Skip to main content



Find us on

facebook youtube flickr twitter itunes u logo

Upcoming Events

Sal Stolfo

Salvatore J. Stolfo Columbia University
A Brief History of Symbiote DefenseTuesday, October 31st
Rockefeller 003
5:00 PM

 Fright Night Imge

Wanna See Something REALLY Scary?
ISTS Looks at the Dark Web on Halloween Night
Tuesday, October 31st
Sudikoff  045 Trust Lab (dungeon)
7:30 PM - RSVP
Space is Limited 


Recent Talks

Dan Wallach

STAR-Vote: A Secure, Transparent, Auditable and Reliable Voting System

Professor Dan Wallach
Rice University
Thursday April 27, 2017
Carson L01, 5:00 PM

Ben Miller Dragos

Pandora's Power Grid - What Can State Attacks Do and What Would be the Impact?

Ben Miller
Chief Threat Officer, Dragos, Inc.
Tuesday May 2, 2017
Kemeny 007, 4:30 PM
Brendan Nyhan




Factual Echo Chambers? Fact-checking and Fake News in Election 2016.

Professor Brendan Nyhan
Dartmouth College
Thursday May 4, 2017
Rocky 001, 5:00 PM

Dickie George


Espionage and Intelligence

Professor Dickie George
Johns Hopkins University
Thursday May 11, 2017
Rocky 001, 5:00 PM

Dan Wallach

A Nation Under Attack: Advanced Cyber-Attacks in Ukraine

Ukrainian Cybersecurity Researchers
Thursday April 6, 2017
Oopik Auditorium 5:30 PM

ISTS Information Pamphlet



Institute for Security, Technology, and Society
Dartmouth College
6211 Sudikoff Laboratory
Hanover, NH 03755 USA
HomeEvents >

Too Much Information: Helping People Keep Their Private Data to Themselves

Dr. Landon Cox, Duke University
May 12, 2008


Landon CoxAccess control is a multi-faceted area that has been advanced by a wide range of computer science research communities including programming languages, human-computer interaction, computer architecture, and operating systems. In general, this body of work has either sought to improve the expressiveness of access control logic or introduce novel mechanisms for enforcing policies. Each approach relies on a human operator or programmer to manually specify access control policies which are then enforced by a trusted reference monitor. Unfortunately, policy specification is often an error-prone process and can lead to damaging breaches of confidentiality due to access control misconfiguration. The work presented in this talk seeks to 1) develop heuristics and models of proper access control enforcement, and 2) design and implement system monitoring mechanisms capable of automatically identifying suspicious sharing patterns. These activities target both ubiquitous Internet systems such as the web and email as well as emerging mobile systems such as mobile social networks and participatory sensing.


Landon Cox is an Assistant Professor of Computer Science at Duke University and a recent recipient of an NSF CAREER award. He received his Ph.D. from the University of Michigan in 2005. Landon's current research interests include operating systems, distributed systems, and mobile computing.

Last Updated: 4/21/10