{"563551":{"#nid":"563551","#data":{"type":"event","title":"Cybersecurity Lecture Series - Sept. 30","body":[{"value":"\u003Ch4\u003EMeet academic and industry leaders for intimate discussions about new cyber threats, trends and technologies.\u003Cem\u003E \u003Cbr \/\u003E\u003C\/em\u003E\u003C\/h4\u003E\u003Cp\u003EThe weekly \u003Cstrong\u003ECybersecurity Lecture Series\u003C\/strong\u003E is a free, open-to-the-public lecture from a thought leader who is advancing the field of information security and privacy. Invited speakers include executives and researchers from private companies, government agencies, start-up incubators as well as Georgia Tech faculty and students presenting their research.\u003C\/p\u003E\u003Cp\u003EHeld \u003Cstrong\u003Eweekly each Friday at Noon\u003C\/strong\u003E \u003Cstrong\u003Ethrough Dec. 2\u003C\/strong\u003E, lectures are open to all -- students, faculty, industry, government, or simply the curious. Students may register for credit under seminar course CS-8001-INF.\u003C\/p\u003E\u003Cp\u003E\u003Cem\u003E\u003Ca href=\u0022http:\/\/www.iisp.gatech.edu\/register-cybersecurity-lecture-series-sept-30\u0022 target=\u0022_blank\u0022\u003EComplimentary lunch provided for registered guests\u003C\/a\u003E. Please bring your own beverage.\u003C\/em\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cem\u003E\u003Ca href=\u0022http:\/\/www.iisp.gatech.edu\/cyber-lecture\u0022 target=\u0022_blank\u0022\u003ESign up to receive future lecture announcements.\u003C\/a\u003E\u003Cbr \/\u003E\u003C\/em\u003E\u003C\/p\u003E\u003Ch4\u003E\u003Cem\u003E\u0026nbsp;\u003Cbr \/\u003E\u003C\/em\u003E\u003C\/h4\u003E\u003Ch4\u003EFeaturing Frank Wang on Sept. 30\u003Cem\u003E\u003Cbr \/\u003E\u003C\/em\u003E\u003C\/h4\u003E\u003Ch5\u003E\u0022Cryptographically Enforced Access Control for User Data in Untrusted Clouds\u0022\u003C\/h5\u003E\u003Cp\u003EModern web services rob users of low-level control over cloud storage\u2014a user\u2019s single logical data set is scattered across multiple storage silos whose access controls are set by web services, not users. The consequence is that users lack the ultimate authority to determine how their data is shared with other web services.\u003Cbr \/\u003EIn this talk, we introduce Sieve, a new platform which selectively (and securely) exposes user data to web services. Sieve has a user-centric storage model: each user uploads encrypted data to a single cloud store, and by default, only the user knows the decryption keys. Given this storage model, Sieve defines an infrastructure to support rich, legacy web applications. Using attribute-based encryption, Sieve allows users to define intuitively understandable access policies that are cryptographically enforceable. Using key homomorphism, Sieve can reencrypt user data on storage providers in situ, revoking decryption keys from web services without revealing new keys to the storage provider. Using secret sharing and two-factor authentication, Sieve protects cryptographic secrets against the loss of user devices like smartphones and laptops. The result is that users can enjoy rich, legacy web applications, while benefiting from cryptographically strong controls over which data a web service can access.\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EBIO\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EFrank Wang\u003C\/strong\u003E is a Ph.D. student at the Massachusetts Institute of Technology focusing on building secure systems. He is advised by Nickolai Zeldovich and James Mickens. He completed his undergraduate studies at Stanford University, focusing on applied cryptography. He runs the MIT security seminar, and he is also a member of Roughdraft Ventures, which provides small amounts of capital to early stage student startups. He is currently running a summer program for early stage security companies called Cybersecurity Factory. He has interned at the security teams at Google and Facebook as well as consulted for security companies, such as Qualys. When he is not busy worrying about your security, he enjoys going to art museums and being outdoors.\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EFrank Wang from The Cybersecurity Factory at the Massachusetts Institute of Technology delivers a technical talk about \u0022Sieve\u0022 for cloud storage security.\u003Cem\u003E\u003Cbr \/\u003E\u003C\/em\u003E\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"Meet students, academic and industry leaders for intimate discussions about new cyber threats, trends and technologies."}],"uid":"27490","created_gmt":"2016-08-16 14:28:56","changed_gmt":"2017-04-13 21:15:06","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2016-09-30T13:00:00-04:00","event_time_end":"2016-09-30T14:00:00-04:00","event_time_end_last":"2016-09-30T14:00:00-04:00","gmt_time_start":"2016-09-30 17:00:00","gmt_time_end":"2016-09-30 18:00:00","gmt_time_end_last":"2016-09-30 18:00:00","rrule":null,"timezone":"America\/New_York"},"extras":[],"hg_media":{"538461":{"id":"538461","type":"image","title":"Cybersecurity Lecture Series","body":null,"created":"1464703200","gmt_created":"2016-05-31 14:00:00","changed":"1475895326","gmt_changed":"2016-10-08 02:55:26","alt":"Cybersecurity Lecture Series","file":{"fid":"89506","name":"cls_email_header.jpg","image_path":"\/sites\/default\/files\/images\/cls_email_header.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/cls_email_header.jpg","mime":"image\/jpeg","size":461835,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/cls_email_header.jpg?itok=NPA_x_rn"}},"451391":{"id":"451391","type":"image","title":"IISP logo","body":null,"created":"1449256280","gmt_created":"2015-12-04 19:11:20","changed":"1475895192","gmt_changed":"2016-10-08 02:53:12","alt":"IISP logo","file":{"fid":"203339","name":"instituteforinformationsecurityprivacy-outline-black874.jpg","image_path":"\/sites\/default\/files\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg","mime":"image\/jpeg","size":88082,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg?itok=JGV2BzFy"}},"490641":{"id":"490641","type":"image","title":"Frank Wang, coordinator, The Cybersecurity Factory","body":null,"created":"1453827600","gmt_created":"2016-01-26 17:00:00","changed":"1475895248","gmt_changed":"2016-10-08 02:54:08","alt":"Frank Wang, coordinator, The Cybersecurity Factory","file":{"fid":"204436","name":"rdv-06_big.jpg","image_path":"\/sites\/default\/files\/images\/rdv-06_big_0.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/rdv-06_big_0.jpg","mime":"image\/jpeg","size":375718,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/rdv-06_big_0.jpg?itok=dD43r3Su"}}},"media_ids":["538461","451391","490641"],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50875","name":"School of Computer Science"},{"id":"50876","name":"School of Interactive Computing"},{"id":"50877","name":"School of Computational Science and Engineering"},{"id":"322011","name":"College of Computing Events"},{"id":"430601","name":"Institute for Information Security and Privacy"}],"categories":[],"keywords":[{"id":"10807","name":"cloud computing"},{"id":"1404","name":"Cybersecurity"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1795","name":"Seminar\/Lecture\/Colloquium"}],"invited_audience":[{"id":"78751","name":"Undergraduate students"},{"id":"78761","name":"Faculty\/Staff"},{"id":"78771","name":"Public"},{"id":"174045","name":"Graduate students"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003ETara La Bouff, \u003Ca href=\u0022mailto:tara.labouff@iisp.gatech.edu\u0022\u003Etara.labouff@iisp.gatech.edu\u003C\/a\u003E, 404.769.5408\u003C\/p\u003E","format":"limited_html"}],"email":[],"slides":[],"orientation":[],"userdata":""}}}