Skip to main content

Showing 1–4 of 4 results for author: Bellovin, S M

.
  1. arXiv:2406.10430  [pdf

    cs.CY cs.AI

    Challenging the Machine: Contestability in Government AI Systems

    Authors: Susan Landau, James X. Dempsey, Ece Kamar, Steven M. Bellovin, Robert Pool

    Abstract: In an October 2023 executive order (EO), President Biden issued a detailed but largely aspirational road map for the safe and responsible development and use of artificial intelligence (AI). The challenge for the January 24-25, 2024 workshop was to transform those aspirations regarding one specific but crucial issue -- the ability of individuals to challenge government decisions made about themsel… ▽ More

    Submitted 14 June, 2024; originally announced June 2024.

  2. arXiv:2403.01649  [pdf

    cs.CY cs.AI

    Recommendations for Government Development and Use of Advanced Automated Systems to Make Decisions about Individuals

    Authors: Susan Landau, James X. Dempsey, Ece Kamar, Steven M. Bellovin

    Abstract: Contestability -- the ability to effectively challenge a decision -- is critical to the implementation of fairness. In the context of governmental decision making about individuals, contestability is often constitutionally required as an element of due process; specific procedures may be required by state or federal law relevant to a particular program. In addition, contestability can be a valuabl… ▽ More

    Submitted 3 March, 2024; originally announced March 2024.

    ACM Class: K.4; K.5; I.2

  3. Bugs in our Pockets: The Risks of Client-Side Scanning

    Authors: Hal Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Jon Callas, Whitfield Diffie, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Vanessa Teague, Carmela Troncoso

    Abstract: Our increasing reliance on digital technology for personal, economic, and government affairs has made it essential to secure the communications and devices of private citizens, businesses, and governments. This has led to pervasive use of cryptography across society. Despite its evident advantages, law enforcement and national security agencies have argued that the spread of cryptography has hinde… ▽ More

    Submitted 14 October, 2021; originally announced October 2021.

    Comments: 46 pages, 3 figures

    Journal ref: Journal of Cybersecurity, 10(1), 2024

  4. arXiv:1603.09526  [pdf

    cs.CR

    An IBE-based Signcryption Scheme for Group Key Management

    Authors: Peter Gutmann, Steven M. Bellovin, Matt Blaze, Ronald L. Rivest, Nigel Smart

    Abstract: This paper presents a new crypto scheme whose title promises it to be so boring that no-one will bother reading past the abstract. Because of this, the remainder of the paper is left blank.

    Submitted 31 March, 2016; originally announced March 2016.