Page 115 - untitled
P. 115

ˮɽމ

                 Wang, Da-Wei                                  ਿ ͉ ༟ ࣘ                                                                      Research Description
                                                               ਿ
                                                                    ͉
                                                                                                                                            Research Description
                                                                             ࣘ
                                                                        ༟
                                                                                                                                            My research interest is in the theoretical foun-  tem CellSecu to safe guard personal privacy.  The
                                                               ᔖcc၈j ਓ޼Ӻࡰ
                                                                                                                                        dation of computer science and in applying fun-  system will check if datasets to be released leak too
                                                                         Associate Research Fellow (2000--)
                                                                                                                                        damental tools to various areas. To understand the   much personal information. We discovered appro-
                                                               ௰৷ኪዝj Ph.D., Computer Science, Yale                                      structure of the objects to be manipulated computa-  priate logic model for the problem and quantified
                                                                         University (1992)                                              tionally, to classify the resources needed for various   the privacy leakage with information theory and
                                                                                                                                        computational problems and to find more efficient   economic models. Secure Multiparty Protocol  can
                                                               ཥcc༑j+886-2-2788-3799 ext. 1729
                                                                                                                                        algorithms interest me the most. In the application   be applied to tackle the problem that some impor-
                                                               ෂccॆj+886-2-2782-4814                                                    area, I am interested in information privacy, security   tant information can be computed while the data   Research Fellows
                                                                                                                                        and medical informatics.  Lately, I have also been   owners do not have to reveal their data. Although
                                                               ཥɿڦᇌjwdw@iis.sinica.edu.tw                                               involved in information privacy protection mecha-  there are beautiful theoretical solutions, they are not

                                                               ၣccࠫjhttp://www.iis.sinica.edu.tw/pages/wdw                              nism design and the development of privacy regu-  suitable for problems involving large dataset. We
                                                                                                                                        lations in medical research. The goal is to clarify   try to quantify the information leakage in this set-
                                                                                                                                        the privacy protection problem and to design and   ting with an information theoretical framework, so
                                                                                                                                        construct a practical protection mechanism so that   that tradeoff between the computational resources
               •  Associate Research Fellow, Institute of Information                                                                   information can be shared efficiently and personal   needed and the level of privacy protection achieved
                                                                                                                                                                                                                                           Research Fellows
                 Science, Academia Sinica (2000-    )                                                                                   privacy can be protected at the same time.  Over   becomes possible.
                                                                                                                                        the pass few years, we developed a prototype sys-
               •  Assistant Research Fellow, Institute of Information
                 Science, Academia Sinica (1993-2000)
                                                                                                                                            Selected Publications
               •  Ph.D., Computer Science, Yale Univeristy (1992),  ޼Ӻᔊʧ                                                                    Selected Publications
                                                                  ޼Ӻᔊʧ
               •  M.S., CSIE, National Taiwan University (1987),                                                                        Journal Publicatons:                             3.  Da-Wei Wang, Churn-Jung Liau, Tsan-sheng Hsu and Jeremy K.-P.
                                                                   Ңٙ޼Ӻጳሳމࠇၑዚ߅ኪٙଣሞਿᓾ˸ʿν                                                                                                    Chen, “On The Damage and Compensation of Privacy Leakage”,
               •  B.S., CSIE, National Taiwan University (1985),                                                                        1.  Da-Wei Wang, Churn-Jung Liau, Tsan-sheng Hsu, Jeremy K.-P Chen   Proc. 18th Annual IFIP WG 11.3 Working Conference on Data and
                                                               Оਗ਼ਿᓾٙଣሞʈՈᏐ͜ίʔΝٙჯਹʕfə༆ࠇ                                                     “Value versus damage of information release: A data privacy perspec-
                                                                                                                                          tive,”  International Journal of Approximate Reasoning. To appear.  Applications Security , pages 311--324, 2004.
                                                               ၑ࿁൥ٙഐ࿴dʱᗳࠇၑਪᕚהცٙ༟๕˸ʿరҬ                                                   2.  Cho-Chin Lin, Da-Wei Wang and Tsan-Sheng Hsu, “Bounds on the   4.  Cho-Chin Lin, Tsan-sheng Hsu and Da-Wei Wang, “Bounds on the
                                                                                                                                          Client-server Incremental Computing,” IEICE Transactions on Funda-  Client-Server Incremental     Computing”, Proc. 7th International
                                                               һҞ஺Ϟࣖٙစၑ˙ج݊ҢٙጳሳהίdϾίᏐ͜                                                     mentals of Electronics, Communications and Computer Sciences, To   Symposium on Parallel Architectures, Algorithms, and     Networks (I-
                                                                                                                                          appear                                           SPAN), pages 86-91, 2004.

