Cornell’s Trustworthiness Education Initiative By Fred B. Schneider TRUST TRUST:Team for Research in Ubiquitous Secure Technologies September 13th 2004.

Slides:



Advertisements
Similar presentations
E-Science Data Information and Knowledge Transformation Thoughts on Education and Training for E-Science Based on edikt project experience Dr. Denise Ecklund.
Advertisements

Project Lead the Way An Orientation American High School.
Which Course? Where Does Your City University Degree Lead? Dr. Sebastian Hunt Associate Dean.
1 Undergraduate Curriculum Revision Department of Computer Science February 10, 2010.
Changes in the Curriculum of ETF Belgrade Dragan Bojić University of Belgrade Dragan Bojić University of Belgrade.
CEN Student Focus GroupApril 1, 2011 CEN Program Focus Group TOPICS: –Course Availability. –Course Relevance. –Subjects not Offered. –Course issues. 1/6.
1 i206: Distributed Computing Applications & Infrastructure 2012
NSF DUE Best Practices for Marketing Your Geospatial Program Emphasizing the integration of GIS, Remote Sensing and GPS.
NATIONAL PROJECT ACTIVITIES, EVALUATION , Ankara EUROFACE CONSULTING, CZECH REPUBLIC.
CSCI 3 Introduction to Computer Science. CSCI 3 Course Description: –An overview of the fundamentals of computer science. Topics covered include number.
CS 101 Course Summary December 5, Big Ideas Abstraction Problem solving Fundamentals of programming.
Carnegie Mellon University Computer Science Foundations for Ph.D. Students The Carnegie Mellon Perspective Computer Science Foundations for Ph.D. Students.
CS 10051: Introduction to Computer Science What is the course about?
Welcome and Overview Richard Anderson University of Washington June 30, 20081IUCEE: Welcome and Overview.
The Classroom Presenter Project Richard Anderson University of Washington.
SYNERGIES OF LANGUAGE LEARNING The Second International Conference on Teaching English for Specific Purposes and New Language Learning Technologies Faculty.
Computer Science Graduate Programs at UTSA Dr. Weining Zhang.
Bachelor of Science in Information Technology California State University Channel Islands.
COMPUTER SCIENCE LYNDA THOMAS – SENIOR LECTURER, ACADEMIC ADVISOR.
Presented by Ken Baldauf COMPUTER LITERACY RELEVANT TODAY.
Information Technology
Course ILT Course Code CSN 208 Network Security. Course ILT Course Description This course provides an in-depth study of network security issues, standards,
Graduate Programs in Dept of Computer Science Univ. of Texas at San Antonio Dr. Weining Zhang.
CS 454 Theory of Computation Sonoma State University, Fall 2012 Instructor: B. (Ravi) Ravikumar Office: 116 I Darwin Hall.
Integrating Parallel and Distributed Computing Topics into an Undergraduate CS Curriculum Andrew Danner & Tia Newhall Swarthmore College Third NSF/TCPP.
Proposal for Background Requirements Changes For the current MS/PhD programs, background requirements are expressed in the "Background Preparation Worksheet"
European Virtual Laboratory of Mathematics Daniela Velichová Katedra matematiky, Strojnícka fakulta Slovenská technická univerzita.
Relationships Between Structures “→” ≝ “Can be defined in terms of” Programs Groups Proofs Trees Complex numbers Operators Propositions Graphs Real.
European Virtual Laboratory of Mathematics Daniela Velichová Department of Mathematics Mechanical Engineering Faculty Slovak University of Technology.
CS.UCSB.EDU U. C. S A N T A B A R B A R A C O M P U T E R S C I E N C E I want to be a Computer Scientist Why should I choose UCSB?
The MSR-UR Curriculum Repository Tom Healy Lead Program Manager Microsoft Research University Relations.
Major Disciplines in Computer Science Ken Nguyen Department of Information Technology Clayton State University.
What’s Right with Undergraduate Statistics? Exciting Course Options.
1 Research Centers in Computer Science: A New Way of Doing Science Fred Roberts, DIMACS, Rutgers University.
More Computer Science in your Future? CSE 142 Autumn
Carnegie Mellon University Computer Science Foundations for Ph.D. Students The Carnegie Mellon Perspective Computer Science Foundations for Ph.D. Students.
Implementation of Innovations at FSMN by Miroslav Ćirić & Predrag Krtolica.
Incorporating Parallel & Distributed Computing Across a Liberal Arts Computer Science Curriculum Tia Newhall, Andrew Danner, Kevin Webb Swarthmore College.
Operations Management Who are they: Secretaries; Admin. Assistants; Exec. Assistants; Business Managers; Project Managers; Program Coordinators; Etc.
Computer Engineering Proposed Changes for and beyond.
TRUST September 13, 2004 NSF STC Review TRUST:Team for Research in Ubiquitous Secure Technologies Developing Human Resources Connections to the Critical.
Education and Human Resource development By Ruzena Bajcsy TRUST TRUST:Team for Research in Ubiquitous Secure Technologies September 13th 2004 NSF STC Review.
Who am I? Mikhail I. Gofman Assistant Professor of Computer Science at CSUF since Fall Education: Ph.D. in Computer Science at State University of.
Undergraduate Mathematical Biology Krešimir Josić University of Houston.
CS 2130 Computational Structures (Discrete Mathematics for Computing)
BEng(CompSc) Curriculum Structure & Highlights
Computer Science Courses
MCS Master of Computer Science Program
An Invitation to Computer Science
CS 21a: Intro to Computing I
TRUST:Team for Research in Ubiquitous Secure Technologies
TRUST:Team for Research in Ubiquitous Secure Technologies
TRUST:Team for Research in Ubiquitous Secure Technologies
TRUST:Team for Research in Ubiquitous Secure Technologies
Overview of Computational Science Education Materials
CSCD 330 Network Programming Spring
- Announcement of the side meeting - CEOS Report on data applications
TRUST:Team for Research in Ubiquitous Secure Technologies
TRUST: Security Education Program at Stanford
TRUST:Team for Research in Ubiquitous Secure Technologies
CSCD 330 Network Programming Spring
TRUST:Team for Research in Ubiquitous Secure Technologies
TRUST:Team for Research in Ubiquitous Secure Technologies
Machine Learning Course.
CSCD 330 Network Programming Spring
Course Information and Introductions
Course Information and Introductions
Computer Science Courses in the Major
Proposed Changes for and beyond
Computer Science Dr Hwang Chair, Computer Science Department
Presentation transcript:

