TRUST:Team for Research in Ubiquitous Secure Technologies

Slides:



Advertisements
Similar presentations
The NeTS Program Dr. Joseph B. Evans Program Director Computer and Network Systems Computer & Information Science & Engineering National Science Foundation.
Advertisements

1 US activities and strategy :NSF Ron Perrott. 2 TeraGrid An instrument that delivers high-end IT resources/services –a computational facility – over.
DIScovery SciEnce through Computational Thinking (DISSECT) Enrico Pontelli.
Presentation at WebEx Meeting June 15,  Context  Challenge  Anticipated Outcomes  Framework  Timeline & Guidance  Comment and Questions.
CERN Summary Ian Bird eInfrastructure Workshop 9 December, 2003.
EInfrastructures (Internet and Grids) US Resource Centers Perspective: implementation and execution challenges Alan Blatecky Executive Director SDSC.
1 Software & Grid Middleware for Tier 2 Centers Rob Gardner Indiana University DOE/NSF Review of U.S. ATLAS and CMS Computing Projects Brookhaven National.
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
Is 'Designing' Cyberinfrastructure - or, Even, Defining It - Possible? Peter A. Freeman National Science Foundation January 29, 2007 The views expressed.
2011 SIGnetwork Regional Meetings Guidance in Structuring a Communities of Practice.
Delivering an Architecture for the Social Enterprise Alpesh Doshi, Fintricity Information Age Social&Mobile Business Conference Tuesday 31st January 2012.
TRUST September 13 th 2004NSF STC Site Visit TRUST :Team for Research in Ubiquitous Secure Technologies Shankar Sastry (Berkeley), Mike Reiter (CMU), Steve.
IST 2006 – 22/11/2006 Aljosa Pasic Atos Origin Security, Dependability and Trust in Service Infrastructures.
IST programme Cultural Heritage in Tomorrow ’s Knowledge Society FUTURE PLANS FP6 Cultural Heritage in Tomorrow ’s Knowledge Society FUTURE PLANS FP6 RRRESE.
DOE 2000, March 8, 1999 The IT 2 Initiative and NSF Stephen Elbert program director NSF/CISE/ACIR/PACI.
Introduction Infrastructure for pervasive computing has many challenges: 1)pervasive computing is a large aspect which includes hardware side (mobile phones,portable.
Geosciences - Observations (Bob Wilhelmson) The geosciences in NSF’s world consists of atmospheric science, ocean science, and earth science Many of the.
SEEK Welcome Malcolm Atkinson Director 12 th May 2004.
Authors: Ronnie Julio Cole David
8 July 2005MM Sprinkle UC Berkeley TRUST :Team for Research in Ubiquitous Secure Technologies An Overview Shankar Sastry (Berkeley), Ruzena Bajcsy (Berkeley),
TRUST : Team for Research in Ubiquitous Secure Technology National Science Foundation Site Visit February 24-26, 2009 │Berkeley, California Health Infrastructures.
“A Library outranks any other one thing a community can do to benefit its people.” --Andrew Carnegie.
Cornell’s Trustworthiness Education Initiative By Fred B. Schneider TRUST TRUST:Team for Research in Ubiquitous Secure Technologies September 13th 2004.
CIRES-CDC Institutional Partnership Western Water Assessment Review Randall M. Dole, Director Climate Diagnostics Center September 2001.
ARL Workshop on New Collaborative Relationships: The Role of Academic Libraries in the Digital Data Universe September 26-27, 2006 ARL Prue.
Lim Sei cK.  Team ◦ A group whose members work intensely with each other to achieve a specific, common goal or objective. ◦ All teams are groups.
Education and Human Resource development By Ruzena Bajcsy TRUST TRUST:Team for Research in Ubiquitous Secure Technologies September 13th 2004 NSF STC Review.
Mohssen Mohammed Sakib Pathan Building Customer Trust in Cloud Computing with an ICT-Enabled Global Regulatory Body Mohssen Mohammed Sakib Pathan.
Announcing the 2014 National Digital Stewardship Agenda.
Channeling Change: Making Collective Impact Work
EGI towards H2020 Feedback (from survey)
eContentplus 2008 Work Programme
Intellectual Merit & Broader Impact Statements August 2016
NSF INCLUDES “NSF should implement a bold new initiative, focused on broadening participation of underrepresented groups in STEM, similar in concept.
OUTCOME BASED EDUCATION
Crisis management related research at
Collaboration and Partnership Building
Research Methods Dr. X.
Chapter 10 Understanding Work Teams
TRUST Area 3 Overview: Privacy, Usability, & Social Impact
Ian Bird GDB Meeting CERN 9 September 2003
Building the foundations for innovation
FET Plans FET - Proactive 1.
BRIDGING DIVIDES: towards digital dividends for all
Cognitus: A Science Case for HPC in the Nordic Region
TRUST:Team for Research in Ubiquitous Secure Technologies
TRUST:Team for Research in Ubiquitous Secure Technologies
TRUST:Team for Research in Ubiquitous Secure Technologies
Workshop: Food, Energy and Water Nexus in Sustainable Cities Beijing October 20-21, 2015 Nada Marie Anid, Ph.D. Dean, School of Engineering and Computing.
TRUST: Security Education Program at Stanford
TRUST:Team for Research in Ubiquitous Secure Technologies
TRUST:Team for Research in Ubiquitous Secure Technologies
Intellectual Merit & Broader Impact Statements August 2018
Families, Workplaces and Communities
Unidata Policy Committee Meeting
TRUST:Team for Research in Ubiquitous Secure Technologies
Presentation for information days Units involved:
TRUST:Team for Research in Ubiquitous Secure Technologies
Families, Workplaces and Communities
RMAPI Town Hall Meeting
Networking of Embedded Systems
Introduction to the PRISM Framework
Brian Matthews STFC EOSCpilot Brian Matthews STFC
Intellectual Merit & Broader Impact Statements August 2017
Standard for Teachers’ Professional Development July 2016
Internet of Things (IoT) for Industrial Development and Automation
The Use and Impact of FTA
BCoN Data Integration Workshop, University of Kansas, Feb 13-14, 2018
Intellectual Merit & Broader Impact Statements August 2019
Community Mobilization: Garnering public support for your housing plan
Presentation transcript:

