<node id="60741">
  <nid>60741</nid>
  <type>event</type>
  <uid>
    <user id="27174"><![CDATA[27174]]></user>
  </uid>
  <created>1283272338</created>
  <changed>1475891535</changed>
  <title><![CDATA[GTISC Seminar: Fred Schneider]]></title>
  <body><![CDATA[<p><strong>Title:</strong> &nbsp;Principles and Principals for Authorization</p><p><strong>Speaker:</strong> &nbsp;Fred B. Schneider</p><p><strong>Date:</strong> 9/3/2010</p><p><strong>Time: </strong>9:30am</p><p><strong>Location:</strong> TSRB Auditorium</p><p>&nbsp;</p><h5>Abstract</h5><p>Ultimately, authorization should be based on the extent to which the principal making a request is trusted. &nbsp;We will describe a language, logic, and mechanisms used for implementing this approach to authorization as well as some document-management applications. The roles of analytic, axiomatic, and constructive bases for trust will be discussed.<br />
<br /></p><h5>
Biography</h5><p>Fred B. Schneider is the Samuel B. Eckert Professor of Computer Science at Cornell, where he has been on the faculty since 1978. &nbsp;He also serves as Chief Scientist for the NSF "TRUST" Science and Technology Center, and he has been Professor-at-Large at the University of Tromso (Norway) since 1996.</p><p>Schneider's research concerns trustworthy systems, most recently focusing on computer security. &nbsp;His early work was in formal methods and fault-tolerant distributed systems. &nbsp;He is author of the graduate textbook "On Concurrent Programming", co-author (with David Gries) of<br />
the undergraduate text "A Logical Approach to Discrete Math", and the editor of "Trust in Cyberspace" which reports findings from a US National Research Council's study committee on information systems trustworthiness that Schneider chaired.<br />
<br />
A fellow of the AAAS, ACM, and IEEE, Schneider was awarded a D.Sc. [honoris causa] from the University of Newcastle-upon-Tyne in 2003. His survey paper on state machine replication received a SIGOPS Hall of Fame Award in 2007.<br />
<br />
Schneider is a member of the board for the Computing Research Association and the council of the Computing Community Consortium. &nbsp;He serves on the US congressionally mandated Information Security and Privacy Advisory Board, as well as several other federal advisory boards. &nbsp;A frequent consultant to industry, he co-chairs Microsoft's TCAAB advisory board on trustworthy computing, besides serving on the technical advisory board for Fortify Software.</p>]]></body>
  <field_summary_sentence>
    <item>
      <value><![CDATA["Principles and Principals for Authorization"]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_summary>
  <field_time>
    <item>
      <value><![CDATA[2010-09-03T10:30:00-04:00]]></value>
      <value2><![CDATA[2010-09-03T11:30:00-04:00]]></value2>
      <rrule><![CDATA[]]></rrule>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_time>
  <field_fee>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_fee>
  <field_extras>
      </field_extras>
  <field_audience>
      </field_audience>
  <field_media>
      </field_media>
  <field_contact>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_contact>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_phone>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_phone>
  <field_url>
    <item>
      <url><![CDATA[]]></url>
      <title><![CDATA[]]></title>
            <attributes><![CDATA[]]></attributes>
    </item>
  </field_url>
  <field_email>
    <item>
      <email><![CDATA[]]></email>
    </item>
  </field_email>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>1217</item>
          <item>1220</item>
          <item>47223</item>
          <item>50875</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[Digital Lounge - Digital Life]]></item>
          <item><![CDATA[Digital Lounge]]></item>
          <item><![CDATA[College of Computing]]></item>
          <item><![CDATA[School of Computer Science]]></item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>1795</tid>
        <value><![CDATA[Seminar/Lecture/Colloquium]]></value>
      </item>
      </field_categories>
  <field_keywords>
          <item>
        <tid>2678</tid>
        <value><![CDATA[information security]]></value>
      </item>
      </field_keywords>
  <field_userdata><![CDATA[]]></field_userdata>
</node>
