{"587968":{"#nid":"587968","#data":{"type":"event","title":"Cybersecurity Lecture Series - Tianxin Tang","body":[{"value":"\u003Ch3\u003E\u003Cstrong\u003EMeet academic and industry leaders for intimate discussions about new cyber threats, trends and technologies. \u003C\/strong\u003E\u003C\/h3\u003E\r\n\r\n\u003Cp\u003EThe \u003Cstrong\u003ECybersecurity Lecture Series\u003C\/strong\u003E is a free, open-to-the-public lecture from a thought leader who is advancing the field of information security and privacy. Invited speakers include executives and researchers from private companies, government agencies, start-up incubators as well as Georgia Tech faculty and students presenting their research.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EHeld \u003Cstrong\u003Eweekly each Friday at Noon\u003C\/strong\u003E \u003Cstrong\u003Ethrough Apr. 21,\u003C\/strong\u003E lectures are open to all -- students, faculty, industry, government, or simply the curious. Graduate students may register for credit under seminar course CS-8001-INF.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cem\u003EComplimentary lunch provided for registered guests. Please bring your own beverage.\u003C\/em\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Ca href=\u0022http:\/\/www.iisp.gatech.edu\/cyber-lecture\u0022 target=\u0022_blank\u0022\u003E\u003Cem\u003ESign up to receive future lecture announcements.\u003C\/em\u003E\u003C\/a\u003E\u003C\/p\u003E\r\n\r\n\u003Ch3\u003E\u0026nbsp;\u003C\/h3\u003E\r\n\r\n\u003Ch3\u003E\u003Cstrong\u003EFeaturing Tianxin Tang on Mar. 3, 2017\u003C\/strong\u003E\u003C\/h3\u003E\r\n\r\n\u003Ch4\u003E\u003Cstrong\u003E\u003Cem\u003E\u0026quot;\u003C\/em\u003E\u003C\/strong\u003E\u003Cem\u003E\u003Cstrong\u003EKeyless Fuzzy Search for Data-based Access Control\u003C\/strong\u003E\u003C\/em\u003E\u003Cstrong\u003E\u003Cem\u003E\u0026quot; \u003C\/em\u003E\u003C\/strong\u003E\u003C\/h4\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003E\u003Cem\u003EABSTRACT\u003C\/em\u003E\u003C\/strong\u003E\u0026nbsp;\u0026nbsp; |\u0026nbsp;\u0026nbsp; Key management is always problematic in terms of privacy for remotely stored data in a de-centralized environment. To alleviate this issue, we propose a concept called \u0026quot;keyless fuzzy search,\u0026quot; where users can query an encrypted database, retrieve its parts and decrypt only some information \u0026quot;close to\u0026quot; the encrypted data. While strong security in such a keyless setting is impossible to achieve, our approach prohibits remote encrypted data from easily being massively harvested or mined, because guessing the right queries can be costly for attackers if the data has some entropy.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003E\u003Cem\u003EBIO\u003C\/em\u003E\u003C\/strong\u003E\u0026nbsp;\u0026nbsp; |\u0026nbsp;\u0026nbsp; \u003Cstrong\u003ETianxin\u003C\/strong\u003E\u003Cstrong\u003E Tang \u003C\/strong\u003Eis a second-year Ph.D. student in the School of Computer Science. Her research interest lies in cryptography, more specifically in provable security. Her current projects are related to searchable encryption.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":[{"value":"Ph.D. Student Tianxin Tang presents a method for limiting de-encryption of protected databases."}],"uid":"27490","created_gmt":"2017-02-27 13:50:11","changed_gmt":"2017-04-13 21:12:38","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2017-03-03T12:00:00-05:00","event_time_end":"2017-03-03T13:00:00-05:00","event_time_end_last":"2017-03-03T13:00:00-05:00","gmt_time_start":"2017-03-03 17:00:00","gmt_time_end":"2017-03-03 18:00:00","gmt_time_end_last":"2017-03-03 18:00:00","rrule":null,"timezone":"America\/New_York"},"extras":[],"hg_media":{"538461":{"id":"538461","type":"image","title":"Cybersecurity Lecture Series","body":null,"created":"1464703200","gmt_created":"2016-05-31 14:00:00","changed":"1475895326","gmt_changed":"2016-10-08 02:55:26","alt":"Cybersecurity Lecture Series","file":{"fid":"89506","name":"cls_email_header.jpg","image_path":"\/sites\/default\/files\/images\/cls_email_header.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/cls_email_header.jpg","mime":"image\/jpeg","size":461835,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/cls_email_header.jpg?itok=NPA_x_rn"}}},"media_ids":["538461"],"groups":[{"id":"47223","name":"College of Computing"},{"id":"322011","name":"College of Computing Events"},{"id":"430601","name":"Institute for Information Security and Privacy"},{"id":"50877","name":"School of Computational Science and Engineering"},{"id":"50875","name":"School of Computer Science"},{"id":"50876","name":"School of Interactive Computing"}],"categories":[],"keywords":[{"id":"1404","name":"Cybersecurity"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1795","name":"Seminar\/Lecture\/Colloquium"}],"invited_audience":[{"id":"78761","name":"Faculty\/Staff"},{"id":"78771","name":"Public"},{"id":"78751","name":"Undergraduate students"},{"id":"174045","name":"Graduate students"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003ELindsey Panetta, \u003Ca href=\u0022mailto:lindsey.panetta@gtri.gatech.edu\u0022\u003Elindsey.panetta@gtri.gatech.edu\u003C\/a\u003E\u003C\/p\u003E\r\n","format":"limited_html"}],"email":[],"slides":[],"orientation":[],"userdata":""}}}