event
Cyber Trust Working Group
Primary tabs
Join the Trust Working Group of the Institute for Information Security & Privacy (IISP) for a discussion about advancements and considerations in this research facet of cybersecurity, hosted by Margaret Loper, associate director of trust for the IISP.
Trust is the belief in the competence of a machine or sensor to act dependably, securely and reliably within a specified context. In Machine-to-Machine (M2M) systems, trust is commonly accomplished using cryptography, digital signatures, and electronic certificates. This approach establishes and evaluates a trust chain between devices, but it does not tell us enough about the quality of information being exchanged among machines. There is more to consider...
Meeting Agenda
10:00-10:15 Introductions
10:15-10:30 IISP Welcome (Wenke Lee, co-executive director, IISP)
10:30-12:00 Short Talks
- Protection & Defense from an Intelligent, Adaptive Adversary (Chip White ISyE)
- Trust in Hardware Security (Vincent Mooney, ECE)
- Side-channels as a New Way to Build Trust (Alenka Zajic ECE)
- Trust Quantification and CPS Network Design (Yan Wang, ME)
- Critical Infrastructures and Their Well Being (Sy Goodman, INTA)
- Trust, Technology and Community Engagement (Eric Corbett, CoC)
12:00-12:30 Lunch
12:30-1:00 Overview of Sandia National Laboratories’ Trust initiative: PRESTIGE (Brandon Eames & Cindy Longenbaugh)
1:00-2:00 Discussion
- Other GT trust activities
- One-day trust symposium (including external participants)
- 2019 Georgia Tech Cyber Security Summit - should there be a trust theme?
RSVP by Monday, April 2 to be included in the complimentary lunch.
Status
- Workflow Status:Published
- Created By:Tara La Bouff
- Created:03/20/2018
- Modified By:Tara La Bouff
- Modified:03/30/2018
Categories
Keywords
Target Audience