• kth.se
  • Student web
  • Intranet
  • kth.se
  • Student web
  • Intranet
Login
DD2496/FDD3344HT211
Write a draft of the report
Skip to content
Dashboard
  • Login
  • Dashboard
  • Calendar
  • Inbox
  • History
  • Help
Close
  • Min översikt
  • DD2496/FDD3344HT211
  • Assignments
  • Write a draft of the report
  • Home
  • Syllabus
  • Modules
  • Assignments
  • Course Evaluation

Write a draft of the report

  • Due 27 Sep 2021 by 18:00
  • Points 0
  • Submitting a file upload
  • File types pdf

This is a draft version and you will get a chance to revise it after feedback and hand in a final report at the end of the period. The closer you make this to what could be considered a final report already here, the better it will serve as the basis for review and thus the more useful the feedback you get will be. Though this is a mandatory assignment, the quality of your submission does not influence your grade.

Format: pdf, ACM style (link), double column.

Length of final report 6-8 pages, including abstract. No length requirement now.

Structure: title, abstract, introduction, <main sections according to you>, conclusion, bibliography

Content: Introduction to your topic in more depth than the presentation. Include a bibliography with references to all sources used; most of them should be scientific publications.  Audience: computer scientists somewhat familiar with privacy-enhancing technologies.

Investigate your topic in both general terms and one specific instantiation. Address the following questions, wherever applicable, either by including the relevant information in the text such that the reader can answer them themselves or by stating and answering the questions explicitly.

Overall
- What is the problem the technology tries to solve?
- Why is it a problem, i.e., what was missing from previous solutions or what made it difficult?
- Why is this important, i.e., what can be done now that the technology exists that couldn't be done before, why does this matter?
- What is the approach, i.e., how does it work?
- Does it work? Based on what?

What are the assumptions about
- the system
- the users, their goals and capabilities
- the potential adversaries, their goals and capabilities

What are the choices made with respect to
- method (e.g., crypto, adding noise)
- implementation (e.g., open source, proprietary, none/conceptual)
- architecture (e.g., cloud and browser)
- data at rest (how and where is it stored)
- data in transit (what is sent and how)
- trade-offs (e.g., privacy vs. utility, cost vs. security)

Discussion
Within the context of the course, evaluate the technology and discuss your findings from the previous sections. Do you see anything problematic, anything well done, what could or should be done differently according to you?

1632758400 09/27/2021 06:00pm
Please include a description
Additional comments:
Rating max score to > Pts
Please include a rating title

Rubric

Find rubric
Please include a title
Find a rubric
Title
You've already rated students with this rubric. Any major changes could affect their assessment results.
 
 
 
 
 
 
 
     
Can't change a rubric once you've started using it.  
Title
Criteria Ratings Pts
This criterion is linked to a learning outcome Description of criterion
threshold: 5 pts
Edit criterion description Delete criterion row
5 to >0 Pts Full marks blank
0 to >0 Pts No marks blank_2
This area will be used by the assessor to leave comments related to this criterion.
pts
  / 5 pts
--
Additional comments
This criterion is linked to a learning outcome Description of criterion
threshold: 5 pts
Edit criterion description Delete criterion row
5 to >0 Pts Full marks blank
0 to >0 Pts No marks blank_2
This area will be used by the assessor to leave comments related to this criterion.
pts
  / 5 pts
--
Additional comments
Total points: 5 out of 5