Page 115 - untitled
P. 115
ˮɽމ
Wang, Da-Wei ਿ ͉ ༟ ࣘ Research Description
ਿ
͉
Research Description
ࣘ
༟
My research interest is in the theoretical foun- tem CellSecu to safe guard personal privacy. The
ᔖcc၈j ਓӺࡰ
dation of computer science and in applying fun- system will check if datasets to be released leak too
Associate Research Fellow (2000--)
damental tools to various areas. To understand the much personal information. We discovered appro-
௰৷ኪዝj Ph.D., Computer Science, Yale structure of the objects to be manipulated computa- priate logic model for the problem and quantified
University (1992) tionally, to classify the resources needed for various the privacy leakage with information theory and
computational problems and to find more efficient economic models. Secure Multiparty Protocol can
ཥcc༑j+886-2-2788-3799 ext. 1729
algorithms interest me the most. In the application be applied to tackle the problem that some impor-
ෂccॆj+886-2-2782-4814 area, I am interested in information privacy, security tant information can be computed while the data Research Fellows
and medical informatics. Lately, I have also been owners do not have to reveal their data. Although
ཥɿڦᇌjwdw@iis.sinica.edu.tw involved in information privacy protection mecha- there are beautiful theoretical solutions, they are not
ၣccࠫjhttp://www.iis.sinica.edu.tw/pages/wdw nism design and the development of privacy regu- suitable for problems involving large dataset. We
lations in medical research. The goal is to clarify try to quantify the information leakage in this set-
the privacy protection problem and to design and ting with an information theoretical framework, so
construct a practical protection mechanism so that that tradeoff between the computational resources
• Associate Research Fellow, Institute of Information information can be shared efficiently and personal needed and the level of privacy protection achieved
Research Fellows
Science, Academia Sinica (2000- ) privacy can be protected at the same time. Over becomes possible.
the pass few years, we developed a prototype sys-
• Assistant Research Fellow, Institute of Information
Science, Academia Sinica (1993-2000)
Selected Publications
• Ph.D., Computer Science, Yale Univeristy (1992), Ӻᔊʧ Selected Publications
Ӻᔊʧ
• M.S., CSIE, National Taiwan University (1987), Journal Publicatons: 3. Da-Wei Wang, Churn-Jung Liau, Tsan-sheng Hsu and Jeremy K.-P.
ҢٙӺጳሳމࠇၑዚ߅ኪٙଣሞਿᓾ˸ʿν Chen, “On The Damage and Compensation of Privacy Leakage”,
• B.S., CSIE, National Taiwan University (1985), 1. Da-Wei Wang, Churn-Jung Liau, Tsan-sheng Hsu, Jeremy K.-P Chen Proc. 18th Annual IFIP WG 11.3 Working Conference on Data and
Оਗ਼ਿᓾٙଣሞʈՈᏐ͜ίʔΝٙჯਹʕfə༆ࠇ “Value versus damage of information release: A data privacy perspec-
tive,” International Journal of Approximate Reasoning. To appear. Applications Security , pages 311--324, 2004.
ၑ࿁ٙഐdʱᗳࠇၑਪᕚהცٙ༟๕˸ʿరҬ 2. Cho-Chin Lin, Da-Wei Wang and Tsan-Sheng Hsu, “Bounds on the 4. Cho-Chin Lin, Tsan-sheng Hsu and Da-Wei Wang, “Bounds on the
Client-server Incremental Computing,” IEICE Transactions on Funda- Client-Server Incremental Computing”, Proc. 7th International
һҞϞࣖٙစၑ˙ج݊ҢٙጳሳהίdϾίᏐ͜ mentals of Electronics, Communications and Computer Sciences, To Symposium on Parallel Architectures, Algorithms, and Networks (I-
appear SPAN), pages 86-91, 2004.
ʱҢ࿁༟ৃᒯӷၾτΌ˸ʿᔼᐕ༟ৃܘϞጳሳd 3. Ean-wen Huang Da-Wei Wang, and Der-Ming Liou “Development of 5. P. Liu, Da-Wei Wang, and Jan-Jan Wu, Efficient parallel I/O schedul-
A Deterministic XML Schema By Resolving Structure Ambiguity of ing in the presence of data duplication, International Conference on
ڐԸΪމ࿁༟ৃᒯӷٙӺdɰਞၾə༟ৃᒯӷڭ HL7 Messages” Computer Mehods and Programs In Biomedicine Vol. Parallel Processing (ICPP), Oct. 2003.
80, pages 1-15, 2005. 6. Jan-Jan Wu, Da-Wei Wang, and Y.-F. Lin, Placement of I/O servers to
ᚐዚՓၾᇍٙӺdрɢٙͦᅺ݊Ҏૐঐਪᕚᔾ 4. Tsan-sheng Hsu, Kuo-Hui Tsai, Da-Wei Wang and D.T. Lee, “Two improve parallel I/O performance on switch-based clusters, Interna-
Variations of the Minimum Steiner Problem,” Journal of Combinato- 7. tional Conference on Supercomputing, San Francisco, June, 2003.