Cornell’s Trustworthiness Education Initiative By Fred B. Schneider TRUST TRUST:Team for Research in Ubiquitous Secure Technologies September 13th 2004 NSF STC Review

Teaching Trustworthiness Traditional approach: –Specialized courses (upper class, MEng) Security, cryptography, fault-tolerant computing, … –Topics in Discipline-specific courses Op Sys, Databases, Computer Networks … specialists are well served by this approach. CU faculty [spring/summer 2004]: All computer scientists need to be sensitive to trustworthiness issues / solutions. –No room to add more required courses. –Different disciplines need to see different content. … must educate the whole CS / IS population TRUST September 13th 2004 NSF STC Review 2

Cornell’s Trustworthiness-Education Initiative Don’t add new courses---add relevant content to existing courses. –1-2 lectures worth of content per course –New content need not supplant existing topics: Well-chosen examples / applications could serve a dual role. Side effect: Mainstream trustworthiness courses can assume more of students and add depth/breadth. TRUST September 13th 2004 NSF STC Review 3

Progress on the Agenda Enthusiastic faculty response: –Each faculty member is reviewing course contents and proposing topics to cover. –Ultimately: We will produce notes + other teaching aids. (These will be debugged by TRUST members.) Students are excited about the new thread. Corporate partners are happy too. –Microsoft, NYC Financial Industry, … TRUST September 13th 2004 NSF STC Review 4

New Trustworthiness Content Examples Obvious examples: –quorums to discrete math course –program analysis tools to programming course –cryptography to computational complexity Non-obvious examples: –digital watermarking to graphics course –credit-card fraud detection to machine learning –data structures for big-number computation –canaries to compiler course TRUST September 13th 2004 NSF STC Review 5