Massachusetts Institute of Technology
Sign in

Session II: Cybersecurity Through an Identity Management System

Elli Androulaki, Maritza Johnson, Binh Vo, Steven Bellovin (Columbia). 10/12/2009

Comments (0)

It looks like no one has posted a comment yet. You can be the first!

You need to log in, in order to post comments.

Engaging Data Forum

Engaging Data Forum

Category: Events | Updated 7 years ago

Created
November 23, 2009 12:25
Category
Tags
License
All Rights Reserved (What is this?)
Additional Files


Viewed
14972 times

More from Engaging Data Forum

Plenary Session: Rich Identity and the Next Net

Plenary Session: Rich Identity and ...

Added over 7 years ago | 00:28:34 | 24529 views

Session III: Navigation of Cascading Data Errors

Session III: Navigation of Cascadin...

Added over 7 years ago | 00:14:16 | 22767 views

Session III: Engineering a Common Good: Fair Use of Aggregated Anonymized Behavioral Data

Session III: Engineering a Common G...

Added over 7 years ago | 00:13:27 | 15669 views

Plenary Session: Participatory Sensing: from ecosystems to human systems

Plenary Session: Participatory Sens...

Added over 7 years ago | 00:28:50 | 30873 views

Session II: Too Public or Too Private?

Session II: Too Public or Too Private?

Added over 7 years ago | 00:17:34 | 16907 views

Panel 2: Ensuring Data Protection: Legal and Regulatory Methods

Panel 2: Ensuring Data Protection: ...

Added 7 years ago | 01:26:00 | 17412 views