Click for next page ( 270


The National Academies | 500 Fifth St. N.W. | Washington, D.C. 20001
Copyright © National Academy of Sciences. All rights reserved.
Terms of Use and Privacy Statement



Below are the first 10 and last 10 pages of uncorrected machine-read text (when available) of this chapter, followed by the top 30 algorithmically extracted key phrases from the chapter as a whole.
Intended to provide our own search engines and external engines with highly rich, chapter-representative searchable text on the opening pages of each chapter. Because it is UNCORRECTED material, please consider the following text as a useful but insufficient proxy for the authoritative book pages.

Do not use for reproduction, copying, pasting, or reading; exclusively for search engines.

OCR for page 269
CWorkshop Participants and Agendas WORKSHOP 1: NETWORKED INFRASTRUCTURE Workshop 1 Participants Wendell Bailey, National Cable Television Association Michael Baum, VeriSign Inc. Steven M. Bellovin, AT&T Labs Research Barbara Blaustein, National Science Foundation Earl Boebert, Sandia National Laboratories Martha Branstad, Computer Security Researcher and Entrepreneur Blaine Burnham, National Security Agency William E. Burr, National Institute of Standards and Technology David Carrel, Cisco Systems Inc. I. Randall Catoe, Cable and Wireless Stephen N. Cohn, BBN Corporation Stephen D. Crocker, Steve Crocker Associates Dale Drew, MCI Telecommunications Inc. Mary Dunham, Directorate of Science and Technology, Central Intelligence Agency Roch Guerin, IBM T.r. Watson Research Center Michael W. Harvey, Bell Atlantic Chrisan Herrod, Defense Information Systems Agency G. Mack Hicks, Bank of America Stephen R. Katz, Citibank, N.A. 269

OCR for page 269
270 APPENDIX C Charlie Kaufman, Iris Associates Inc. Stephen T. Kent, BEN Corporation Alan J. Kirby, Raptor Systems Inc. John Klensin, MCI Communications Corporation John C. Knight, University of Virginia Gary M. Koob, Defense Advanced Research Projects Agency Steven McGeady, Intel Corporation Douglas I. McGowan, Hewlett-Packard Company Robert V. Meushaw, National Security Agency Ruth R. Nelson, Information System Security Michael D. O'Dell, UUNET Technologies Inc. Hilarie Orman, Defense Advanced Research Projects Agency Radia Perlman, Novell Corporation Frank Perry, Defense Information Systems Agency Elaine Reed, MCI Telecommunications Inc. Robert Rosenthal, Defense Advanced Research Projects Agency Margaret Scarborough, National Automated Clearing House Association Richard C. Schaeffer, National Security Agency Richard M. Schell, Netscape Communications Corporation Allan M. Schiffman, SPYRUS Fred B. Schneider, Cornell University Henning Schulzrinne, Columbia University Basil Scott, Directorate of Science and Technology, Central Intelligence Agency Mark E. Segal, Bell Communications Research George A. Spix, Microsoft Corporation Doug Tygar, University of California at Berkeley Abel Weinrib, Intel Corporation Rick Wilder, MCI Telecommunications Inc. John T. Wroclawski, Massachusetts Institute of Technology Workshop 1 Agenda Monday, October 28, 1996 7:30 a.m. Continental breakfast 8:00 Welcome and Overview (Stephen Crockery What is trust? What is complexity? What are your problems composing networked infrastructure? 8:15 Session 1 (George Spix and Steven McGeady)

OCR for page 269
APPENDIX C 8:45 9:45 10:00 11:00 12:30 p.m. Lunch 271 How are we doing? Is the NII trustworthy we know it? . . and how do Tell us a story: What failed and how was it fixed? What do you believe is today's most critical problem? What is your outlook for its resolution? What is tomorrow's most critical problem? What are you doing to prepare for it? What is your highest priority for 5 to 10 years out? Is complexity a problem and why? Is interdependence a problem and why? Overview Panelists Earl Boebert, Sandia National Laboratories Dale Drew, MCI Telecommunications Inc. Panel 1 Suppliers and Toolmakers (George Spix and Steven McGeady) Panelists David Carrel, Cisco Systems Inc. Alan Kirby, Raptor Systems Inc. Douglas McGowan, Hewlett-Packard Company Radia Perlman, Novell Corporation Break Panel 2 Delivery Vehicles (George Spix and Steven McGeady) Panelists Wendell Bailey, National Cable Television Association Michael Harvey, Bell Atlantic Michael O'Dell, UUNET Technologies Inc. Panel 3 Customers (George Spix and Steven McGeady) Panelists Chrisan Herrod, Defense Information Systems Agency Mack Hicks, Bank of America Stephen Katz, Citibank Margaret Scarborough, National Automated Clearing House Association 1:30 p.m. Session 2 (Steven Bellovin) Given increasing complexity, why should we expect these interconnected (telco, cableco, wireless, satellite, other) net works and supporting systems to work?