                                                               ௅ʱҢ࿁༟ৃᒯӷၾτΌ˸ʿᔼᐕ༟ৃܘϞጳሳd                                                   3.  Ean-wen Huang Da-Wei Wang, and Der-Ming Liou “Development of   5.  P. Liu, Da-Wei Wang, and Jan-Jan Wu, Efficient parallel I/O schedul-
                                                                                                                                          A Deterministic XML Schema By Resolving Structure Ambiguity of   ing in the presence of data duplication, International Conference on
                                                               ڐԸΪމ࿁༟ৃᒯӷٙ޼Ӻdɰਞၾə༟ৃᒯӷڭ                                                     HL7 Messages” Computer Mehods and Programs In Biomedicine Vol.   Parallel Processing (ICPP),  Oct. 2003.
                                                                                                                                          80, pages 1-15, 2005.                          6.  Jan-Jan Wu, Da-Wei Wang, and Y.-F. Lin, Placement of I/O servers to
                                                               ᚐዚՓၾ஝ᇍٙ޼Ӻdрɢٙͦᅺ݊Ҏૐঐਪᕚᔾ                                                   4.  Tsan-sheng Hsu, Kuo-Hui Tsai, Da-Wei Wang and D.T. Lee, “Two   improve parallel I/O performance on switch-based clusters, Interna-
                                                                                                                                          Variations of the Minimum Steiner Problem,” Journal of Combinato-  7.  tional Conference on Supercomputing, San Francisco, June, 2003.
                                                               ૶˲ணࠇၾܔ࿴ྼٙ͜ዚՓԸԴ੻༟ৃٙݴஷһϞ                                                     rial Optimization, vol. 9, no. 1, pages 101-120, 2005.  P. Liu, Da-Wei Wang, and Yi-heng Guo, An Approximation Algorithm
                                                                                                                                        5.  Da-Wei Wang, Churn-Jung Liau and Tsan-sheng Hsu, “Medical Priva-  for Broadcast Scheduling in Heterogeneous Environments, The 9th
                                                               ࣖଟۍɦΝࣛঐڭღࡈɛٙᒯӷfڐՇϋdҢࡁ೯                                                     cy Protection Based on     Granular Computing,” Artifi cial Intelligence   International Conference on Real-Time Computing Systems and Ap-
                                                                                                                                          in Medicine (AIM),  vol. 32, no. 2, pages 137-149, 2004   plications (RTCSA 2003), Taiwan
                                                               ࢝əɓࡈᕑҖӻ୕CellSecu̙˸ί༟ࣘࢫΫෂ༟ࣘ                                               6.  Y.-c. Chiang, T.-s. Hsu, S. Kuo, and D.-W. Wang.  “Preserving confi -  8.  Y.-T. Chiang, Y.-c. Chiang, T.-s. Hsu, C.-J. Liau, and D.-W. Wang.
                                                                                                                                          dentiality when sharing medical database with the Cellsecu system”     How much privacy? -- a system to safe guard personal privacy while
                                                               ഗԴ͜٫ʘۃdᏨݟΫෂʘ༟ࣘණ݊щރᚣཀεٙ                                                     International Journal of Medical Informatics, volume 71, pages 17-23,   releasing databases.  In James J. Alpigini, James F. Peters, Andrzej
                                                                                                                                          2003                                             Skowron, and Ning Zhong, editors, Lecture Notes in Artifi cal Intelli-
                                                               ࡈɛᒯӷfҢࡁ౤̈əቇ຅ٙᜌ፨ᅼόdԨ˸༟ৃ                                                   7.  Kuo-Hui Tsai, Da-Wei Wang, Frank Hwang “Lower bounds for wide-  gence/ Subseries of LNCS 2475: Proceedings of the 3rd International
                                                                                                                                          sense nonblocking Clos network.” Theoretical Computer Science vol.   Conference on Rough Sets and Current Trends in Computing, pages
                                                               ଣሞʿ຾᏶ᅼόԸඎʷᒯӷ౧ᚣʘ೻ܓfε˙ӷ੗                                                     261 pages 323-328, 2001                          226-233, New York, NY, 2002. Springer-Verlag.
                                                                                                                                        8.  XiaoYun Lu, Da-Wei Wang, C.K. Wong, “Rooted Spanning Trees in   9.  Tsan-sheng Hsu, Churn-Jung Liau, Da-Wei Wang and Jeremy K.-P.
                                                               ࠇၑ€Secure Multiparty Protocold̙ආɓӉ༆Ӕ                                      Tournaments”, Graphs and Combinatorics vol. 16, pages 411-427   Chen, “Quantifying Privacy Leakage Through Answering Database
                                                                                                                                          January 2000                                     Queries”, Proc. 5th Information Security Conference (ISC), Springer-
                                                               ஢εცࠅл͜ӷ੗༟ࣘࠇၑ̈ࠠࠅഐ؈dШΝࣛʔ                                                   9.  Xiao Yun Lu, Da-Wei Wang, C.K. Wong, “On the Bounded Domina-  Verlag LNCS# 2433, pages 162--175, 2002.
                                                                                                                                          tion Number of Tournaments”, Discrete Mathematics, vol 220, pages   10.  Tsan-sheng Hsu, Churn-Jung Liau and Da-Wei Wang, “A Logical
                                                               Κʿ༟ࣘʘᒯӷ׌dᒱ್ίଣሞɪவԬࡈਪᕚʊϞ                                                     257-261 2000                                     Model for Privacy     Protection”, Proc. 4th Information Security Con-
                                                                                                                                                                                           ference (ISC), Springer-Verlag LNCS#     2200, pages 110--124, 2001.
                                                               ஢εٙϓ؈dШࠅٜટˏ͜ଣሞഐ؈dՑ̶ඎ༟ࣘ                                                   Refereed Conference Publications                 11.  Yu-Cheng Chiang, Tsan-Sheng Hsu, Sun Kuo, Da-Wei Wang  “Pre-
                                                                                                                                                                                           serving confidentiality      when sharing medical database--the Cellse-

