Time: 9:50-12:00 pm on Oct. 9, 2013 Location: TBA. Bios of Panelists



Similar documents
From Evolution to Revolution: The Founders and the Headliners of Information Security

Sunil A. Bhave Ph.D. (UC Berkeley, 2004)

present: Assistant Professor, Foster Faculty Fellow Michael G. Foster School of Business, University of Washington

Master of Cyber Security

Curriculum Vitae Summary Employment University of Washington at Bothell Sept 2013 Present BBN Technologies June 2011 May 2013

Keynote 1. Scale and Programmability in Google s Software Defined Data Center WAN. Amin M. Vahdat University of California San Diego

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

MICHAEL ROACH. April 2014

Leveraging Sponsors to Advance Careers

SUNIL DUTTA Curriculum Vitae December, 2013

Helping Individuals Into and Through Retirement with Confidence

Software Engineering and the Systems Approach: A Conversation with Barry Boehm

Technology Everywhere A Campus Agenda for Educating and Managing Workers in the Digital Age

HOW I BUILT A CYBER SECURITY RESEARCH CENTER FROM GROUND ZERO Dr. Bhavani Thuraisingham

John Jay Kenagy, PhD, FHIMSS 817 East Shelby Street Seattle, Washington

in the Rankings U.S. News & World Report

MICHAEL ROACH. July Fuqua School of Business Office: Durham, NC 27705

Cyber Security Research and Education Institute (CSI) The University of Texas at Dallas

UC AND THE NATIONAL RESEARCH COUNCIL RATINGS OF GRADUATE PROGRAMS

PANEL SESSION: INFORMATION SECURITY RESEARCH AND DEVELOPMENT IN ACADEMIA

Center of Transportation & Traffic Safety Studies (CTTSS)at Abu Dhabi University

The Path to Being an Economics Professor: What Difference Does the Graduate School Make? Zhengye Chen. University of Chicago

Herman Aguinis, John F. Mee Chair of Management, Indiana University. Federico Aime, William S. Spears Chair in Business, Oklahoma State University

Xuanming Su. Education. Stanford University, Stanford, CA. (9/1997-6/2004)

David G. Belanger, PhD, Senior Research Fellow, Stevens Institute of Technology, New Jersey, USA Topic: Big Data - The Next Phase Abstract

University of Maryland Cybersecurity Center (MC 2 )

Computer and Network Security in Higher Education

Jamal Abedi, Ph.D. Edward Bosso. Biographical statements for English Language Learners Advisory Committee members

CURRICULUM VITAE Herbert L. Dershem

2015 Annual Conference

Candidate for Chair. Suman Banerjee University of Wisconsin-Madison, Madison, WI, USA BIOGRAPHY

Josie Foehrenbach Brown (803)

Yale Humboldt Consumer Law Lectures and Kosmos-Dialogue

SERVICE TO PROFESSIONAL COMMUNITY. - Registration Chair of the 2017 IEEE Conference on Decision and Control (IEEE CDC 2017)

Welcome to the Webinar A Candid Conversation: The Future of the Health Care CIO. February 25, pm 1pm PST

Special Issue on Advances of Utility and Cloud Computing Technologies and Services

The forum will be open to academics, researchers, and industry professionals from the fast growing ICT sectors in the UAE and the region.

Discover Viterbi: New Programs in Computer Science

in the Rankings U.S. News & World Report

Testimony of Professor Lance J. Hoffman Computer Science Department The George Washington University Washington, D.C. Before the

in the Rankings U.S. News & World Report

U.S. News & World Report

Outline. Who conducts research related to CIIP in the U.S.? Universities. What is Critical Information Infrastructure? Who sponsors this research?

