Secure Computation in Heterogeneous Environments: How to Bring Multiparty Computation Closer to Practice?

Total Page:16

File Type:pdf, Size:1020Kb

Secure Computation in Heterogeneous Environments: How to Bring Multiparty Computation Closer to Practice? Secure Computation in Heterogeneous Environments: How to Bring Multiparty Computation Closer to Practice? Mariana Raykova Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Graduate School of Arts and Sciences COLUMBIA UNIVERSITY 2012 c 2012 Mariana Raykova All Rights Reserved ABSTRACT Secure Computation in Heterogeneous Environments: How to Bring Multiparty Computation Closer to Practice? Mariana Raykova Many services that people use daily require computation that depends on the private data of multiple parties. While the utility of the final result of such interactions outweighs the privacy concerns related to output release, the inputs for such computations are much more sensitive and need to be protected. Secure multiparty computation (MPC) considers the question of constructing computation protocols that reveal nothing more about their inputs than what is inherently leaked by the output. There have been strong theoretical results that demonstrate that every functionality can be computed securely. However, these protocols remain unused in practical solutions since they introduce efficiency overhead prohibitive for most applications. Generic multiparty computation techniques address homogeneous setups with respect to the resources available to the participants and the adversarial model. On the other hand, realistic scenarios present a wide diversity of heterogeneous environments where different participants have different available resources and different incentives to misbehave and collude. In this thesis we introduce techniques for multiparty computation that focus on heterogeneous settings. We present solutions tailored to address different types of asymmetric constraints and improve the efficiency of existing approaches in these scenarios. We tackle the question from three main directions: • New Computational Models for MPC { We explore different computational models that enable us to overcome inherent inefficiencies of generic MPC solutions using circuit representation for the evaluated functionality. First, we show how we can use random access machines to construct MPC protocols that add only polylogarithmic overhead to the running time of the insecure version of the underlying functionality. This allows to achieve MPC constructions with computational complexity sublinear in the size for their inputs, which is very important for computations that use large databases. We also consider multivariate polynomials which yield more succinct representations for the functionalities they implement than circuits, and at the same time a large collection of prob- lems are naturally and efficiently expressed as multivariate polynomials. We construct an MPC protocol for multivariate polynomials, which improves the communication complex- ity of corresponding circuit solutions, and provides currently the most efficient solution for multiparty set intersection in the fully malicious case. • Outsourcing Computation { The goal in this setting is to utilize the resources of a single powerful service provider for the work that computationally weak clients need to perform on their data. We present a new paradigm for constructing verifiable computation (VC) schemes, which enables a computationally limited client to verify efficiently the result of a large computation. Our construction is based on attribute-based encryption and avoids expensive primitives such as fully homomorphic encryption and probabilistically checkable proofs underlying existing VC schemes. Additionally our solution enjoys two new useful properties: public delegation and verification. We further introduce the model of server-aided computation where we utilize the computa- tional power of an outsourcing party to assist the execution and improve the efficiency of MPC protocols. For this purpose we define a new adversarial model of non-collusion, which provides room for more efficient constructions that rely almost completely only on symmetric key operations, and at the same time captures realistic settings for adversarial behavior. In this model we propose protocols for generic secure computation that offload the work of most of the parties to the computation server. We also construct a specialized server-aided two party set intersection protocol that achieves better efficiencies for the two participants than existing solutions. Outsourcing in many cases concerns only data storage and while outsourcing the data of a single party is useful, providing