Classes are held Tuesdays and Thursdays 8:30-9:50, in MC4040. Readings are from Computerization and Controversy, ed. Rob Kling, Academic Press, 2nd ed. and from papers indicated on the CS492/CS692 website. On reserve in the DC library is a copy of the Kling book which is library use only. Some of the chapters from the Kling textbook can be found at the following website: http://rkcsi.indiana.edu/archive/kling/cc/index.html
NOTE: An Additional Paper is NOT required reading, but every other paper or chapter of Kling IS required reading.
Privacy by Design - A crucial design principle
Can we create cutting edge, personalized and commercially successful information systems, while at the same time, protecting privacy. Dr. Cavoukian says that not only is protecting privacy socially necessary, but it's also the best technical solution to the security and commercial challenges we now face in today's ubiquitous computing environment. As we enter into an age where we are immersed in a rich information environment, automatically sharing information about ourselves with others, viable privacy must be architected directly into the technology. Dr. Cavoukian calls this "privacy by design," and has been working with technologists, legal experts, and international organizations to ensure that we retain the ability to control our digital identities. Come hear her explain how this works, as she reviews her efforts to shape the evolution of identity technologies, including identity management systems, radio frequency identification (RFID), and various forms of encryption, including the very novel form of biometric encryption.
CACR SEMINAR
SPEAKER: David Chaum
PREFERRED PRESENTATION BECAUSE THE ROOM IS LARGER
TIME: 11:30 am - 12:25 pm, Wednesday, March 7
LOCATION: EIT 1015
BACKUP PRESENTATION FOR ONLY IF YOU CANNOT ATTEND PREFERRED PRESENTATION
TIME: 1:30 - 2:30 pm, Wednesday, March 7
LOCATION: MC 5136
TITLE: PunchScan: The First Truly-Practical Voter-Verifiable Election System
ABSTRACT: So-called encrypted vote election systems have held promise for a far higher standard of elections that would allow voters to verify that their votes are correctly included in the final tally -- no matter if those running the election were to try to cheat even with unlimited computing power. Previous approaches to realizing such encrypted-vote systems, however, used touch-screen computers, costly special hardware, and sophisticated cryptography that was difficult to explain widely.
PunchScan adapts the encrypted vote concept to optical-scan ballots and achieves a quite practical, scalable, low-cost, easy to use and understand system. Moreover, it works over the whole range of public-sector voting environments: provisional ballots allow voters to choose the polling place they wish to vote from; absentee mail-in ballots have the same high integrity standard as attendance voting; polling places with automation, or where automation has broken down, use the same ballot form and provide similar properties; and considerably more voter disabilities are accommodated than currently while providing privacy and indistinguishability of such ballots. Resistance to improper influence such as vote buying and coercion is provided. Privacy is improved over other systems with automation at polling places and even over what has been achieved by the sophisticated cryptography of earlier systems. Hardware is off-the-shelf, software open source, and online audits allow everyone to verify the full proof of correctness of the outcome.
The system has been realized by a student team and is being used for University of Ottawa student government elections this week!