Mylopoulos - Viktor K. Prasanna 260 Oscar H. Ibarra 257 Andrew B. Kahng 255 Hans-Peter Kriegel - Paul G. Spirakis 254 David Eppstein - Martin D. F. Wong 252 Henri Prade 251 Luca Benini - Makoto Takizawa 250 Alok N. Choudhary - Hartmut Ehrig 248 Mary Jane Irwin - Gerhard Weikum 247 Oded Goldreich 245 Gheorghe Paun - David Peleg 243 Erik D.
    [Show full text]