a way for data sharing among different clients of the service is the more interesting and useful setup. However, this scenario brings new challenges for access control since the access control rules and data accesses become private data for the clients with respect to the service provide. We propose an approach that offers trade-offs between the privacy provided for the clients and the communication overhead incurred for each data access. • Efficient Private Search in Practice { We consider the question of private search from a different perspective compared to traditional settings for MPC. We start with strict efficiency requirements motivated by speeds of available hardware and what is considered acceptable overhead from practical point of view. Then we adopt relaxed definitions of privacy, which still provide meaningful security guarantees while allowing us to meet the efficiency requirements. In this setting we design a security architecture and implement a system for data sharing based on encrypted search, which achieves only 30% overhead compared to non-secure solutions on realistic workloads. Table of Contents 1 Introduction 1 1.1 Contributions . .6 1.1.1 New Models for Secure Computation . .6 1.1.2 Outsourcing Computation . .8 1.1.3 Efficient Private Search in Practice . 10 2 Related Work 12 2.0.4 Secure Multiparty Computation . 12 2.0.5 Delegation of Computation . 15 2.0.6 Secure Search . 16 2.0.7 Oblivious Random Access Memory (ORAM) . 18 I New Computational Models 20 3 Secure Computation with Sublinear Amortized Work 21 3.1 Motivation and Contributions . 21 3.2 Solution Overview . 22 3.3 Preliminaries . 24 3.3.1 Random Access Machines . 24 3.3.2 Oblivious RAM . 25 3.3.3 Secure Computation . 27 3.4 Generic Construction . 29 3.4.1 Proof of Security . 32 i 3.5 An Optimized Protocol . 34 3.5.1 Technical Overview . 35 3.5.2 Building Blocks . 37 3.5.3 Our Construction . 46 3.5.4 Discussion: Bucket Size . 50 3.6 Security Proof . 51 3.7 Performance . 60 4 Secure Multiparty Computation for Multivariate Polynomials 61 4.1 Motivation and Contributions . 61 4.1.1 Our Contributions . 62 4.2 Solution Overview . 66 4.3 Definitions and Techniques . 68 4.3.1 Definitions . 68 4.3.2 Techniques . 69 4.4 Building Block Protocols . 71 4.4.1 Multiparty Homomorphic Encryption Proof of Knowledge and Plaintext Ver- ification (HEPKPV) . 72 4.4.2 Multiparty Coin Tossing . 73 4.4.3 Input Preprocessing and Verification . 75 4.5 Main Protocol . 77 4.5.1 Security analysis . 79 4.6 Communication and Computation Complexity . 88 4.7 Multiparty Set Intersection and Other Applications . 89 4.7.1 Optimizations . 89 4.7.2 Multiparty Set Intersection as Polynomial Evaluation . 90 II Outsourced Computation 92 5 How to Delegate and Verify in Public: Verifiable Computation from Attribute- based Encryption 93 ii 5.1 Motivation and Contributions . 93 5.1.1 Our Contributions . 96 5.2 Definitions . 99 5.2.1 Public Verifiable Computation . 99 5.2.2 Key-Policy Attribute-Based Encryption . 103 5.2.3 Multi-Function Verifiable Computation . 105 5.3 Verifiable Computation from Attribute-Based Encryption . 108 5.3.1 Main Construction . 109 5.3.2 Instantiations . 113 5.4 Multi-Function Verifiable Computation from KP-ABE With Outsourcing . 116 6 Outsourcing Multi-Party Computation with Non-Colluding Adversaries 120 6.1 Motivation and Contributions . 120 6.1.1 Our Contributions . 121 6.2 Overview of Protocols . 124 6.3 Preliminaries and Standard Definitions . 127 6.4 Non-Collusion in Multi-Party Computation . 129 6.4.1 Formalizing Non-Collusion With Respect to Semi-Honest Adversaries . 131 6.4.2 Formalizing Non-Collusion With Respect to Deviating Adversaries . 134 6.5 An Efficient Protocol for Non-Colluding Semi-Honest Parties . 139 6.6 Protecting Against Deviating Circuit Garblers . 145 6.6.1 What goes wrong in the server-aided setting? . 147 6.6.2 Extending to Multiple Parties . 157 6.7 Server-Aided Computation From Delegated Computation . 158 6.8 Server-Aided Private Set Intersection . 163 6.9 Efficiency in the Server-Aided Setting . 168 6.9.1 Evaluating the Efficiency Gain . 168 6.9.2 Comparison with Secure Delegated Computation . 170 6.9.3 Why Non-Collusion Helps . 171 iii 7 Privacy Enhanced Access Control for Outsourced Data Sharing 172 7.1 Motivation and Contributions . 172 7.1.1 Contributions . 175 7.2 Two-level Access Control Model { Solution Overview . 176 7.3 Access Control Model . 178 7.4 Read Access Control . 180 7.4.1 Techniques . 181 7.4.2 Read Access Control . 184 7.5 Write Access Control . 187 7.5.1 Techniques . 188 7.5.2 Integrated Read and Write Access Control . 189 7.6 Analysis . 192 7.6.1 Security Guarantees . 192 7.6.2 Performance Analysis . 194 7.6.3 Discussion . ..
