{"563901":{"#nid":"563901","#data":{"type":"event","title":"Turing Award Winner Visits Georgia Tech","body":[{"value":"\u003Ch3\u003EThe Institute for Information Security \u0026amp; Privacy hosts Turing Award winner Butler Lampson for the Capital One Fall \u002716 Distinguished Lecture.\u003C\/h3\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EButler Lampson is a renowned computer scientist and the 1992 Turing Award winner for pioneering contributions that laid much of the foundation for today\u2019s local area networks, client-server systems, laser printers, and WYSIWYG editors, such as Microsoft Word. He is a Technical Fellow at Microsoft Corporation and an Adjunct Professor of Computer Science and Electrical Engineering at MIT, actively working on security, privacy, and fault-tolerance, and kibitzing in systems, networking, and other areas.\u003C\/p\u003E\u003Cp\u003ELampson was part of the faculty at University of California Berkeley, at the Computer Science Laboratory at Xerox PARC, and subsequently at Digital\u2019s Systems Research Center before joining Microsoft. He has worked on computer architecture, local area networks, raster printers, page description languages, operating systems, remote procedure call, programming languages and their semantics, programming in the large, fault-tolerant computing, transaction processing, computer security, editors, and tablet computers.\u0026nbsp; He was one of the designers of the SDS 940 time-sharing system, the Alto personal distributed computing system, the Xerox 9700 laser printer, two-phase commit protocols, the Autonet LAN, the SDSI\/SPKI system for network security, the Microsoft Tablet PC software, the Microsoft Palladium high-assurance stack, and several programming languages.\u003C\/p\u003E\u003Cp\u003EHe received an AB from Harvard University, a Ph.D. in EECS from the University of California at Berkeley, and honorary ScD\u2019s from the Eidgen\u00f6ssische Technische Hochschule, Zurich and the University of Bologna.\u0026nbsp; He holds a number of patents on networks, security, raster printing, and transaction processing.\u0026nbsp; He is a member of the National Academy of Sciences and the National Academy of Engineering and a Fellow of the Association for Computing Machinery (ACM) and the American Academy of Arts and Sciences. He received the ACM Software Systems Award in 1984 for his work on the Alto, the IEEE Computer Pioneer award in 1996, the National Computer Systems Security Award in 1998, the IEEE von Neumann Medal in 2001, the Turing Award in 1992, and the National Academy of Engineering\u2019s Draper Prize in 2004.\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cbr \/\u003E\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EABSTRACT\u003C\/strong\u003E\u003C\/p\u003E\u003Ch5\u003E\u003Cstrong\u003E\u003Cem\u003E\u0022Retroactive Security\u0022\u003C\/em\u003E\u003Cbr \/\u003E\u003C\/strong\u003E\u003C\/h5\u003E\u003Cp\u003EIt\u2019s time to change the way we think about computer security: instead of trying to prevent security breaches, we should focus on dealing with them after they happen. Today computer security depends on access control, and it\u2019s been a failure. Real world security, by contrast, is mainly retroactive: the reason burglars don\u2019t break into my house is that they are afraid of going to jail, and the financial system is secure mainly because almost any transaction can be undone.\u003C\/p\u003E\u003Cp\u003EThere are many ways to make security retroactive:\u003C\/p\u003E\u003Cul\u003E\u003Cli\u003ETrack down and punish offenders.\u003C\/li\u003E\u003Cli\u003ESelectively undo data corruption caused by malware.\u003C\/li\u003E\u003Cli\u003ERequire applications and online services to respect people\u2019s ownership of their personal data.\u003C\/li\u003E\u003C\/ul\u003E\u003Cp\u003EAccess control is still needed, but it can be much more coarse-grained, and therefore both more reliable and less intrusive. Authentication and auditing are the most important features. Retroactive security will not be perfect, but perfect security is not to be had, and it will be much better than what we have now.\u003Cbr \/\u003E\u003Cbr \/\u003E\u003C\/p\u003E\u003Ch4\u003E\u003Ca href=\u0022http:\/\/www.iisp.gatech.edu\/capital-one-fall-16-distinguished-lecture\u0022 target=\u0022_blank\u0022\u003ERSVP\u003C\/a\u003E for this event, which features an hors d\u0027oeuvres reception with Dr. Lampson.\u003C\/h4\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EThe Institute for Information Security \u0026amp; Privacy hosts Turing Award winner Butler Lampson for the Capital One Fall \u002716 Distinguished Lecture.\u0026nbsp;\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"Turing Award winner Butler Lampson visits Georgia Tech for the Capital One Fall \u002716 Distinguished Lecture."}],"uid":"27490","created_gmt":"2016-08-16 21:32:17","changed_gmt":"2017-04-13 21:15:05","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2016-09-27T17:30:00-04:00","event_time_end":"2016-09-27T19:00:00-04:00","event_time_end_last":"2016-09-27T19:00:00-04:00","gmt_time_start":"2016-09-27 21:30:00","gmt_time_end":"2016-09-27 23:00:00","gmt_time_end_last":"2016-09-27 23:00:00","rrule":null,"timezone":"America\/New_York"},"extras":[],"hg_media":{"564661":{"id":"564661","type":"image","title":"Butler Lampson","body":null,"created":"1471461240","gmt_created":"2016-08-17 19:14:00","changed":"1475895369","gmt_changed":"2016-10-08 02:56:09","alt":"Butler Lampson","file":{"fid":"218293","name":"bwl2011_web.jpg","image_path":"\/sites\/default\/files\/images\/bwl2011_web.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/images\/bwl2011_web.jpg","mime":"image\/jpeg","size":302468,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/bwl2011_web.jpg?itok=cKqWG6vG"}},"451391":{"id":"451391","type":"image","title":"IISP logo","body":null,"created":"1449256280","gmt_created":"2015-12-04 19:11:20","changed":"1475895192","gmt_changed":"2016-10-08 02:53:12","alt":"IISP logo","file":{"fid":"203339","name":"instituteforinformationsecurityprivacy-outline-black874.jpg","image_path":"\/sites\/default\/files\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg","mime":"image\/jpeg","size":88082,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg?itok=WFxLCVBe"}}},"media_ids":["564661","451391"],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50875","name":"School of Computer Science"},{"id":"50876","name":"School of Interactive Computing"},{"id":"50877","name":"School of Computational Science and Engineering"},{"id":"69599","name":"IPaT"},{"id":"322011","name":"College of Computing Events"},{"id":"430601","name":"Institute for Information Security and Privacy"}],"categories":[],"keywords":[{"id":"1404","name":"Cybersecurity"},{"id":"5699","name":"Turing Award"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1795","name":"Seminar\/Lecture\/Colloquium"}],"invited_audience":[{"id":"78751","name":"Undergraduate students"},{"id":"78761","name":"Faculty\/Staff"},{"id":"78771","name":"Public"},{"id":"174045","name":"Graduate students"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003ETara La Bouff, \u003Ca href=\u0022mailto:tara.labouff@iisp.gatech.edu\u0022\u003Etara.labouff@iisp.gatech.edu\u003C\/a\u003E, 404.769.5408\u003C\/p\u003E","format":"limited_html"}],"email":[],"slides":[],"orientation":[],"userdata":""}}}