TRUST:Team for Research in Ubiquitous Secure Technologies Responses to Issues Raised by Past Reviewers John Mitchell (Stanford) NSF STC Review September 6, 2004

Summary (Excerpted from reviews) Goal Develop science and technology to enable organizations to design, build, and operate trustworthy information systems for the U.S. critical infrastructure Team Multidisciplinary group of very well-known and active researchers with expertise in computer security, software technology, analysis of complex interacting systems, and economic and public policy NSF STC Review December 4, 2018

Concerns One is that most of the researchers in the proposed center are not directly involved in mainstream research of computer security although they have been doing related research. This could be a minus but could also be advantageous as these strong researchers may bring fresh ideas and new approaches to solving security problems of large scale. Another concern is whether the group of senior researchers could really collaborate closely as a large team as there is not much past record of collaboration among some of the researchers or subgroups. Related to that is the question how the testbeds will be used effectively for integrative activities among the partners. NSF STC Review December 4, 2018

Outline Research focus Management structure Integrative testbeds Computer security does not exist in a vacuum, but involves endowing specific kinds of systems with security properties Management structure Supports goals of the project Integrative testbeds Role in structure of the project NSF STC Review December 4, 2018

Testbeds Social Science Security Science System Science NSF STC Review December 4, 2018

Integrative Testbeds Network Security PlanetLab Testbed (DETER) Specific systems that represent social needs and translate into technical challenges Networked Power Grid Embedded Systems Testbed Testbed Research Challenges Software Complex Inter Dependency mod. - Economics, Security Public Policy Research areas which will provide solutions in the context of the testbeds Trusted Secure Network Platforms Embedded Sys. Forensic and Privacy Applied Model - based Cryptography Integration Network Secure Info. Mgt. HCI and Security Software Tools Security NSF STC Review December 4, 2018

Research expertise Core security experts Birman, Boneh, Joseph, Mitchell, Perrig, Reiter, Robinson, Schneider, Song, Tygar, Wagner Computer systems and wireless networking Bajcsy, Culler, Wicker, Sirer, Lee, Manohar, Raghavan, Sztipanovits Software engineering and principles Aiken, Garcia-Molina, Henzinger, Karsai, Necula, Schmidt, Wing Social scientists Mc Fadden, Samuelson, Varian, Weber NSF STC Review December 4, 2018

Management Questions (from reviews) Can this group of this size, institutional diversity and seniority be integrated and managed? The management structure is not yet complete (with some key roles not filled). There is no succession plan for the leadership of the center. The management plan is rather brief without mentioning how resource allocation and project termination will be done. There are almost 40 senior researchers involved in this proposed effort, most are involved in other (admittedly related) significant research projects. While they propose a reasonable hierarchical management structure, … the question is whether the whole will be greater than the sum of the parts NSF STC Review December 4, 2018

Management Organization Security Technology Teams Schneider (coordinator) Systems Science Teams Schmidt (coordinator) Social Science Teams Samuelson (coordinator) Complex Interdependency Modeling and Analysis Anantharam (lead) Economics, Public Policy and Societal Challenges Varian (lead) Software Security Mitchell (lead) Trusted Platforms Rosenblum (lead) Secure Network Embedded Systems Wicker (lead) Digital Forensics and Privacy Tygar (lead) Applied Cryptographic Protocols Wagner (lead) Model-based Integration of Trusted Components Sztipanovits (lead) Human Computer Interfaces and Security Garcia-Molina (lead) Network Security Joseph (lead) Secure Information Management Software Birman (lead) NSF STC Review December 4, 2018

Evaluation of Results As the technical areas covered by this proposal are extremely broad, it is crucial to devise an effective plan or strategy to evaluate the research results in terms of the performances of the integrated testbeds. However, the proposal does not address this issue. The proposal provides a list of deliverables, which is a plus, but the deliverables do not show clear connections to the development of the proposed integrative testbeds. In general, the proposal raises good questions concerning existing approaches and systems, but does not elaborate sufficiently how the new technologies and systems proposed to be developed will be more effective. NSF STC Review December 4, 2018

Mod-based Integration Secure Inf Mgmt Tools Econ Pub Policy Security Technology Systems Science Social Science Software Security Trusted Platforms Applied Crypto. Network Security Modeling Analysis Net EmbedSys Model-based Integration Secure InfMgtSoftware Tools Dig Forensics Privacy HumComp Interfaces, Power Grid √ Netwk/Embd Sys PlanetLab DETER Software Security Trusted Platforms Applied Cryptography Network Security CI Modeling Analysis Secure Net Embed Sys Mod-based Integration Secure Inf Mgmt Tools Econ Pub Policy Forensics, Privacy Hum-Comp Interfaces NSF STC Review December 4, 2018

Conclusion Diverse team Integrative testbeds Management structure Bring security, software, social science together to solve fundamental problems Integrative testbeds Motivate research, facilitate collaboration Management structure Matrix of interlocking responsibilities Works well so far! NSF STC Review December 4, 2018

From reviews The TRUST team will address very important research issues underlying critical infrastructure security problems and ubiquitous computing. Given their current track record, there is every reason to believe that the outcomes of this research will contribute substantially to scientific knowledge and will have direct impact on important societal issues. NSF STC Review December 4, 2018