Recommended publications
  • Parks, Recreation and Open Space Plan
    CITY OF KENMORE PARKS, RECREATION AND OPEN SPACE PLAN February 24, 2020 Resolution 20-334 VIA EMAIL March 9, 2020 Lauri Anderson Principal Planner City of Kenmore Re: RCO grant program planning eligibility Dear Ms. Anderson: Thank you for submitting the City of Kenmore 2020 Parks, Recreation & Open Space Plan to the Recreation and Conservation Office (RCO). I am pleased to inform you that the Plan meets the planning requirements as specified in Manual 2, Planning Policies and Guidelines. This includes grant program planning eligibility in the following categories: • Land and Water Conservation Fund • Washington Wildlife and Recreation Program: Habitat conservation and recreation grants • Boating Facilities Program • Nonhighway and Off-Road Vehicle Activities Program: Trails Planning eligibility is granted for six years and will expire February 24, 2026. Please note that to retain grant eligibility in future years, RCO must be notified of any major amendments as they occur. An incorrect or incomplete plan may impact your project’s evaluation. Please let me know if you have any further planning questions, [email protected]. Your point of contact for grant applications is [email protected]. Sincerely, Katie Knight Pruit Planning Specialist Table of Contents CHAPTER 1 INTRODUCTION 1 Planning Context 2 Planning Process 8 CHAPTER 2 EXISTING INVENTORY 12 Park Classification & Service Area 15 Park & Recreation Programming 23 Natural Resources 25 CHAPTER 3 VISION, GOALS & POLICY SUPPORT 26 Guiding Fundamentals 27 Vision & Goals 30 Objectives
    [Show full text]
  • Ostracism-Induced Physical Pain Sensitization in Real-Life Relationships
    Ostracism and Pain Sensitivity 1 Do You Really Want to Hurt Me? Ostracism-Induced Physical Pain Sensitization in Real-Life Relationships Annelise K. Dickinson Haverford College, Haverford, Pennsylvania Ostracism and Pain Sensitivity 2 Abstract In humans, social and physical pain are believed to arise from common neural networks, an evolutionarily advantageous system for motivating prosocial behavior. As such, the hypothesis that social insult can sensitize physical pain perception was investigated in the context of real- life relationships. The social value ascribed to the source of virtual ostracism, the closeness of the relationship, and individual personality characteristics were expected to modulate the impact of social rejection upon physical pain reports. Romantic partners, friends, and strangers were all led to believe that their partners were excluding them from an online ball-tossing game, and pain sensitivity changes from baseline were assessed following this manipulation. Results indicated that ostracism by a relationship partner leads to an increase in cold pain tolerance, that romantic partners report more cold pain unpleasantness than friends following social rejection, and that trait sensitivity to social insult predicts physical pain sensitivity in general. The findings suggest that within the context of real-life relationships, the social rejection as an agent of influence upon pain behavior may not operate as cleanly as previously believed, and that further research in this area is definitely warranted. Results are interpreted with respect to several theories of social and physical pain behaviors, and suggestions for future studies are highlighted. Ostracism and Pain Sensitivity 3 Introduction Pain What is Pain? The mind is responsible for keeping itself and the body safe from harm.