OCR for page 269
272 2:30 2:45 4:00 4:15 APPENDIX C How do these systems interoperate today in different businesses and organizations? How will they interoperate tomorrow how is the tech- nology changing, relative to context? Do they have to interoperate or can they exist as separate domains up to and into the customer premise? Panelists (plus Session 1 participants) Elaine Reed, MCI Telecommunications Inc. Frank Perry, Defense Information Systems Agency Break Session 3 (Allen Schiffman) What indications do we have that quality of service dif- ferentiated by cost is a workable solution? What is the intersection of QOS and trustworthiness? What are the key technical elements? How are QOS targets met today across networks and technologies? What are the trustworthiness trade-offs of multitier, multiprice QOS compared to best-effort? Panelists Roch Guerin, IBM T.r. Watson Research Center Henning Schulzrinne, Columbia University Abel Weinrib, Intel Corporation Rick Wilder, MCI Telecommunications Inc. John Wroclawski, Massachusetts Institute of Technology Break Session 4 (Stephen Kent) The role of public-key infrastructures in establishing trust: tackling the technical elements. How is "success" defined in the physical world? What are your current challenges (technical, business, so- cial)? How can national-scale PKIs be achieved? What technol- ogy is needed to service efficiently users who may number from several hundred thousand to tens of millions? What is your outlook? What are the hard problems? What topics should go on federal or industrial research agendas? If multiple, domain-specific PKIs emerge, will integra- tion or other issues call for new technology?

OCR for page 269
APPENDIX C 5:30 Reception and dinner Tuesday, October 29, 1996 273 Panelists Michael Baum, VeriSign Inc. William Burr, National Institute of Standards and Technology Stephen Cohn, BBN Corporation 7:30 a.m. Continental breakfast 8:00 Recap of Day One (George Spix) 8:45 Session 5 (Steven McGeady) What is the current status of software trustworthiness and how does the increasing complexity of software affect this issue? Tell us a story: What failed and how was it fixed? What do you believe is today's most critical problem? How will it be resolved? What is tomorrow's most critical problem? What are you doing to prepare for it? What happens when prophylaxis fails? How do you com pare problem detection, response, and recovery alternatives? How can we implement safety and reliability as compo . nents of trust, along with security and survivability? Is distribution of system elements and control an oppor- tunity or a curse? What are the key technical challenges for making distributed software systems more trustworthy? When will all human-to-human communication be medi- ated by an (end-user programmable or programmable-in-ef- fect) computer? Do we care, from the perspective of promot- ing trustworthy software? Should this influence research investments? Panelists John Klensin, MCI Telecommunications Inc. Richard Schell, Netscape Communications Corporation Mark Segal, Bell Communications Research 10:00 10:30 11:30 Break Continue discussion, Session 5 Hard problems in terms of time frame, cost, and cer- tainty of result

OCR for page 269
274 12:00 APPENDIX C Summary of definitions trustworthiness, complexity, compositional problems What are our grand challenges? Discussion, revision; feedback from federal government observers Adjourn WORKSHOP 2: END-SYSTEMS INFRASTRUCTURE Workshop 2 Participants Martin Abadi, Systems Research Center, Digital Equipment Corporation Steven M. Bellovin, AT&T Labs Research Malt Blaze, AT&T Research W. Earl Boebert, Sandia National Laboratories Martha Branstad, Computer Security Researcher and Entrepreneur Ricky W. Butler, NASA Langley Research Center Shiu-Kai Chin, Syracuse University Dan Craigen, Odyssey Research Associates (Canada) Stephen D. Crocker, Steve Crocker Associates Kevin R. Driscoll, Honeywell Technology Center Cynthia Dwork, IBM Almaden Research Center Edward W. Felten, Princeton University Li Gong, JavaSoft Inc. Constance Heitmeyer, U.S. Naval Research Laboratory Charlie Kaufman, Iris Associates Inc. Stephen T. Kent, BBN Corporation Rohit Khare, World Wide Web Consortium John C. Knight, University of Virginia Paul Kocher, Cryptography Consultant Robert Kurshan, Bell Laboratories Inc. Peter Lee, Carnegie Mellon University Karl N. Levitt, University of California at Davis Steven Lucco, Microsoft Corporation Teresa Lunt, SRI International Leo Marcus, Aerospace Corporation John McHugh, Portland State University John McLean, U.S. Naval Research Laboratory Steven McGeady, Intel Corporation Dejan Milojicic, The Open Group Research Institute I Strother Moore, University of Texas at Austin Ruth R. Nelson, Information System Security

