Anupam Datta

Associate Professor
Computer Science Department and
Electrical and Computer Engineering Department
Carnegie Mellon University

Anupam Datta

Research Talks

  1. Privacy through Accountability: A Computer Science Perspective, TRUST Security Seminar, University of California Berkeley, September 2014.
  2. Privacy through Accountability: The Case of Web Advertising, Security Seminar, Stanford University, August 2014.
  3. Privacy through Accountability: The Case of Web Advertising, Keynote Lecture, 5th International Workshop on Data Usage Management, May 2014.
  4. Privacy through Accountability: A Computer Science Perspective, Keynote Lecture, 10th International Conference on Distributed Computing and Internet Technology, February 2014.
  5. Privacy through Accountability: A Computer Science Perspective, Accountability: Science, Technology and Policy Workshop, MIT, January 2014.
  6. Science of Usable Security, AFOSR Science of Cybersecurity MURI Review, August 2013.
  7. Privacy through Accountability, AFOSR Assured Information Sharing MURI Review, August 2013.
  8. Privacy through Accountability, Invited Talk, Microsoft Research India, July 2013.
  9. Privacy Preserving Release of Public/Semi-Public Data, Invited Panelist, CCC/CMU/ITIF Privacy R&D Workshop, March 2013.
  10. Naturally Rehearsing Passwords, Theory Seminar, Microsoft Research Silicon Valley, March 2013.
  11. Audit Games, Invited Talk, DIMACS Workshop on Economics of Information Sharing, February 2013.
  12. Differentially Private Data Analysis of Social Networks via Restricted Sensitivity, Invited Talk, DIMACS Workshop on Differential Privacy across Computer Science, October 2012.
  13. Formalizing and Enforcing Purpose Restrictions in Privacy Policies, TRUST Conference, November 2012.
  14. Privacy, Audit and Accountability, Invited Talk, IFIP World Computer Congress, June 2012.
  15. Privacy, Audit and Accountability, Information Trust Institute Seminar, UIUC, May 2012.
  16. Privacy, Audit and Accountability, Microsoft Research Redmond, April 2012.
  17. Privacy, Audit and Accountability, Decentralized Information Group Seminar, MIT, April 2012.
  18. Privacy, Audit and Accountability, Center for Research in Computation and Society Seminar, Harvard University, April 2012.
  19. Formalizing and Enforcing Privacy: Semantics and Audit, Invited talk, Workshop on Computer Aided Security, Verimag Laboratory, Grenoble, January 2012.
  20. Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms, Keynote Lecture, 7th International Conference on Information Systems Security, December 2011.
  21. Policy Auditing over Incomplete Logs, Stanford Software Seminar, November 2011.
  22. Principled Audit Mechanisms for Privacy Protection, TRUST External Advisory Board, November 2011.
  23. Principled Audit Mechanisms for Privacy Protection, CyLab Corporate Partners Conference, September 2011.
  24. Foundations of Privacy, Invited Tutorial, Summer School on Security and Privacy, Microsoft Research and Indian Institute of Science, June 2011.
  25. Privacy Protection via Computer-Assisted Audits, Symantec Research, May 2011.
  26. Privacy Protection via Computer-Assisted Audits, UC Berkeley, April 2011.
  27. Privacy Protection via Computer-Assisted Audits, IBM T. J. Watson Research Center, April 2011.
  28. Programming Language Methods for Compositional Security, Invited Tutorial, Oregon Programming Languages Summer School, June 2010.
  29. Compositional System Security in the Presence of Interface-Confined Adversaries, Invited Talk, 26th Annual Conference on Mathematical Foundations of Programming Semantics, May 2010.
  30. Toward Semantic Security Properties of Software, Invited Panelist, Panel on Rigorous Security Analysis of Software at IEEE Computer Security Foundations Symposium, July 2009.
  31. Protocol Composition Logic: Computational Semantics and Inductive Proofs, Computational and Symbolic Proofs of Security Workshop, April 2009.
  32. Privacy, Compliance and Information Risk in Complex Organizational Processes, NYU/IBM Workshop on Managing Data Risk: Acquisition, Processing, Retention and Governance, April 2009.
  33. Foundations of Privacy: Contextual Integrity, The Logic of Privacy and Beyond, Philosophy Seminar, Keio University, April 2009.
  34. Foundations of Privacy: Contextual Integrity, The Logic of Privacy and Beyond, NYU Computer Science Colloquium, February 2009.