    [Show full text]
  • 38 Toward Engineering a Secure Android Ecosystem: a Survey of Existing Techniques
    Toward Engineering a Secure Android Ecosystem: A Survey of Existing Techniques MENG XU, CHENGYU SONG, YANG JI, MING-WEI SHIH, KANGJIE LU, CONG ZHENG, RUIAN DUAN, YEONGJIN JANG, BYOUNGYOUNG LEE, CHENXIONG QIAN, SANGHO LEE, and TAESOO KIM, Georgia Institute of Technology The openness and extensibility of Android have made it a popular platform for mobile devices and a strong candidate to drive the Internet-of-Things. Unfortunately, these properties also leave Android vulnerable, attracting attacks for profit or fun. To mitigate these threats, numerous issue-specific solutions have been proposed. With the increasing number and complexity of security problems and solutions, we believe this is the right moment to step back and systematically re-evaluate the Android security architecture and security practices in the ecosystem. We organize the most recent security research on the Android platform into two categories: the software stack and the ecosystem. For each category, we provide a comprehensive narrative of the problem space, highlight the limitations of the proposed solutions, and identify open problems for future research. Based on our collection of knowledge, we envision a blueprint for engineering a secure, next-generationr Android ecosystem. CCS Concepts: Security and privacy → Mobile platform security; Malware and its mitigation;Social aspects of security and privacy Additional Key Words and Phrases: Android, mobile malware, survey, ecosystem ACM Reference Format: Meng Xu, Chengyu Song, Yang Ji, Ming-Wei Shih, Kangjie Lu, Cong Zheng, Ruian Duan, Yeongjin Jang, Byoungyoung Lee, Chenxiong Qian, Sangho Lee, and Taesoo Kim. 2016. Toward engineering a secure android ecosystem: A survey of existing techniques. ACM Comput.
    [Show full text]
  • Generation Mixtape: a User's Guide to Online Copyright Matthew .D Catania
    digitalcommons.nyls.edu Academic Centers and Programs Tribeca Square Press 2011 Generation Mixtape: A User's Guide to Online Copyright Matthew .D Catania Gaetano D. Marretta Follow this and additional works at: http://digitalcommons.nyls.edu/tribeca_square_press Part of the Intellectual Property Law Commons Recommended Citation Catania, Matthew D. and Marretta, Gaetano D., "Generation Mixtape: A User's Guide to Online Copyright" (2011). Tribeca Square Press. 5. http://digitalcommons.nyls.edu/tribeca_square_press/5 This Book is brought to you for free and open access by the Academic Centers and Programs at DigitalCommons@NYLS. It has been accepted for inclusion in Tribeca Square Press by an authorized administrator of DigitalCommons@NYLS. L EGAL BAC KG ROUND E R NO. 2 GENERATION MIXTAPE A User's Guide to Online Copyright Matthew D. Catania Gaetano G. Marretta P R OGRAM IN LAW & JOURNALISM AT NEW YORK LAW SCHOOL A TR!BECA SQUARE PRESS MONOGRAPH ABOUT LEGAL BACKGROUNDERS In conjunction with the Program in Law and Journalism at New York Law School, Tribeca Square Press publishes a monograph series, Legal Backgrounders, to provide those who regularly report on law and the legal profession, including print and broadcast reporters, edi­ LEGAL BACKGROUNDER NO. 2 torial writers, bloggers, and editors, with concise, objective, timely, and readable information on legal topics currently in the news. Mono­ graphs in this series are not intended to advocate legal or policy posi­ tions but to describe and summarize the state of the law. An electronic GENERATION version of each Legal Backgrounder, including links to sources, will be available on the Tribeca Square Press website shortly after publica­ tion of the print edition.
    [Show full text]
  • Returning to Autoethnography As a Doctoral Nomad Karyn Mcelroy National Louis University
    National Louis University Digital Commons@NLU Dissertations 9-2016 Vagabond: Returning To Autoethnography As A Doctoral Nomad Karyn McElroy National Louis University Follow this and additional works at: https://digitalcommons.nl.edu/diss Part of the Curriculum and Social Inquiry Commons Recommended Citation McElroy, Karyn, "Vagabond: Returning To Autoethnography As A Doctoral Nomad" (2016). Dissertations. 184. https://digitalcommons.nl.edu/diss/184 This Dissertation - Public Access is brought to you for free and open access by Digital Commons@NLU. It has been accepted for inclusion in Dissertations by an authorized administrator of Digital Commons@NLU. For more information, please contact [email protected]. VAGABOND: RETURNING TO AUTOETHNOGRAPHY AS A DOCTORAL NOMAD Karyn McElroy Curriculum and Social Inquiry/Curriculum Advocacy and Policy Submitted in partial fulfillment of the requirements of Doctor of Education National College of Education National Louis University August 2016 (signature page) Copyright by Karyn McElroy, 2016 All rights reserved Abstract Vagabond: Returning to Autoethnography as a Doctoral Nomad is a journey into what is described as a purposeful and rhizomatic inquiry of spaces and places in knowing. It prompts questioning within the author such as, “What has this doctoral journey come to mean, and where do I go now as I step outside the roots which have planted in me this need to wander? How do I navigate this struggle?” The work is a coming-to-terms piece. It is a hopeful wandering and documented artifact capturing an organic process of unlearning, relearning, and examining locations of being, while recognizing the emergent need to embrace fracture, fiction, and multiple conflicting positions.
