dawn song
play

Dawn Song dawnsong@cs.berkeley.edu 1 Project Poster session Well - PDF document

Privacy in Wireless/Ubiquitous Computing Dawn Song dawnsong@cs.berkeley.edu 1 Project Poster session Well provide easels You need to get the poster board Campus store or office supply stores usually have it Print your


  1. Privacy in Wireless/Ubiquitous Computing Dawn Song dawnsong@cs.berkeley.edu 1 Project • Poster session – We’ll provide easels – You need to get the poster board » Campus store or office supply stores usually have it – Print your slides • Slides – Problem motivation & definition – Approach – Design & implementation – Evaluation: if something didn’t work as expected, explain why – Comparison with related work • Hand-in (in addition to project report) – Tarball » Including all source files » Code, paper, presentation subdirectories » Code: including make files, readme, src dir, eval dir (with test scripts & test samples) – Email » If too big, CD/DVD 2 – Same due time Guest Lectures • Jens: economics/psychology/HCI with privacy • Seth: EFF – privacy-related courtcases/experiences 3

  2. Ubiquitous Computing • What wireless devices are you carrying? • What information about you do you think are being recorded about your daily life? 4 This Class: Experiment--- Star paper summary in class • Privacy in wireless/ubiquitous computing: challenges & directions • I’ve taught a lot, this class is about learning the discovery process yourself • Three people a group • Discuss questions & report your findings/thoughts/best answers you can come up with – Be free to think! 5 Questions #1 • What are your dream applications in ubiquitous computing? – Assuming tomorrow’s technology can achieve anything :) • What information do you need to collect to enable your dream applications? 6

  3. Question #2 • You’d like to spy on Joe, to learn as much as possible about him and his daily life, and in a stealthy way. How would you do it? What technologies are enabling factors? 7 Question #3 • If you were Joe, how do you plan to protect your own privacy? 8 Question #4 • If you were Joe, how would you protect your own privacy and enable your dream ubiquitous computing applications at the same time? What are the challenges? Any ideas about addressing them? 9

  4. Summary • Privacy in wireless/ubiquitous computing – Challenging – Tension with functionality – Lots of open questions 10

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend