Fred B. Schneider: Principles and Principals for Authorization

*********************************
There is now a CONTENT FREEZE for Mercury while we switch to a new platform. It began on Friday, March 10 at 6pm and will end on Wednesday, March 15 at noon. No new content can be created during this time, but all material in the system as of the beginning of the freeze will be migrated to the new platform, including users and groups. Functionally the new site is identical to the old one. webteam@gatech.edu
*********************************

Event Details
Contact
No contact information submitted.
Summaries

Summary Sentence: Principles and Principals for Authorization

Full Summary: Ultimately, authorization should be based on the extent to which the principal making a request is trusted.  We will describe a language, logic, and mechanisms used for implementing this approach to authorization as well as some document-management applications. The roles of analytic, axiomatic, and constructive bases for trust will be discussed.

Abstract: Ultimately, authorization should be based on the extent to which the principal making a request is trusted.  We will describe a language, logic, and mechanisms used for implementing this approach to authorization as well as some document-management applications. The roles of analytic, axiomatic, and constructive bases for trust will be discussed.
---------------------------------------------------------------------------
Biography:
Fred B. Schneider is the Samuel B. Eckert Professor of Computer Science at Cornell, where he has been on the faculty since 1978.  He also serves as Chief Scientist for the NSF "TRUST" Science and Technology Center, and he has been Professor-at-Large at the University of Tromso (Norway) since 1996.

Schneider's research concerns trustworthy systems, most recently focusing on computer security.  His early work was in formal methods and fault-tolerant distributed systems.  He is author of the graduate textbook "On Concurrent Programming", co-author (with David Gries) of the undergraduate text "A Logical Approach to Discrete Math", and the editor of "Trust in Cyberspace" which reports findings from a US National Research Council's study committee on information systems trustworthiness that Schneider chaired.

A fellow of the AAAS, ACM, and IEEE, Schneider was awarded a D.Sc. [honoris causa] from the University of Newcastle-upon-Tyne in 2003. His survey paper on state machine replication received a SIGOPS Hall of Fame Award in 2007.

Schneider is a member of the board for the Computing Research Association and the council of the Computing Community Consortium.  He serves on the US congressionally mandated Information Security and Privacy Advisory Board, as well as several other federal advisory
boards.  A frequent consultant to industry, he co-chairs Microsoft's TCAAB advisory board on trustworthy computing, besides serving on the technical advisory board for Fortify Software.

Additional Information

In Campus Calendar
No
Groups

GVU Center

Invited Audience
No audiences were selected.
Categories
Seminar/Lecture/Colloquium
Keywords
GVU, HCI
Status
  • Created By: Renata Le Dantec
  • Workflow Status: Published
  • Created On: Aug 30, 2010 - 8:58am
  • Last Updated: Oct 7, 2016 - 9:52pm