event

Cyber Trust Working Group

Primary tabs

Join the Trust Working Group of the Institute for Information Security & Privacy (IISP) for a discussion about advancements and considerations in this research facet of cybersecurity, hosted by Margaret Loper, associate director of trust for the IISP.

Trust is the belief in the competence of a machine or sensor to act dependably, securely and reliably within a specified context. In Machine-to-Machine (M2M) systems, trust is commonly accomplished using cryptography, digital signatures, and electronic certificates. This approach establishes and evaluates a trust chain between devices, but it does not tell us enough about the quality of information being exchanged among machines. There is more to consider...

 

Meeting Agenda

10:00-10:15     Introductions


10:15-10:30     IISP Welcome (Wenke Lee, co-executive director, IISP)


10:30-12:00     Short Talks

  • Protection & Defense from an Intelligent, Adaptive Adversary (Chip White ISyE)
  • Trust in Hardware Security (Vincent Mooney, ECE)
  • Side-channels as a New Way to Build Trust (Alenka Zajic ECE)
  • Trust Quantification and CPS Network Design (Yan Wang, ME)
  • Critical Infrastructures and Their Well Being (Sy Goodman, INTA)
  • Trust, Technology and Community Engagement (Eric Corbett, CoC)

 

12:00-12:30     Lunch
 

12:30-1:00       Overview of Sandia National Laboratories’ Trust initiative: PRESTIGE (Brandon Eames & Cindy Longenbaugh)
 

1:00-2:00         Discussion

  • Other GT trust activities
  • One-day trust symposium (including external participants)
  • 2019 Georgia Tech Cyber Security Summit - should there be a trust theme?

 

RSVP by Monday, April 2 to be included in the complimentary lunch.

Status

  • Workflow Status:Published
  • Created By:Tara La Bouff
  • Created:03/20/2018
  • Modified By:Tara La Bouff
  • Modified:03/30/2018

Categories