Discover Viterbi: Cyber Security Engineering & Informatics Programs

Realization of Your Dream: Higher Study, Partnership, Collaboration Opportunities

Speaker Biographies. Formal chairman, National Defense Reform Commission

PANEL TITLE: UNIVERSITY APPROACHES TO INFORMATION SECURITY EDUCATION - CHALLENGES, ISSUES, SUCCESSES, AND OPPORTUNITIES

GUIRR UPDATE. Susan Sloan, Director. FDP Meeting * May 11, 2015

Daniel Szpiro. Strayer University 2303 Dulles Station Blvd., Herndon VA,

Panel on Economic Incentives for Medical Device Cybersecurity

COA welcomes our ACCJC visiting team

David S. Lee. FIELDS OF INTEREST Labor Economics, Econometrics, Political Economy, Public Policy

How To Get A Phd In Physics

Research Interests: IT adoption and implementation; human-computer interaction; IT in small business; computer ethics.

Organizing and Managing Information Resources on Your Campus

Workshop Program 23 October 2015

Congratulations to SRCD s 2015 Distinguished Contributions Awards Winners!

US Federal Cyber Security Research Program. NITRD Program

Our activities in the West Coast, past, present, and future.

US Federal Cyber Security Research Program November 15, 2012 New England Advanced Cyber Security Center Workshop Bill Newhouse (NIST)

Curriculum Vitae Alexandria Skoufalos, EdD

Plenary Panel Growth, Innovation and Sustainability

BARBARA S. ILLOWSKY EDUCATION

Assistant Professor, Department of Landscape Architecture and Urban Planning, Texas A&M University, August 2012 present.

Evaluation of Intellectual Property Course Offerings for undergraduate engineering students in the Mid Atlantic Region

IBM s Global University Programs & Regional Economic Development

Autonomous Vehicle Technologies for Passenger and Freight Mobility

Zsolt Katona. Last Update: January, 2015

UCLA in the Rankings. U.S. News & World Report

Call for Papers for Next-Generation Networking and Internet Symposium

Information Assurance Curricula and Certifications

Jeremy Elkins Political Science Department 100E Dalton Hall Bryn Mawr College 101 North Merion Ave. Bryn Mawr, PA (610)

Welcome to the 6 th Workshop on Big Data Benchmarking

Course Syllabus MBA Organizational Behavior Bryan 128

David Maxfield Vice President of Research, VitalSmarts, and lead researcher, The Silent Treatment

MS in Computer Science with specialization in Computer Security. Prof. Clifford Neuman

EDWARD G. LEWIS 556 East Gill Way, Superior, Colorado Tel: ; Fax: ;

WAVERLY W. DING. R.H. SMITH SCHOOL OF BUSINESS UNIVERSITY OF MARYLAND COLLEGE PARK, MD (301)

Dr. A. D. (Dee) Patton. President and Principal Electrical Engineer

Dartmouth s Ph.D. Innovation Program

North Georgia College and State University, Mike Cottrell College (School) of Business

Kurdish Political Studies Program

VICE-PRESIDENT, RESEARCH AND INNOVATION SEARCH COMMITTEE ELECTION ACADEMIC DIRECTORS/CHAIRS One (1) Position Available

Cyber-Physical System Security of the Power Grid

A Model of Undergraduate Computer Networking Education

Discover Viterbi: Computer Science

CHERYL R. RICHARDSON Newark, Delaware

How To Discuss The Importance Of Relevant Research In Supply Chain And Operations Management

CURRICULUM VITAE. Suneel Udpa. B.S., Physics, Bombay University, 1980, graduation with first class.

Zsolt Katona. Last Update: July, 2013

Industry-Driven Master Certificate in

CURRICULUM VITAE FOR PROMOTION AND TENURE 1 NAME. Degree Institution Date Degree Granted

DIANE L. MATARAZA, INC.

Elizabeth K. Weisburger

Sources to Seafood: Mercury Pollution in the Marine Environment Background on Presenting Scientists

Director of Assessment & Educational Effectiveness, Life Chiropractic College West, Hayward, California

MARK A. CHINEN EMPLOYMENT

SMU MEDITERRANEAN. SOUTH MEDITERRANEAN UNIVERSITY First English-Speaking Educational Hub in Tunisia (Since 2002)

ROBERT E. MARGULIES, ESO,

A Ranking of Political Science Programs Based on Publications in Top Academic Journals and Book Presses

Transcription:

Panel: Key Issues in Big Data Panelists: 1) Dr. Roger R. Schell, USC 2) Dr. Amr Awadallah, Cloudera, Inc. 3) Dr. Peter G. Neumann, RSl 4) Dr.Tomoyuki Higuchi 5) Dr. Sylvia Osborn, University of Western Ontario 6) Dr. Justin Zhan, A&T State University 7) Dr. T. Y. Lin, San Jose State University (Chair) Time: 9:50-12:00 pm on Oct. 9, 2013 Location: TBA Bios of Panelists Dr. Roger R. Schell recently joined USC/ISI supporting their Masters of Cyber Security degree program. He is internationally recognized for originating several key modern security design and evaluation techniques, and he holds patents in cryptography, authentication and trusted workstation. For more than decade he has been co-founder and President of Aesec Corporation, a start-up company providing verifiably secure platforms. Previously Dr. Schell was co-founder and vice president for Gemini Computers, Inc., where he directed development of their highly secure (what NSA called Class A1 ) commercial product, the Gemini Multiprocessing Secure Operating System (GEMSOS). He was also the founding Deputy Director of NSA s National Computer Security Center. He has been referred to as the "father" of the Trusted Computer System Evaluation Criteria (the "Orange Book"). Dr. Schell is a retired USAF Colonel. He received a Ph.D. in Computer Science from the MIT, an M.S.E.E. from Washington State, and a B.S.E.E. from Montana State. The NIST and NSA have recognized Dr. Schell with the National Computer System Security Award. In 2012 he was inducted into the inaugural class of the National Cyber Security Hall of Fame.

Dr. Amr Awadallah is the CTO/Cofounder, Cloudera, Inc. Before co-founding Cloudera in 2008, Amr (@awadallah) was an Entrepreneur-in-Residence at Accel Partners. Prior to joining Accel he served as Vice President of Product Intelligence Engineering at Yahoo!, and ran one of the very first organizations to use Hadoop for data analysis and business intelligence. Amr joined Yahoo after they acquired his first startup, VivaSmart, in July of 2000. Amr holds a Bachelor s and Master s degrees in Electrical Engineering from Cairo University, Egypt, and a Doctorate in Electrical Engineering from Stanford University. Peter G. Neumann (Neumann@CSL.sri.com) has doctorates from Harvard and Darmstadt. After 10 years at Bell Labs in Murray Hill, New Jersey, in the 1960s, during which he was heavily involved in the Multics development jointly with MIT and Honeywell, he has been in SRI's Computer Science Lab since September 1971 -- where he is a Senior Principal Scientist. He is concerned with computer systems and networks, trustworthiness/dependability, high assurance, security, reliability, survivability, safety, and many risks-related issues such as election-system integrity, crypto applications and policies, health care, social implications, and human needs -- especially those including privacy. He is currently PI on two DARPA projects: clean-slate trustworthy hosts for the CRASH program with new