                                                                                                                                        1.  Yi-Ting Chiang, Da-Wei Wang, Churn-Jung Liau and Tsan-sheng Hsu,   cu system”, APAMI-MIC 27-30 Sep. 2000 HongKong.
                                                               ٙྼਕᏐ͜ᒔϞɓݬ൷ᕎfҢࡁ޼ӺνОඎʷ༟ৃ                                                     “Secrecy of Two-Party Secure Computation”, Proc. 19th Annual IFIP   12.  PangFeng Liu, Da-Wei Wang “Reduction Optimization in Heteroge-
                                                                                                                                          WG 11.3 Working Conference on Data and Applications Security, Aug.   neous Cluster Environments” International Parallel and Distributed
                                                               ౧ᚣ೻ܓdԨಂૐணࠇ̙̈˸ίࠇၑልᕏܓ˸ʿ༟                                                     7-10 Lecture Notes in Computer Science, Vol. 3654, Jajodia, Sushil;   Processing Symposium, Cancun, Mexico 2000.
                                                                                                                                          Wijesekera, Duminda (Eds.), pages 114-123, 2005.  13.  Tsai JW, Liao BY, Huang CC, Hwang WL, Wang DW, Chiou3, and
                                                               ৃ౧ᚣ೻ܓගᛆፅԨҬ̻̈ፅᓃٙਕྼ༆Ӕ˙ࣩf                                                   2.  Seventeen Chen, Yu-Chuan (Jack) Li, Li (David) Liu, Feipei Lai,   Lin CH. (2000) "Applications of optical tweezers and an integrated
                                                                                                                                          Da-Wei Wang Building a Legal and Ethical Taiwan Health Grid for   force measurement module for biomedical research", Proc. SPIE
                                                                                                                                          Medical Decision Making HealthGrid 2004, France.  4082:213-221.



       104                                                                                                                                                                                                                                105
   110   111   112   113   114   115   116   117   118   119   120