TIDES – Building a Trusted Integration Data Exchange System

Government agencies, healthcare organizations, and research institutions often need to combine information from different databases to solve important problems like tracking disease outbreaks, improving public services, or conducting medical research. However, these organizations currently cannot share their data because it contains sensitive personal information protected by privacy laws and regulations. Read more

By Zachary Ives, ago

Cryptographic Security at Scale

Cryptography is a cornerstone of modern computer security and is ubiquitous on the computer systems we depend on daily. As an academic discipline, after several decades of scientific development, we have a good understanding of how to formalize security models, design cryptographic systems that are secure, and prove the security Read more

By Zack Ives, ago

Network Provenance

Operators of distributed systems often find themselves needing to answer a diagnostic or forensic question. Some part of the system is found to be in an unexpected state; for example, a suspicious routing table entry is discovered, or a proxy cache is found to contain an unusually large number of Read more

By Zack Ives, ago