Ergebnis für URL: http://dig.csail.mit.edu/TAMI/
     * At DIG:
     * [1]DIG Home
     * [2]DIG Publications

   MIT CSAIL

                      Transparent Accountable Datamining Initiative

   The TAMI Project is creating technical, legal, and policy foundations for
   transparency and accountability in large-scale aggregation and inferencing across
   heterogeneous information systems. The incorporation of transparency and
   accountability into decentralized systems such as the Web is critical to help
   society manage the privacy risks arising from the explosive progress in
   communications, storage, and search technology. The expansion of government use
   of large-scale data mining for law enforcement and national security provides a
   compelling motivation for this work. While other investigations of the impact of
   data mining on privacy focus on limiting access to data as a means of protecting
   privacy, a variety of social, political, and technical factors are making it
   increasingly difficult to limit collection of and access to personal information.
   The TAMI Project is addressing the risks to privacy protection and the
   reliability of conclusions drawn from increasing ease of data aggregation from
   multiple sources by creating methods and technologies for adding increased
   transparency and accountability of the inferencing and aggregation process
   itself. The project is developing precise rule languages that are able to express
   policy constraints and reasoning engines that are able to describe the results
   they produce.

Selected publications:

     * AuYeung, Ching-man, Kagal, Lalana, Gibbins, Nick, and Shadbolt, Nigel
       [3]Providing Access Control to Online Photo Albums Based On Tags and Linked
       Data, AAAI Spring Symposium on Social Semantic Web: Where Web 2.0 Meets Web
       3.0
     * Seneviratne, Oshani, Kagal, Lalana, and Berners-Lee, Tim, [4]Policy Aware
       Content Reuse on the Web, [5]ISWC2009 - International Semantic Web Conference
     * Henry Story, Bruno Harbulot, Ian Jacobi and Mike Jones, [6]FOAF+SSL: RESTful
       Authentication for the Social Web, [7]SPOT2009 - Trust and Privacy on the
       Social and Semantic Web workshop at ESWC 2009, June 2009.
     * Weitzner, Abelson, Berners-Lee, Feigenbaum, Hendler, Sussman, [8]Information
       Accountability ([9]alt link),Communications of the ACM, Jun. 2008, 82-87
     * Lalana Kagal, Chris Hanson, and Daniel Weitzner, [10]Integrated Policy
       Explanations via Dependency Tracking, [11]IEEE Policy 2008
     * D. Weitzner, [12]Beyond Secrecy: New Privacy Protection Strategies for Open
       Information Spaces, IEEE Internet Computing, Sept/Oct 2007.
     * Weitzner, Abelson, Berners-Lee, Feigenbaum, Hendler, Sussman, [13]Information
       Accountability, MIT CSAIL Technical Report MIT-CSAIL-TR-2007 (13 June 2007)
       [[14]DSpace Handle]
     * Hanson, Kagal, Sussman, Berners-Lee, Weitzner, "[15]Data-Purpose Algebra:
       Modeling Data Usage Policies", IEEE Workshop on Policy for Distributed
       Systems and Networks 2007, June 2007 (POLICY 2007).
     * Feigenbaum and Weitzner (eds.), "[16]Report on the 2006 TAMI/Portia Workshop
       on Privacy and Accountability".
     * Weitzner, Abelson, Berners-Lee, Hanson, Hendler, Kagal, McGuinness, Sussman,
       Waterman, [17]Transparent Accountable Data Mining: New Strategies for Privacy
       Protection,; MIT CSAIL Technical Report [18]MIT-CSAIL-TR-2006-007 [[19]DSpace
       handle] (27 January 2006).

Trying out accountability tools under development

   Our research is visibile through the above papers and tools that we are
   developing. We welcome feedback.
     * Hints on how to [20]install and use a Tabulator extension that helps users to
       analyze compliance with privacy rules in policy-aware information usage logs.

