Assumption Buster Workshop: Trust Anchors Are Invulnerable, 10627-10628 [2011-4272]

Download as PDF Federal Register / Vol. 76, No. 38 / Friday, February 25, 2011 / Notices srobinson on DSKHWCL6B1PROD with NOTICES generalized to the population of study. This feedback will provide insights into customer or stakeholder perceptions, experiences and expectations, provide an early warning of issues with service, or focus attention on areas where communication, training or changes in operations might improve delivery of products or services. These collections will allow for ongoing, collaborative and actionable communications between the Agency and its customers and stakeholders. It will also allow feedback to contribute directly to the improvement of program management. Feedback collected under this generic clearance will provide useful information, but it will not yield data that can be generalized to the overall population. This type of generic clearance for qualitative information will not be used for quantitative information collections that are designed to yield reliably actionable results, such as monitoring trends over time or documenting program performance. Such data uses require more rigorous designs that address: The target population to which generalizations will be made, the sampling frame, the sample design (including stratification and clustering), the precision requirements or power calculations that justify the proposed sample size, the expected response rate, methods for assessing potential nonresponse bias, the protocols for data collection, and any testing procedures that were or will be undertaken prior fielding the study. Depending on the degree of influence the results are likely to have, such collections may still be eligible for submission for other generic mechanisms that are designed to yield quantitative results. The Agency received no comments in response to the 60-day notice published in the Federal Register of December 22, 2010 (75 FR 80542). Below we provide the National Science Foundation’s projected average estimates for the next three years:1 Current Actions: New collection of information. Type of Review: New collection. Affected Public: Individuals and households, businesses and 1 The 60-day notice included the following estimate of the aggregate burden hours for this generic clearance Federal-wide: Average Expected Annual Number of activities: 25,000. Average number of Respondents per Activity: 200. Annual responses: 5,000,000. Frequency of Response: Once per request. Average minutes per response: 30. Burden hours: 2,500,000. VerDate Mar<15>2010 16:39 Feb 24, 2011 Jkt 223001 organizations, State, Local or Tribal Government. Average Expected Annual Number of Activities: 10. Respondents: 500 per activity. Annual Responses: 5,000. Frequency of Response: Once per request. Average Minutes per Response: 30. Burden hours: 2,500. An agency may not conduct or sponsor, and a person is not required to respond to, a collection of information unless it displays a currently valid Office of Management and Budget control number. Dated: February 22, 2011. Suzanne H. Plimpton, Reports Clearance Officer, National Science Foundation. [FR Doc. 2011–4274 Filed 2–24–11; 8:45 am] BILLING CODE 7555–01–P NATIONAL SCIENCE FOUNDATION Assumption Buster Workshop: Trust Anchors Are Invulnerable The National Coordination Office (NCO) for the Networking and Information Technology Research and Development (NITRD) Program. ACTION: Call for participation. AGENCY: The NCO, on behalf of the Special Cyber Operations Research and Engineering (SCORE) Committee, an interagency working group that coordinates cyber security research activities in support of national security systems, is seeking expert participants in a day-long workshop on the pros and cons of the use and implementation of trust anchors. The workshop will be held April 27, 2011 in the Savage, MD area. Applications will be accepted until 5 p.m. EST March 18, 2011. Accepted participants will be notified by March 30, 2011. DATES: Workshop: April 27, 2011; Deadline: March 18, 2011. Apply via email to assumptionbusters@nitrd.gov. Travel expenses will be paid for selected participants who live more than 50 miles from Washington, DC, up to the limits established by Federal Government travel regulations and restrictions. SUMMARY: FOR FURTHER INFORMATION CONTACT: assumptionbusters@nitrd.gov. SUPPLEMENTARY INFORMATION: Overview: This notice is issued by the National Coordination Office for the Networking and Information Technology Research and Development (NITRD) Program on behalf of the SCORE Committee. PO 00000 Frm 00073 Fmt 4703 Sfmt 4703 10627 Background: There is a strong and often repeated call for research to provide novel cyber security