    [Show full text]
  • Mixtape Djs, the Piracy Paradox, and Lessons for the Recording Industry
    Pace University DigitalCommons@Pace Pace Law Faculty Publications School of Law 2009 "Criminal Minded?": Mixtape DJs, The Piracy Paradox, and Lessons for the Recording Industry Horace E. Anderson Elisabeth Haub School of Law at Pace University Follow this and additional works at: https://digitalcommons.pace.edu/lawfaculty Part of the Intellectual Property Law Commons Recommended Citation Horace E. Anderson, "Criminal Minded?": Mixtape DJs, The Piracy Paradox, and Lessons for the Recording Industry, 76 Tenn. L. Rev. 111 (2009), http://digitalcommons.pace.edu/lawfaculty/484/. This Article is brought to you for free and open access by the School of Law at DigitalCommons@Pace. It has been accepted for inclusion in Pace Law Faculty Publications by an authorized administrator of DigitalCommons@Pace. For more information, please contact [email protected]. "CRIMINAL MINDED?":' MIXTAPE DJS, THE PIRACY PARADOX, AND LESSONS FOR THE RECORDING INDUSTRY HORACE E. ANDERSON, JR.* ' 2 "There's nothing that sells music like music. - 50 Cent "Just because you can do something, doesn't mean you should do it."3 - Folk wisdom For at least the past three years, leading American fashion designers have lobbied for passage of copyright-like protection for the design aspects of their apparel creations.4 For at least as long, the recorded-music industry has been engaged in an aggressive campaign to enforce its copyrights in recorded music against a number of technology-enabled, culturally ,,sympathetic alleged,,5 infringers, including "twelve year-olds" and grandmothers. Although the record labels already have protection under the copyright law while the fashion houses seek it, both groups have at least 1.
    [Show full text]
  • The Artist: Capturing the Perfect Image Volume 4 | Issue 8 on Page 15
    ® CREATIVELY AND INDEPENDENTLY PRODUCED BY THE RESIDENTS OF LAKE NONA AUGUST 2019 The Artist: Capturing The Perfect Image Volume 4 | Issue 8 On page 15 MAKING A HOUSE A HOME FABULOUS, FREEING 50! MORE THAN SPANDEX AND SPOKES KIDS PLAY. COACHES COACH. IN THIS ISSUE 16 E8 E11 PARENTS CHEER. E12 LOCAL LEADERS, 4 BUSINESS & REAL ESTATE, 8 FEATURES, 14 HEALTH & WELLNESS, 18 EDUCATION, 22 FOOD & DRINKS E2 LAKE NONA LIVING E4 LIFESTYLE E8 SPORTS & FITNESS E10 ARTS & CULTURE E16 Orlando, FL 32827 FL Orlando, 6555 Sanger Rd Sanger 6555 Nonahood News LLC News Nonahood EDITOR'S NOTE ® CREATIVELY AND INDEPENDENTLY PRODUCED Home, Sweet Home BY THE RESIDENTS OF LAKE NONA BY ELAINE VAIL Publishers/Owners Rhys & Jenny Lynn This month marks four years since Editor-in-Chief & Operations Manager we packed up our home in Indiana Elaine Vail and left everyone and everything Director of Content we’d known as a family for more Nicole LaBosco than 20 years. It was exciting and Production Manager scary all at once. I couldn’t wait for Kyle Hamm my Midwestern daughters to see Writers & Reporters palm trees and experience the roar Nir Bashan, Linda Carvin, Christian Casale, Chris of waves hitting the beach, both for Clark, Dennis Delehanty, Natalia Foote, Sharon the first time. The only stop of many Fuentes, Rodney Gage, Dr. Deborah C. German, that I remember during my years as Kyle Hamm, Amber Harmon, Katie Jasiewicz, a young Navy brat is Norfolk, Vir- Great Smoky Mountains National Park, Gatlinburg, TN, Nicole LaBosco, Philip Long, Don Long, Debra ginia, and I was anxious for my girls Photo Credit Elaine Vail Lowe, Ishu Martinez, Dr.
