Page 116 - untitled
P. 116

ˮɽމ

 Wang, Da-Wei  ਿ ͉ ༟ ࣘ  Research Description
 ਿ
 ͉
                   Research Description
 ࣘ
 ༟
                    My research interest is in the theoretical foun-  tem CellSecu to safe guard personal privacy.  The
 ᔖcc၈j ਓ޼Ӻࡰ
               dation of computer science and in applying fun-  system will check if datasets to be released leak too
 Associate Research Fellow (2000--)
               damental tools to various areas. To understand the   much personal information. We discovered appro-
 ௰৷ኪዝj Ph.D., Computer Science, Yale   structure of the objects to be manipulated computa-  priate logic model for the problem and quantified
 University (1992)  tionally, to classify the resources needed for various   the privacy leakage with information theory and
               computational problems and to find more efficient   economic models. Secure Multiparty Protocol  can
 ཥcc༑j+886-2-2788-3799 ext. 1729
               algorithms interest me the most. In the application   be applied to tackle the problem that some impor-
 ෂccॆj+886-2-2782-4814  area, I am interested in information privacy, security   tant information can be computed while the data   Research Fellows
               and medical informatics.  Lately, I have also been   owners do not have to reveal their data. Although
 ཥɿڦᇌjwdw@iis.sinica.edu.tw  involved in information privacy protection mecha-  there are beautiful theoretical solutions, they are not

 ၣccࠫjhttp://www.iis.sinica.edu.tw/pages/wdw  nism design and the development of privacy regu-  suitable for problems involving large dataset. We
               lations in medical research. The goal is to clarify   try to quantify the information leakage in this set-
               the privacy protection problem and to design and   ting with an information theoretical framework, so
               construct a practical protection mechanism so that   that tradeoff between the computational resources
 •  Associate Research Fellow, Institute of Information   information can be shared efficiently and personal   needed and the level of privacy protection achieved
                                                                                                                  Research Fellows
 Science, Academia Sinica (2000-    )  privacy can be protected at the same time.  Over   becomes possible.
               the pass few years, we developed a prototype sys-
 •  Assistant Research Fellow, Institute of Information
 Science, Academia Sinica (1993-2000)
                   Selected Publications
 •  Ph.D., Computer Science, Yale Univeristy (1992),  ޼Ӻᔊʧ  Selected Publications
 ޼Ӻᔊʧ
 •  M.S., CSIE, National Taiwan University (1987),  Journal Publicatons:  3.  Da-Wei Wang, Churn-Jung Liau, Tsan-sheng Hsu and Jeremy K.-P.
 Ңٙ޼Ӻጳሳމࠇၑዚ߅ኪٙଣሞਿᓾ˸ʿν                                             Chen, “On The Damage and Compensation of Privacy Leakage”,
 •  B.S., CSIE, National Taiwan University (1985),  1.  Da-Wei Wang, Churn-Jung Liau, Tsan-sheng Hsu, Jeremy K.-P Chen   Proc. 18th Annual IFIP WG 11.3 Working Conference on Data and
 Оਗ਼ਿᓾٙଣሞʈՈᏐ͜ίʔΝٙჯਹʕfə༆ࠇ  “Value versus damage of information release: A data privacy perspec-
                 tive,”  International Journal of Approximate Reasoning. To appear.  Applications Security , pages 311--324, 2004.
 ၑ࿁൥ٙഐ࿴dʱᗳࠇၑਪᕚהცٙ༟๕˸ʿరҬ  2.  Cho-Chin Lin, Da-Wei Wang and Tsan-Sheng Hsu, “Bounds on the   4.  Cho-Chin Lin, Tsan-sheng Hsu and Da-Wei Wang, “Bounds on the
                 Client-server Incremental Computing,” IEICE Transactions on Funda-  Client-Server Incremental     Computing”, Proc. 7th International
 һҞ஺Ϟࣖٙစၑ˙ج݊ҢٙጳሳהίdϾίᏐ͜  mentals of Electronics, Communications and Computer Sciences, To   Symposium on Parallel Architectures, Algorithms, and     Networks (I-
                 appear                                           SPAN), pages 86-91, 2004.

