Title: Trustworthy and Secure Information Systems and Computing
1Trustworthy and Secure Information Systems and
Computing
- CITRIS Research Symposium
- London July 12, 2007
Larry Rohrbough Executive Director Team for
Research in Ubiquitous Secure Technology
(TRUST) University of California,
Berkeley 510-643-3032 (Work) 703-328-5221
(Mobile) larryr_at_eecs.berkeley.edu
2Motivation
Computer trustworthiness and security continue to
increase in importance as a pressing scientific,
economic, and social problem
Events reinforce the need for a deeper
understanding of the scientific foundations of
cyber security and critical infrastructure
systems as well as the policy, legal, social, and
economic implications of candidate technologies.
3TRUST STC
National Science Foundation
www.truststc.org
ST that will radically transform the ability of
organizations to design, build, and operate
trustworthy information systems for critical
infrastructure
- Center Approach
- Address fundamental cybersecurity and critical
infrastructure protection problems of national
importance - Tackle Grand Challenge scale integrative
research projects - Expand industry collaboration, research project
sponsorship, and technology transition
- Supporting Personnel
- Undergraduates 4
- Graduates 86
- Post Docs 7
- Research Scientists 4
- Faculty 47
- Staff 8
- TOTAL 156
- Supporting Disciplines
- Computer Engineering
- Computer Science
- Economics
- Electrical Engineering
- Law
- Public Policy
- Social Sciences
Affiliated Institutions
4TRUST STC (cont.)
To achieve TRUST vision and objectives, Center
activities are focused in three tightly
integrated areas
Research
Knowledge Transfer
Education
Interdisciplinary projects that combine
fundamental science with applications to deliver
breakthrough advances in trustworthy systems
Curriculum reform and teaching the next
generation of computer / social scientists and
engineers
Dissemination and transition of Center research
results and collaboration opportunities
Electronic Medical Records
End User Security
Network Defenses
Policy
Computer Security
Speaker Series
SUPERB-IT
Secure Sensor Networks
Trustworthy Systems
5Workshop Overview
- System Attacks
- Attack models and defense mechanisms (Anderson)
- Human/Computer Interaction
- User/system cognitive channel (Giani)
- Human factors (Sasse)
- Infrastructure and Application Security
- Trustworthy systems and computing (Bloomfield)
- Telecommunications (Jones)
- Sensor networks (Sastry)
6Workshop Overview (cont.)
- Format
- Brief talks on security-related research
- In depth discussion during roundtable/QA
- Informal and interactive
- Your feedback is important!
- Schedule
- 200 400 PM Talks (20-25 minutes each)
- 400 430 PM Roundtable/QA
- Follow-Up
- Talks available online (CITRIS website)
- Speaker information available online