    [Show full text]
  • Mixtape Chronicles: an Ethnographic Investigation Into Hip-Hop and African American Culture Concerning Systemic Racism and Oppression
    Mixtape Chronicles: An Ethnographic Investigation into Hip-Hop and African American Culture Concerning Systemic Racism and Oppression by Kourtney Moore, M.A. A Dissertation In Technical Communication and Rhetoric Submitted to the Graduate Faculty of Texas Tech University in Partial Fulfillment of the Requirements for the Degree of DOCTOR OF PHILOSOPHY Approved Dr. Michael Faris Chair of Committee Dr. Kendall Gerdes Dr. Michael Borshuk Mark Sheridan Dean of the Graduate School August, 2020 Copyright 2020, Kourtney Moore Texas Tech University, Kourtney Moore, August 2020 ACKNOWLEDGMENTS This project would not be possible without the guidance and support of my dissertation committee members: Dr. Michael Faris, Dr. Kendall Gerdes (aka Dr. G), and Dr. Michael Borshuk. I especially want to thank my chair, Dr. Michael Faris, for his continuous leadership and encouragement throughout this entire process including the pre-proposal, qualifying exams and full proposal. Through the madness of my crazy schedule, anytime I emailed him, he was always willing to set up a meeting to chat. He was also very timely, direct, and detailed with his feedback on drafts. He challenged me to always think critically, analyze the language I used, and most importantly, encouraged me to keep pushing. Dr. Kendall Gerdes, always offered her help and on numerous occasions, she sent me articles and websites that assisted me with the development of my dissertation. She helped me brainstorm early on in the process and provided insightful suggestions about the methods of this study. Dr. G believed in my research topic and my abilities to execute a rhetorically driven dissertation. I appreciate Dr.
    [Show full text]
  • Civil War Songs by Southern Women. (2007) Directed by Dr
    COOKE, MARY LEE, D.M.A. Southern Women, Southern Voices: Civil War Songs by Southern Women. (2007) Directed by Dr. Nancy Walker. 221 pp. This document considers the lives and works of thirty women living in the Confederate States during the American Civil War. The works they produced are songs published as sheet music in the South during and shortly after that conflict. Some wrote lyrics, some music, some both, and one arranged the lyrics and music of her husband for the piano. These works reflect the women’s feelings regarding the conflict, their perceptions of women’s roles in relation to it, their definitions of the South as their country, and their identities as Southerners. The material is organized in six chapters and arranged topically and in more or less chronological order. After the introductory Foreword of Chapter One, Chapter Two deals with the initial burst of patriotism expressed in the songs produced early in the war. These songs define the South as a country and invoke the blessings of Deity. The songs discussed in Chapter Three, also produced early in the war, extol the new flag and early victories. The songs in Chapter Four reflect the onset of war’s harsh realities that plagued Southerners by the middle of the war: separation anxiety, loneliness, death, and deprivations. The songs of Chapter Five are calls for peace and post-war tributes to the dead. An Afterword concludes the document in Chapter Six. One concludes from the study of these women’s lives and works that they harbored strong feelings about the war and that the writing and publishing of poetry and music was seen as an acceptable means of expressing those feelings.
