{"60687":{"#nid":"60687","#data":{"type":"event","title":"Fred B. Schneider: Principles and Principals for Authorization","body":[{"value":"\u003Cp\u003E\u003Cstrong\u003EAbstract:\u003C\/strong\u003E Ultimately, authorization should be based on the extent to which the principal making a request is trusted.\u0026nbsp; We will describe a language, logic, and mechanisms used for implementing this approach to authorization as well as some document-management applications. The roles of analytic, axiomatic, and constructive bases for trust will be discussed.\u003Cbr \/\u003E---------------------------------------------------------------------------\u003Cbr \/\u003E\u003Cstrong\u003EBiography:\u003C\/strong\u003E\u003Cbr \/\u003EFred B. Schneider is the Samuel B. Eckert Professor of Computer Science at Cornell, where he has been on the faculty since 1978.\u0026nbsp; He also serves as Chief Scientist for the NSF \u0022TRUST\u0022 Science and Technology Center, and he has been Professor-at-Large at the University of Tromso (Norway) since 1996.\u003Cbr \/\u003E\u003Cbr \/\u003ESchneider\u0027s research concerns trustworthy systems, most recently focusing on computer security.\u0026nbsp; His early work was in formal methods and fault-tolerant distributed systems.\u0026nbsp; He is author of the graduate textbook \u0022On Concurrent Programming\u0022, co-author (with David Gries) of the undergraduate text \u0022A Logical Approach to Discrete Math\u0022, and the editor of \u0022Trust in Cyberspace\u0022 which reports findings from a US National Research Council\u0027s study committee on information systems trustworthiness that Schneider chaired.\u003Cbr \/\u003E\u003Cbr \/\u003EA fellow of the AAAS, ACM, and IEEE, Schneider was awarded a D.Sc. [honoris causa] from the University of Newcastle-upon-Tyne in 2003. His survey paper on state machine replication received a SIGOPS Hall of Fame Award in 2007.\u003Cbr \/\u003E\u003Cbr \/\u003ESchneider is a member of the board for the Computing Research Association and the council of the Computing Community Consortium.\u0026nbsp; He serves on the US congressionally mandated Information Security and Privacy Advisory Board, as well as several other federal advisory\u003Cbr \/\u003Eboards.\u0026nbsp; A frequent consultant to industry, he co-chairs Microsoft\u0027s TCAAB advisory board on trustworthy computing, besides serving on the technical advisory board for Fortify Software.\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EUltimately, authorization should be based on the extent to which the principal making a request is trusted.\u0026nbsp; We will describe a language, logic, and mechanisms used for implementing this approach to authorization as well as some document-management applications. The roles of analytic, axiomatic, and constructive bases for trust will be discussed.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"Principles and Principals for Authorization"}],"uid":"27197","created_gmt":"2010-08-30 12:58:30","changed_gmt":"2016-10-08 01:52:11","author":"Renata Le Dantec","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2010-09-03T10:30:00-04:00","event_time_end":"2010-09-03T11:30:00-04:00","event_time_end_last":"2010-09-03T11:30:00-04:00","gmt_time_start":"2010-09-03 14:30:00","gmt_time_end":"2010-09-03 15:30:00","gmt_time_end_last":"2010-09-03 15:30:00","rrule":null,"timezone":"America\/New_York"},"extras":[],"groups":[{"id":"1299","name":"GVU Center"}],"categories":[],"keywords":[{"id":"1946","name":"GVU"},{"id":"8494","name":"HCI"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1795","name":"Seminar\/Lecture\/Colloquium"}],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}}}