   Please be aware that this is bleeding edge code intended for demonstration
   purposes only.

Current status

   For current status, see [21]this page and some [22]challenges we are working on.
   The following are a few of the scenarios we're working on
     * [23]Scenario 0: MIT Prox card data usage
     * [24]Scenario 3: Deadbeat Dad ([25]Scheme rules)
     * [26]ARL Scenario: Violation of Universal Declaration of Human Rights and UN
       Resolution
     * [27]Scenario 9: Drug resistant TB epidemic
     * [28]Scenario 11: Data fusion centers
     * [29]Query Compliance

   This project has close connections with the [30]Policy Aware Web access control
   project, joint work with the [31]University of Maryland Mindswap project.

   This work is supported by the US National Science Foundation [32]Cybertrust
   (05-518) program.
     ____________________________________________________________________________

   [33]Valid XHTML 1.0!


    $Revision: 27889 $ of
    $Date: 2009-02-02
    $Author: lkagal$

References

   1. http://dig.csail.mit.edu/
   2. http://dig.csail.mit.edu/2009/04/publications.html
   3. http://dig.csail.mit.edu/2008/Papers/AAAI%20SSS%202009/paper.pdf
   4. ttp://dig.csail.mit.edu/2009/Papers/ISWC/policy-aware-reuse/paper.pdf
   5. http://iswc2009.semanticweb.org/"
   6. http://dig.csail.mit.edu/2009/Papers/SPOT/foaf-ssl-spot2009.pdf
   7. http://dig.csail.mit.edu/TAMI/
   8. http://doi.acm.org/10.1145/1349026.1349043
   9. http://dig.csail.mit.edu/2008/06/info-accountability-cacm-weitzner.pdf
  10. http://dig.csail.mit.edu/2008/Papers/IEEE%20Policy/air-overview.pdf
  11. http://www.policy-workshop.org/2008/
  12. http://dig.csail.mit.edu/2007/09/ieee-ic-beyond-secrecy-weitzner.html
  13. http://dspace.mit.edu/bitstream/1721.1/37600/2/MIT-CSAIL-TR-2007-034.pdf
  14. http://dspace.mit.edu/handle/1721.1/37600
  15. http://dig.csail.mit.edu/2006/Papers/Policy07/data-purpose-algebra.pdf
  16. http://dig.csail.mit.edu/2006/tami-portia-accountability-ws/summary
  17. http://www.w3.org/2006/01/tami-privacy-strategies-aaai.pdf
  18. https://dspace.mit.edu/bitstream/1721.1/30972/2/MIT-CSAIL-TR-2006-007.pdf
  19. https://dspace.mit.edu/handle/1721.1/30972
  20. http://dig.csail.mit.edu/TAMI/2008/JustificationUI/howto.html
  21. http://dig.csail.mit.edu/TAMI/inprogress/TAMI.Overview.html
  22. http://dig.csail.mit.edu/TAMI/2008/tech_challenges.html
  23. http://dig.csail.mit.edu/TAMI/2007/s0/
  24. http://dig.csail.mit.edu/TAMI/inprogress/Scenario-3.html
  25. http://dig.csail.mit.edu/TAMI/cph/v1/
  26. http://dig.csail.mit.edu/2008/ARL/
  27. http://tw.rpi.edu/proj/tami/TAMI_Scenario_9
  28. http://tw.rpi.edu/proj/tami/TAMI_Scenario_11
  29. http://dig.csail.mit.edu/2009/IARPA-PIR/
  30. http://www.policyawareweb.org/
  31. http://www.mindswap.org/
  32. http://www.nsf.gov/pubs/2005/nsf05518/nsf05518.htm
  33. http://validator.w3.org/check?uri=referer


Usage: http://www.kk-software.de/kklynxview/get/URL
e.g. http://www.kk-software.de/kklynxview/get/http://www.kk-software.de
Errormessages are in German, sorry ;-)