˲ணࠇၾܔྼٙ͜ዚՓԸԴ༟ৃٙݴஷһϞ rial Optimization, vol. 9, no. 1, pages 101-120, 2005. P. Liu, Da-Wei Wang, and Yi-heng Guo, An Approximation Algorithm
5. Da-Wei Wang, Churn-Jung Liau and Tsan-sheng Hsu, “Medical Priva- for Broadcast Scheduling in Heterogeneous Environments, The 9th
ࣖଟۍɦΝࣛঐڭღࡈɛٙᒯӷfڐՇϋdҢࡁ೯ cy Protection Based on Granular Computing,” Artifi cial Intelligence International Conference on Real-Time Computing Systems and Ap-
in Medicine (AIM), vol. 32, no. 2, pages 137-149, 2004 plications (RTCSA 2003), Taiwan
࢝əɓࡈᕑҖӻ୕CellSecu̙˸ί༟ࣘࢫΫෂ༟ࣘ 6. Y.-c. Chiang, T.-s. Hsu, S. Kuo, and D.-W. Wang. “Preserving confi - 8. Y.-T. Chiang, Y.-c. Chiang, T.-s. Hsu, C.-J. Liau, and D.-W. Wang.
dentiality when sharing medical database with the Cellsecu system” How much privacy? -- a system to safe guard personal privacy while
ഗԴ͜٫ʘۃdᏨݟΫෂʘ༟ࣘණ݊щރᚣཀεٙ International Journal of Medical Informatics, volume 71, pages 17-23, releasing databases. In James J. Alpigini, James F. Peters, Andrzej
2003 Skowron, and Ning Zhong, editors, Lecture Notes in Artifi cal Intelli-
ࡈɛᒯӷfҢࡁ̈əቇٙᜌ፨ᅼόdԨ˸༟ৃ 7. Kuo-Hui Tsai, Da-Wei Wang, Frank Hwang “Lower bounds for wide- gence/ Subseries of LNCS 2475: Proceedings of the 3rd International
sense nonblocking Clos network.” Theoretical Computer Science vol. Conference on Rough Sets and Current Trends in Computing, pages
ଣሞʿᅼόԸඎʷᒯӷ౧ᚣʘܓfε˙ӷ 261 pages 323-328, 2001 226-233, New York, NY, 2002. Springer-Verlag.
8. XiaoYun Lu, Da-Wei Wang, C.K. Wong, “Rooted Spanning Trees in 9. Tsan-sheng Hsu, Churn-Jung Liau, Da-Wei Wang and Jeremy K.-P.
ࠇၑSecure Multiparty Protocold̙ආɓӉ༆Ӕ Tournaments”, Graphs and Combinatorics vol. 16, pages 411-427 Chen, “Quantifying Privacy Leakage Through Answering Database
January 2000 Queries”, Proc. 5th Information Security Conference (ISC), Springer-
εცࠅл͜ӷ༟ࣘࠇၑ̈ࠠࠅഐ؈dШΝࣛʔ 9. Xiao Yun Lu, Da-Wei Wang, C.K. Wong, “On the Bounded Domina- Verlag LNCS# 2433, pages 162--175, 2002.
tion Number of Tournaments”, Discrete Mathematics, vol 220, pages 10. Tsan-sheng Hsu, Churn-Jung Liau and Da-Wei Wang, “A Logical
Κʿ༟ࣘʘᒯӷdᒱ್ίଣሞɪவԬࡈਪᕚʊϞ 257-261 2000 Model for Privacy Protection”, Proc. 4th Information Security Con-
ference (ISC), Springer-Verlag LNCS# 2200, pages 110--124, 2001.
εٙϓ؈dШࠅٜટˏ͜ଣሞഐ؈dՑ̶ඎ༟ࣘ Refereed Conference Publications 11. Yu-Cheng Chiang, Tsan-Sheng Hsu, Sun Kuo, Da-Wei Wang “Pre-
serving confidentiality when sharing medical database--the Cellse-
1. Yi-Ting Chiang, Da-Wei Wang, Churn-Jung Liau and Tsan-sheng Hsu, cu system”, APAMI-MIC 27-30 Sep. 2000 HongKong.
ٙྼਕᏐ͜ᒔϞɓݬ൷ᕎfҢࡁӺνОඎʷ༟ৃ “Secrecy of Two-Party Secure Computation”, Proc. 19th Annual IFIP 12. PangFeng Liu, Da-Wei Wang “Reduction Optimization in Heteroge-
WG 11.3 Working Conference on Data and Applications Security, Aug. neous Cluster Environments” International Parallel and Distributed
౧ᚣܓdԨಂૐணࠇ̙̈˸ίࠇၑልᕏܓ˸ʿ༟ 7-10 Lecture Notes in Computer Science, Vol. 3654, Jajodia, Sushil; Processing Symposium, Cancun, Mexico 2000.
Wijesekera, Duminda (Eds.), pages 114-123, 2005. 13. Tsai JW, Liao BY, Huang CC, Hwang WL, Wang DW, Chiou3, and
ৃ౧ᚣܓගᛆፅԨҬ̻̈ፅᓃٙਕྼ༆Ӕ˙ࣩf 2. Seventeen Chen, Yu-Chuan (Jack) Li, Li (David) Liu, Feipei Lai, Lin CH. (2000) "Applications of optical tweezers and an integrated
Da-Wei Wang Building a Legal and Ethical Taiwan Health Grid for force measurement module for biomedical research", Proc. SPIE
Medical Decision Making HealthGrid 2004, France. 4082:213-221.
104 105