 ௅ʱҢ࿁༟ৃᒯӷၾτΌ˸ʿᔼᐕ༟ৃܘϞጳሳd  3.  Ean-wen Huang Da-Wei Wang, and Der-Ming Liou “Development of   5.  P. Liu, Da-Wei Wang, and Jan-Jan Wu, Efficient parallel I/O schedul-
                 A Deterministic XML Schema By Resolving Structure Ambiguity of   ing in the presence of data duplication, International Conference on
 ڐԸΪމ࿁༟ৃᒯӷٙ޼Ӻdɰਞၾə༟ৃᒯӷڭ  HL7 Messages” Computer Mehods and Programs In Biomedicine Vol.   Parallel Processing (ICPP),  Oct. 2003.
                 80, pages 1-15, 2005.                          6.  Jan-Jan Wu, Da-Wei Wang, and Y.-F. Lin, Placement of I/O servers to
 ᚐዚՓၾ஝ᇍٙ޼Ӻdрɢٙͦᅺ݊Ҏૐঐਪᕚᔾ  4.  Tsan-sheng Hsu, Kuo-Hui Tsai, Da-Wei Wang and D.T. Lee, “Two   improve parallel I/O performance on switch-based clusters, Interna-
                 Variations of the Minimum Steiner Problem,” Journal of Combinato-  7.  tional Conference on Supercomputing, San Francisco, June, 2003.
 ૶˲ணࠇၾܔ࿴ྼٙ͜ዚՓԸԴ੻༟ৃٙݴஷһϞ  rial Optimization, vol. 9, no. 1, pages 101-120, 2005.  P. Liu, Da-Wei Wang, and Yi-heng Guo, An Approximation Algorithm
               5.  Da-Wei Wang, Churn-Jung Liau and Tsan-sheng Hsu, “Medical Priva-  for Broadcast Scheduling in Heterogeneous Environments, The 9th
 ࣖଟۍɦΝࣛঐڭღࡈɛٙᒯӷfڐՇϋdҢࡁ೯  cy Protection Based on     Granular Computing,” Artifi cial Intelligence   International Conference on Real-Time Computing Systems and Ap-
                 in Medicine (AIM),  vol. 32, no. 2, pages 137-149, 2004   plications (RTCSA 2003), Taiwan
 ࢝əɓࡈᕑҖӻ୕CellSecu̙˸ί༟ࣘࢫΫෂ༟ࣘ  6.  Y.-c. Chiang, T.-s. Hsu, S. Kuo, and D.-W. Wang.  “Preserving confi -  8.  Y.-T. Chiang, Y.-c. Chiang, T.-s. Hsu, C.-J. Liau, and D.-W. Wang.
                 dentiality when sharing medical database with the Cellsecu system”     How much privacy? -- a system to safe guard personal privacy while
 ഗԴ͜٫ʘۃdᏨݟΫෂʘ༟ࣘණ݊щރᚣཀεٙ  International Journal of Medical Informatics, volume 71, pages 17-23,   releasing databases.  In James J. Alpigini, James F. Peters, Andrzej
                 2003                                             Skowron, and Ning Zhong, editors, Lecture Notes in Artifi cal Intelli-
 ࡈɛᒯӷfҢࡁ౤̈əቇ຅ٙᜌ፨ᅼόdԨ˸༟ৃ  7.  Kuo-Hui Tsai, Da-Wei Wang, Frank Hwang “Lower bounds for wide-  gence/ Subseries of LNCS 2475: Proceedings of the 3rd International
                 sense nonblocking Clos network.” Theoretical Computer Science vol.   Conference on Rough Sets and Current Trends in Computing, pages
 ଣሞʿ຾᏶ᅼόԸඎʷᒯӷ౧ᚣʘ೻ܓfε˙ӷ੗  261 pages 323-328, 2001                  226-233, New York, NY, 2002. Springer-Verlag.
               8.  XiaoYun Lu, Da-Wei Wang, C.K. Wong, “Rooted Spanning Trees in   9.  Tsan-sheng Hsu, Churn-Jung Liau, Da-Wei Wang and Jeremy K.-P.
 ࠇၑ€Secure Multiparty Protocold̙ආɓӉ༆Ӕ  Tournaments”, Graphs and Combinatorics vol. 16, pages 411-427   Chen, “Quantifying Privacy Leakage Through Answering Database
                 January 2000                                     Queries”, Proc. 5th Information Security Conference (ISC), Springer-
 ஢εცࠅл͜ӷ੗༟ࣘࠇၑ̈ࠠࠅഐ؈dШΝࣛʔ  9.  Xiao Yun Lu, Da-Wei Wang, C.K. Wong, “On the Bounded Domina-  Verlag LNCS# 2433, pages 162--175, 2002.
                 tion Number of Tournaments”, Discrete Mathematics, vol 220, pages   10.  Tsan-sheng Hsu, Churn-Jung Liau and Da-Wei Wang, “A Logical
 Κʿ༟ࣘʘᒯӷ׌dᒱ್ίଣሞɪவԬࡈਪᕚʊϞ  257-261 2000                             Model for Privacy     Protection”, Proc. 4th Information Security Con-
                                                                  ference (ISC), Springer-Verlag LNCS#     2200, pages 110--124, 2001.
 ஢εٙϓ؈dШࠅٜટˏ͜ଣሞഐ؈dՑ̶ඎ༟ࣘ  Refereed Conference Publications       11.  Yu-Cheng Chiang, Tsan-Sheng Hsu, Sun Kuo, Da-Wei Wang  “Pre-
                                                                  serving confidentiality      when sharing medical database--the Cellse-

               1.  Yi-Ting Chiang, Da-Wei Wang, Churn-Jung Liau and Tsan-sheng Hsu,   cu system”, APAMI-MIC 27-30 Sep. 2000 HongKong.
 ٙྼਕᏐ͜ᒔϞɓݬ൷ᕎfҢࡁ޼ӺνОඎʷ༟ৃ  “Secrecy of Two-Party Secure Computation”, Proc. 19th Annual IFIP   12.  PangFeng Liu, Da-Wei Wang “Reduction Optimization in Heteroge-
                 WG 11.3 Working Conference on Data and Applications Security, Aug.   neous Cluster Environments” International Parallel and Distributed
 ౧ᚣ೻ܓdԨಂૐணࠇ̙̈˸ίࠇၑልᕏܓ˸ʿ༟  7-10 Lecture Notes in Computer Science, Vol. 3654, Jajodia, Sushil;   Processing Symposium, Cancun, Mexico 2000.
                 Wijesekera, Duminda (Eds.), pages 114-123, 2005.  13.  Tsai JW, Liao BY, Huang CC, Hwang WL, Wang DW, Chiou3, and
 ৃ౧ᚣ೻ܓගᛆፅԨҬ̻̈ፅᓃٙਕྼ༆Ӕ˙ࣩf  2.  Seventeen Chen, Yu-Chuan (Jack) Li, Li (David) Liu, Feipei Lai,   Lin CH. (2000) "Applications of optical tweezers and an integrated
                 Da-Wei Wang Building a Legal and Ethical Taiwan Health Grid for   force measurement module for biomedical research", Proc. SPIE
                 Medical Decision Making HealthGrid 2004, France.  4082:213-221.



 104                                                                                                             105
   111   112   113   114   115   116   117   118   119   120   121