Trustworthy and Secure Information Systems and Computing - PowerPoint PPT Presentation

1 / 6
About This Presentation
Title:

Trustworthy and Secure Information Systems and Computing

Description:

... as the policy, legal, social, and economic implications of candidate ... Sciences ... Center activities are focused in three tightly integrated areas... – PowerPoint PPT presentation

Number of Views:54
Avg rating:3.0/5.0
Slides: 7
Provided by: larry285
Category:

less

Transcript and Presenter's Notes

Title: Trustworthy and Secure Information Systems and Computing


1
Trustworthy and Secure Information Systems and
Computing
  • CITRIS Research Symposium
  • London July 12, 2007

Larry Rohrbough Executive Director Team for
Research in Ubiquitous Secure Technology
(TRUST) University of California,
Berkeley 510-643-3032 (Work) 703-328-5221
(Mobile) larryr_at_eecs.berkeley.edu
2
Motivation
Computer trustworthiness and security continue to
increase in importance as a pressing scientific,
economic, and social problem
Events reinforce the need for a deeper
understanding of the scientific foundations of
cyber security and critical infrastructure
systems as well as the policy, legal, social, and
economic implications of candidate technologies.
3
TRUST STC
National Science Foundation
www.truststc.org
ST that will radically transform the ability of
organizations to design, build, and operate
trustworthy information systems for critical
infrastructure
  • Center Approach
  • Address fundamental cybersecurity and critical
    infrastructure protection problems of national
    importance
  • Tackle Grand Challenge scale integrative
    research projects
  • Expand industry collaboration, research project
    sponsorship, and technology transition
  • Supporting Personnel
  • Undergraduates 4
  • Graduates 86
  • Post Docs 7
  • Research Scientists 4
  • Faculty 47
  • Staff 8
  • TOTAL 156
  • Supporting Disciplines
  • Computer Engineering
  • Computer Science
  • Economics
  • Electrical Engineering
  • Law
  • Public Policy
  • Social Sciences

Affiliated Institutions
4
TRUST STC (cont.)
To achieve TRUST vision and objectives, Center
activities are focused in three tightly
integrated areas
Research
Knowledge Transfer
Education
Interdisciplinary projects that combine
fundamental science with applications to deliver
breakthrough advances in trustworthy systems
Curriculum reform and teaching the next
generation of computer / social scientists and
engineers
Dissemination and transition of Center research
results and collaboration opportunities
Electronic Medical Records
End User Security
Network Defenses
Policy
Computer Security
Speaker Series
SUPERB-IT
Secure Sensor Networks
Trustworthy Systems
5
Workshop Overview
  • System Attacks
  • Attack models and defense mechanisms (Anderson)
  • Human/Computer Interaction
  • User/system cognitive channel (Giani)
  • Human factors (Sasse)
  • Infrastructure and Application Security
  • Trustworthy systems and computing (Bloomfield)
  • Telecommunications (Jones)
  • Sensor networks (Sastry)

6
Workshop Overview (cont.)
  • Format
  • Brief talks on security-related research
  • In depth discussion during roundtable/QA
  • Informal and interactive
  • Your feedback is important!
  • Schedule
  • 200 400 PM Talks (20-25 minutes each)
  • 400 430 PM Roundtable/QA
  • Follow-Up
  • Talks available online (CITRIS website)
  • Speaker information available online
Write a Comment
User Comments (0)
About PowerShow.com