Saturday, February 16, 2013
Room 312 (Hynes Convention Center)
Talk Description:
As we continue to deploy increasingly powerful computing and communication devices in aid of daily life, our ability to determine among which devices what kinds of information and control can be shared will become central to stability, safety and privacy of this distributed system. This talk will explore options for creating stronger regimes for authentication, preservation of anonymity (or pseudonymity) and protection of privacy. Ephemeral access to sensitive information will be an important theme as will the need for audit practices and legal regimes intended to inhibit abuses.