OCR for page 269
APPENDIX C 275 Clifford Neuman, Information Sciences Institute, University of Southern California Elaine Palmer, IBM T.r. Watson Research Center David L. Presotto, Bell Laboratories Inc. Joseph Reagle, rr., World Wide Web Consortium Robert Rosenthal, Defense Advanced Research Projects Agency John Rushby, SRI International Allan M. Schiffman, SPYRUS Fred B. Schneider, Cornell University Margo Seltzer, Harvard University George A. Spix, Microsoft Corporation Mark Stefik, Xerox Palo Alto Research Center Vipin Swarup, MITRE Corporation Doug Tygar, University of California at Berkeley Bennet S. Yee, University of California at San Diego Workshop 2 Agenda Wednesday, February 5, 1997 7:30 a.m. Continental breakfast available in the Refectory 8:30 Welcome and Overview (Fred Schneider) 8:45 Panel 1 (Douglas Tygar) Mobile Code: Java Malt Blaze, AT&T Research Edward W. Felten, Princeton University Li Gong, ravaSoft Inc. David L. Presotto, Bell Laboratories Inc. 10:15 Break 10:30 Panel 2 (Douglas Tygar) Mobile Code: Alternative Approaches Peter Lee, Carnegie Mellon University Steven Lucco, Microsoft Corporation Dejan Milojicic, The Open Group Research Institute Margo Seltzer, Harvard University Vipin Swarup, MITRE Corporation 12:00 p.m. Lunch in refectory Panel 3 (Allen Schiffman) Rights Management, Copy Detection, Access Control Cynthia Dwork, IBM Almaden Research Center 1:00

OCR for page 269
276 2:45 4:15 4:30 5:30 APPENDIX C Rohit Khare (accompanied by Joseph Reagle, Jr.), World Wide Web Consortium Clifford Neuman, USC/Information Sciences Institute Mark Stefik, Xerox Palo Alto Research Center Break Panel 4 (Stephen Crocker) Tamper Resistant Devices Paul Kocher, Cryptography Consultant Elaine Palmer, IBM T.r. Watson Research Center Bennet S. Yee, University of California at San Diego Break Continue discussion Reception and Dinner Thursday, February 6, 1997 7:30 a.m. Continental breakfast 8:30 Introductory Remarks (Fred B. Schneider) 8:45 Panel 5 (Fred B. Schneider) Formal Methods: State of the Technology Constance L. Heitmeyer, U.S. Naval Research Laboratory Robert Kurshan, Bell Laboratories Inc. I Strother Moore, Computational Logic Inc. and University of Texas at Austin John Rushby, SRI International 10:15 10:30 Break Panel 6 (John Knight) Formal Methods: State of the Practice Ricky W. Butler, NASA Langley Research Center Dan Craigen, Odyssey Research Associates (Canada) Kevin R. Driscoll, Honeywell Technology Center Leo Marcus, Aerospace Corporation 12:00 p.m. Lunch in the Refectory 1:00 Panel 7 (Martha Branstad) Formal Methods and Security Martin Abadi, Digital Equipment Corporation, Systems Research Center Shiu-Kai Chin, Syracuse University

OCR for page 269
APPENDIX C 2:30 3:00 Karl N. Levitt, University of California at Davis John McHugh, Portland State University John McLean, U.S. Naval Research Laboratory Concluding discussion Adjourn WORKSHOP 3: OPEN SYSTEMS ISSUES Workshop 3 Participants Steven M. Bellovin, AT&T Labs Research Earl Boebert, Sandia National Laboratories Dick Brackney, National Security Agency Martha Branstad, Computer Security Researcher and Entrepreneur Blaine Burnham, National Security Agency Thomas Buss, Federal Express Corporation Stephen D. Crocker, Steve Crocker Associates Michael Diaz, Motorola Bruce Fette, Motorola William Flanagan, Perot Systems Corporation Stephanie Forrest, University of New Mexico Brenda S. Garman, Motorola fang Jeon, Liberty Financial Charlie Kaufman, Iris Associates Inc. Stephen T. Kent, BBN Corporation John C. Knight, University of Virginia Jimmy Kuo, McAfee Associates Inc. Steven B. Lipner, Mitretek Systems Steven McGeady, Intel Corporation John Francis Mergen, BBN Corporation Robert V. Meushaw, National Security Agency Ruth R. Nelson, Information System Security Allan M. Schiffman, SPYRUS Fred B. Schneider, Cornell University George A. Spix, Microsoft Corporation Doug Tygar, University of California at Berkeley Workshop 3 Agenda Monday, September 29, 1997 7:30 a.m. 277 Continental breakfast

OCR for page 269
278 8:30 8:45 10:45 11:00 12:00 1:00 2:00 2:15 4:45 5:00 APPENDIX C Welcome and Overview (Fred Schneider and Stephen Crockery Session 1 Large-Scale Open Transactional Systems Panelists Thomas Buss, Federal Express Corporation fang Jeon, Liberty Financial Break Session 2 Antivirus Technology Trends Panelist Jimmy Kuo, McAfee Associates Inc. Lunch Session 3 Intrusion Detection: Approaches and Trends Panelists John Francis Mergen, BEN Corporation Stephanie Forrest, University of New Mexico Break Session 4 Costing Trustworthiness: Process and Practice as Levers Panelist Michael Diaz, Motorola Plenary Discussion All participants and committee Closing Remarks Committee caucus Discussion and dinner with Steven Lipner