hardware and new software, and clean-slate networking for the Mission-oriented Resilient Clouds program. He moderates the ACM Risks Forum (http://www.risks.org), has been reponsible for CACM's Inside Risks columns monthly from 1990 to 2007, tri-annually since then, chairs the ACM Committee on Computers and Public Policy, and has chaired the National Committee for Voting Integrity (http://www.votingintegrity.org) -- which is about to be disbanded in lieu of many other efforts. He created ACM SIGSOFT's Software Engineering Notes in 1976, was its editor for 19 years, and still contributes the RISKS section. He is on the editorial board of IEEE Security and Privacy. He has participated in four studies for the National Academies of Science: Multilevel Data Management Security (1982), Computers at Risk (1991), Cryptography's Role in Securing the Information Society (1996), and Improving Cybersecurity for the 21st Century: Rationalizing the Agenda (2007). His 1995 book, Computer-Related Risks, is still timely. He is a Fellow of the ACM, IEEE, and AAAS, and is also an SRI Fellow. He received the National Computer System Security Award in 2002, the ACM SIGSAC Outstanding Contributions Award in 2005, and the Computing Research Association Distinguished Service Award in 2013. In 2012, he was elected to the newly created National Cybersecurity Hall of Fame as one of the first set of inductees. He is a member of the U.S. Government Accountability Office Executive Council on Information Management and Technology, and vestigially the California Office of Privacy Protection advisory council (although that group has been dormant due to the CA budget crunch). He co-founded People For Internet Responsibility (PFIR, http://www.pfir.org). He has taught courses at Darmstadt, Stanford, U.C. Berkeley, and the University of Maryland. See his website (http://www.csl.sri.com/neumann) for testimonies for the U.S. Senate and House and California state Senate and Legislature, papers, bibliography, further background, etc. See also the Illustrative Risks annotated index of earlier risks incidents, which is more or less up-to-date regarding items relating to election integrity.

Tomoyuki Higuchi is Director-General of The Institute of Statistical Mathematics (ISM) and an Executive director of the Research Organization of Information and Systems (ROIS) from April 2011. He completed his Ph.D. in Geophysics, Faculty of Science at University of Tokyo in 1989. Since joining at ISM in 1989, he has taken the part to development of the statistical modeling study consistently based on the actual problem, and is making an outstanding achievement in the applied research of the Bayesian modeling, in particular, sequential data assimilation. He is a member of the International Statistical Institute (ISI) and the American Geophysical Union (AGU). Sylvia Osborn received her PhD in Computer Science from the University of Waterloo. Since 1977, she has been a faculty member in the Computer Science Department at the University of Western Ontario in London, Ontario, Canada. She is the author of numerous research papers, starting in the database field in dependency theory, and object-oriented databases. More recently she has been active in research into role-based access control including comparison of access control models, administration of access control, delegation. Recently, she has been focusing on the integration of privacy issues with access control, and how the consideration of privacy of individuals' data does or does not differ from access control. Dr. Justin Zhan is the director of ILAB, which is an Interdisciplinary Research Institute at North Carolina A&T State University. He is a faculty member at Department of Computer Science, College of Engineering, North Carolina A&T State University. He has previously been a faculty member at Carnegie Mellon University and National Center for the Protection of Financial Infrastructure in South Dakota State. His research interests include Big Data, Information Assurance, Social Computing, and Health Science. He is a steering chair of IEEE International Conference on Social Computing (SocialCom) and IEEE International Conference on

Privacy, Security, Risk and Trust (PASSAT). He is currently an editor-in-chief of International Journal of Privacy, Security and Integrity, International Journal of Social Computing and Cyber-Physical Systems, and managing editor of SCIENCE journal. He has served as a conference general chair, a program chair, a publicity chair, a workshop chair, or a program committee member for 200 international conferences and an editor-in-chief, an editor, an associate editor, a guest editor, an editorial advisory board member, or an editorial board member for 30 journals. In recent years, he has published extensively in peer-reviewed journals and conferences. His research has been funded by NSF, DoD, NIH, NSA, etc. Tsau Young (T.Y.) Lin received his PhD in Mathematics from Yale University. He is a Professor of Computer Science at San Jose State University and a fellow in Berkeley Initiative in Soft Computing, University of California. He is the President of International Granular Computing Society and the Founding President of International Rough Set Society. He is one of E-i-C of International Journal of Granular Computing, Rough Sets and Intelligent Systems. He has served on various roles in reputable international journals and conferences. His interests include data/text/web mining, data security and granular/rough/soft computing. He received the best contribution awards from ICDM01 and International Rough Set Society (2005), best service award from IEEE/WIC/ACM WI-IAT2007and a pioneer award from GrC 2008.