Data and Applications Security Workshop Report Dates : February 19 and 20 , 2009 Prepared by The University of Texas at Dallas Sponsor : The National Science Foundation Under Grant : IIS - 0748433
نویسندگان
چکیده
The Office of the Deputy Assistant Secretary of Defense (Information and Identity Assurance) has stated that “the Department of Defense's (DoD) policy, planning, and war fighting capabilities are heavily dependent on the information technology foundation provided by the Global Information Grid (GIG). However, the GIG was built for business efficiency instead of mission assurance against sophisticated adversaries who have demonstrated intent and proven their ability to use cyberspace as a tool for espionage and criminal theft of data. GIG mission assurance works to ensure the DoD is able to accomplish its critical missions when networks, services, or information are unavailable, degraded, or distrusted.” To meet the needs of mission assurance challenges, President’s cyber plan (CNCI) has listed the area of developing multipronged approaches to supply chain risk management as one of the priorities. CNCI states that the reality of global supply chains presents significant challenges in thwarting counterfeit, or maliciously designed hardware and software products. To overcome such challenges and support successful mission assurance, we need to design flexible and secure systems whose components may be untrusted or faulty. Our objective is to achieve the secure operation of mission critical systems constructed from untrusted, semi-trusted and fully trusted components for successful mission assurance.
منابع مشابه
Big Data – Security with Privacy
This document provides a summary of the discussions on big data security and privacy at the NSF Workshop on this topic held at the University of Texas at Dallas on September 16 and 17, 2014. This document will continue to evolve over the next few months as we get feedback from the workshops participants and the final workshop report will be completed by February 2015. This document also include...
متن کاملTexas Geometry and Topology Conference
This is a report on the presentations at the 47th meeting of the Texas Geometry and Topology Conference at the University of Houston on February 17-19, 2012. This conference was partially supported by National Science Foundation Grant DMS-0904481 and The University of Texas. Speakers reported on recent research. For this report, speakers have provided synopses of their talks together with broad...
متن کاملHardness of k-Vertex-Connected Subgraph Augmentation Problem
Given a k-connected graph G= (V ,E) and V ′ ⊂ V , k-Vertex-Connected Subgraph Augmentation Problem (k-VCSAP) is to find S ⊂ V \ V ′ with minimum cardinality such that the subgraph induced by V ′ ∪ S is k-connected. In this paper, we study the hardness of k-VCSAP in undirect graphs. We first prove k-VCSAP is APX-hard. Then, we improve the lower bound in two ways by relying on different assumptio...
متن کاملMandarin Pronunciation Variation Modeling 1
1 This work was a report for the project “Mandarin pronunciation modeling” supported by the National Science Foundation of USA under Grant No. #IIS-9820687, and carried out in the 2000 Summer Workshop on Language and Speech Processing, Center for Language and Speech Processing, Johns Hopkins University (http://www.clsp.jhu.edu/ws2000/), and a report of its further research. Any opinions, findin...
متن کاملA Branch-and-Cut Algorithm for the Minimum Energy Symmetric Connectivity Problem in Wireless Networks
Xiaodong Hu 09:00-10:00 Optimization Problems in Under Water Sensor Networks Ding-Zhu Du, University of Texas at Dallas, USA Abstract: Under water sensor network is an important research direction in computer science. There are many interesting optimization problems regarding its design, routing and applications. In this talk, I'm going to introduce some new research works done by our research ...
متن کامل