  35. Foundations of Privacy: Contextual Integrity, The Logic of Privacy and Beyond, Information Security and Cryptography Seminar, University of Saarlandes and MPI-SWS, February 2009.
  36. Foundations of Privacy: Contextual Integrity, The Logic of Privacy and Beyond, Computer Science Seminar, University of Trier, February 2009.
  37. Is there a Science of Security, and if so, what might it look like? Invited Panelist, Panel at the NSF/IARPA/NSA Workshop on the Science of Security, November 2008.
  38. Privacy in Organizations, NSF/Conference Board Workshop on Organizations and Innovation, July 2008.
  39. PCL: A Logic for Network Security Protocols, Computer Science Seminar, University of Toronto, June 2007.
  40. PCL: A Logic for Network Security Protocols, MITACS Digital Security Seminar, Carleton University , May 2007.
  41. An Update on Network Protocol Security, Stanford Computer Forum Annual Security Workshop, March 2007.
  42. Reasoning about Security and Privacy, Computer Science Seminar, UCSD, February 2007.
  43. Reasoning about Security and Privacy, Computer Science Seminar, UCSC, January 2007.
  44. On Privacy and Compliance: Philosophy and Law meets Computer Science, Oakland PC Crystal Ball Workshop, IBM T. J. Watson, January 2007.
  45. Reasoning about Security and Privacy, Trust and Security Seminar, UIUC, December 2006.
  46. Reasoning about Security and Privacy, Computer Science Colloquium, UCLA, November 2006.
  47. Privacy, Utility, and Responsibility in Business Processes, Stanford Data Privacy Group, November 2006.
  48. Privacy and Utility in Patient Portals, TRUST Fall Meeting , Pittsburgh, October 2006.
  49. Reasoning about Security and Privacy, Cylab Seminar, CMU, September 2006.
  50. PCL: A Logic for Network Security Protocols, Computer Science Seminar, IIT Guwahati, June 2006.
  51. PCL: A Logic for Network Security Protocols, Computer Science Seminar, Microsoft Research Lab, Cambridge, May 2006.
  52. PCL: A Logic for Network Security Protocols, Concurrency and Security Seminar, Oxford University, May 2006.
  53. PCL: A Logic for Network Security Protocols, Computer Science Seminar, CMU, February 2006.
  54. Privacy and Contextual Integrity: Framework and Applications TRUST Winter Meeting , Washington D.C., January 2006.
  55. Games and the Impossibility of Realizable Ideal Functionality, ONR URI: SPYCE Review , Washington D.C., November 2005.
  56. Security Analysis of Network Protocols, Cryptography and Information Security Seminar, MIT, November 2005.
  57. Security Analysis of Network Protocols, TACL Seminar, Princeton University, November 2005.
  58. Security Analysis of Network Protocols, Computer Security Seminar, University of Pennsylvania, November 2005.
  59. Security Analysis of Network Protocols, Computer Security Seminar, UC Berkeley, October 2005.
  60. Security Analysis of Network Protocols, Computer Security Seminar, CMU, October 2005.
  61. PCL: A Logic for Security Protocols, Invited lecture, 18732: Secure Software Systems, CMU, October 2005.
  62. Security Analysis of Network Protocols, Computer Security Seminar, Cornell University, September 2005.
  63. Stanford vs. UC: The Big Game, Advances in Cryptology - CRYPTO'05, August 2005.
  64. Secure Wireless Networking, DARPA/AFOSR MURI: APPeers Review, MIT, June 2005.
  65. Security Analysis of Network Protocols: Compositional Reasoning and Complexity-theoretic Foundations, ONR URI: SPYCE Review, University of Pennsylvania, May 2005.
  66. Security Analysis of Network Protocols, Stanford Computer Forum Annual Security Workshop, May 2005.
  67. Symbolic Logic for Complexity-theoretic Model of Cryptographic Protocols, Theory Group, Computer Science Department, Stanford University, May 2005.
  68. Security Analysis of Network Protocols, Computer Science Colloquium, University of Wisconsin-Madison, April 2005.
  69. Abstraction and Refinement in Protocol Derivation, 17th IEEE Computer Security Foundations Workshop, June 2004.
  70. Formal Derivation of Security Protocols, 4th Annual National Security Agency Conference on High Confidence Software and Systems, April 2004.
  71. Secure Protocol Composition, 1st ACM Workshop on Formal Methods in Security Engineering, October 2003.
  72. A Derivation System for Security Protocols and its Logical Formalization, 16th IEEE Computer Security Foundations Workshop, June 2003.