Computer Security in the Real World
Computer
Communications of the ACM - Organic user interfaces
Policy auditing over incomplete logs: theory, implementation and applications
Proceedings of the 18th ACM conference on Computer and communications security
Regret Minimizing Audits: A Learning-Theoretic Basis for Privacy Protection
CSF '11 Proceedings of the 2011 IEEE 24th Computer Security Foundations Symposium
Hi-index | 0.00 |
We take the position that audit mechanisms are essential for privacy protection in healthcare environments. Although audits are used in practice and commercial tools that provide assistance for audits are emerging, we currently lack rigorous models and definitions of properties that can guide the design of appropriate audit mechanisms. We report on our recent result that presents a principled learning-theoretic approach to audits with the goal of stimulating discussion and additional research on this problem.