    [Show full text]
  • May the Songs I Have Written Speak for Me: an Exploration of the Potential of Music in Juvenile Justice
    Commissioned by Weill Music Institute, Carnegie Hall MAY THE SONGS I HAVE WRITTEN SPEAK for ME An Exploration of the Potential of Music in Juvenile Justice LEA WOLF, MSW & DENNIE WOLF, ED.D © 2012 WolfBrown CONTENTS Acknowledgements 3 Executive Summary: Music As A Partner In Juvenile Justice 5 Introduction: Juvenile Justice, Music, and Impact 8 The Juvenile Justice System: Punishment or Rehabilitation? 12 The History of Juvenile Justice: How Did We Get Here? 12 The Current System: The Process, The Population, and the Consequences 17 Punishment and Rehabilitation Revisited: Where Is the Path to Reform? 22 A Current Experiment: New York City 27 What Changes Are Occurring at the State Level? 27 What Changes Are Occurring at the City Level? 29 What Do We Know About Adolescents? 34 How is Our Understanding of Adolescence Changing? 34 The Brain Science of Adolescence 34 Who Gets to Be an Adolescent? 37 What Can the Arts Offer to the Justice System? 41 Why Do the Arts Matter in Correctional Settings? 41 Building a Conceptual Framework 43 The Consequences for Adult Inmates 44 The Consequences for Youth 45 What Does Music Offer the Justice System? 48 Why Does Music Matter? 48 Why Does Music Matter to Adolescents? 50 Can Music Make a Difference? 52 What Do We Know? Effective Arts Programs for Correctional Settings 56 What Are the Design Principles for Effective Programs? 56 What Are the Design Principals for Working with Artist-Leaders? 61 What Are Design Principles for Evaluation? 64 Making a Contribution in an Evolving Juvenile Justice System 68 Carnegie Hall’s Musical Connections Projects in Juvenile Justice 68 Designing for 360-Degree Impact 70 Creating Mutuality 71 Facing the Dilemma of Sparking vs.
    [Show full text]
  • Copyright and the World's Most Popular Song
    GW Law Faculty Publications & Other Works Faculty Scholarship 2010 Copyright and the World's Most Popular Song Robert Brauneis The George Washington University Law School, [email protected] Follow this and additional works at: https://scholarship.law.gwu.edu/faculty_publications Part of the Law Commons Recommended Citation Brauneis, Robert, "Copyright and the World's Most Popular Song" (2010). GW Law Faculty Publications & Other Works. 260. https://scholarship.law.gwu.edu/faculty_publications/260 This Article is brought to you for free and open access by the Faculty Scholarship at Scholarly Commons. It has been accepted for inclusion in GW Law Faculty Publications & Other Works by an authorized administrator of Scholarly Commons. For more information, please contact [email protected]. Copyright and the World’s Most Popular Song Table of Contents Introduction……………………….. ....................................................................................1 I. “Good Morning to All”: An Appreciative History ..............................................4 II. The Emergence and Triumph of “Happy Birthday to You” .............................15 III. The Copyright Status of “Happy Birthday to You” ..........................................22 A. Some Necessary Analytical Framework .................................................23 1. Derivative Works .................................................................23 2. Copyright Under the 1909 Act ..............................................24 B. The Original Term: The 1935 Publications ............................................25
    [Show full text]
  • 25 Hip-Hop Albums by Bomb Womxn of 2018
    ! Entertainment National Sports Events Movies & TV Nick Rice 25 Hip-Hop Albums By Bomb Womxn Of 2018 December 14, 2018 - 4:50 pm by VIBE These ladies showcased a creative edge in hip-hop and rap not seen by their male peers. The female voice in hip-hop has always been present whether we've noticed it or not. The late Sylvia Robinson birthed the hip-hop music industry with the formation of Sugar Hill Records (and fostering "Rapper's Delight"), Roxanne Shante's 55 lyrical responses to fellow rappers were the first diss tracks and Missy Elliott's bold and striking music and visuals inspired men and women in the game to step outside of their comfort zones. These pillars and many more have allowed the next generation of emcees to be unapologetically brash, truthful and confident in their music. Cardi B's Invasion of Privacy and Nicki Minaj's Queen might've been the most mainstream albums by womxn in rap this year, but there was a long list of creatives who brought the noise like Rico Nasty, Tierra Whack, Noname and Bbymutha. Blame laziness or the heavy onslaught of music hitting streaming sites this year, but many of the artists on this list have hibernated under the radar for far too long. VIBE decided to switch things up but also highlighting rap albums by womxn who came strong in their respectively debut albums, mixtapes, EPs. We also had to give props to those who dropped standout singles, leaving us wanting more. READ MORE: 15 R&B Songs We Obsessed Over Most In 2018 Apple Music 1 / 26 Noname, 'Room 25' There’s an existential rebirth that occurs after heartache.
    [Show full text]