solutions. The rhetoric of this call is to elicit new solutions that are radically different from existing solutions. Continuing research that achieves only incremental improvements is a losing proposition. We are lagging behind and need technological leaps to get, and keep, ahead of adversaries who are themselves rapidly improving attack technology. To answer this call, we must examine the key assumptions that underlie current security architectures. Challenging those assumptions both opens up the possibilities for novel solutions that are rooted in a fundamentally different understanding of the problem and provides an even stronger basis for moving forward on those assumptions that are well-founded. The SCORE Committee is conducting a series of four workshops to begin the assumption buster process. The assumptions that underlie this series are that cyber space is an adversarial domain, that the adversary is tenacious, clever, and capable, and that re-examining cyber security solutions in the context of these assumptions will result in key insights that will lead to the novel solutions we desperately need. To ensure that our discussion has the requisite adversarial flavor, we are inviting researchers who develop solutions of the type under discussion, and researchers who exploit these solutions. The goal is to engage in robust debate of topics generally believed to be true to determine to what extent that claim is warranted. The adversarial nature of these debates is meant to ensure the threat environment is reflected in the discussion in order to elicit innovative research concepts that will have a greater chance of having a sustained positive impact on our cyber security posture. The second topic to be explored in this series is ‘‘Trust Anchors are Invulnerable.’’ The workshop on this topic will be held in the Savage, MD area on April 27, 2011. Assertion: ‘‘Trust anchors are invulnerable thus users who faithfully deploy reliable trust anchors can be confident that they are immune from the attacks.’’ This assertion underlies significant cyber security research and development that is aimed at developing and implementing invulnerable trust anchors, security keystones that cannot be circumvented, and that assure that trust in a system is well grounded. Numerous trust anchors are proffered at different levels of assurance and for different aspects of the system. Platform trust is assured by E:\FR\FM\25FEN1.SGM 25FEN1 10628 Federal Register / Vol. 76, No. 38 / Friday, February 25, 2011 / Notices the Trusted Platform Module. Trusted authentication is provided by tokens. The padlock on the browser assures we can trust web interactions since they are protected by SSL. Close-held keys and strong key management systems assure cryptographic trust. At the workshop we will explore what assurances these trust anchors do and do not provide, what they depend upon, how they do or do not interact with the rest of the system, how they typically fail, and what needs to be addressed to enable effective use of them. How To Apply If you would like to participate in this workshop, please submit (1) a resume or curriculum vita of no more than two pages which highlights your expertise in this area and (2) a one-page paper stating your opinion of the assertion and outlining your key thoughts on the topic. The workshop will accommodate no more than 60 participants, so these brief documents need to make a compelling case for your participation. Applications should be submitted to assumptionbusters@nitrd.gov no later than 5 p.m. EST on March 18, 2011. Selection and Notification: The SCORE committee will select an expert group that reflects a broad range of opinions on the assertion. Accepted participants will be notified by e-mail no later than March 30, 2011. We cannot guarantee that we will contact individuals who are not selected, though we will attempt to do so unless the volume of responses is overwhelming. Submitted by the National Science Foundation for the National Coordination Office (NCO) for Networking and Information Technology Research and Development (NITRD) on February 22, 2011. Suzanne H. Plimpton, Reports Clearance Officer, National Science Foundation. [FR Doc. 2011–4272 Filed 2–24–11; 8:45 am] BILLING CODE 7555–01–P POSTAL SERVICE srobinson on DSKHWCL6B1PROD with NOTICES International Product Change— International Business Reply Service Contract Postal ServiceTM. ACTION: Notice. AGENCY: Postal Service gives notice of filing a request with the Postal Regulatory Commission to add International Business Reply Service Competitive Contract 3 to the SUMMARY: VerDate Mar<15>2010 16:39 Feb 24, 2011 Jkt 223001 Competitive Products List pursuant to 39 U.S.C. 3642. DATES: February 25, 2011. FOR FURTHER INFORMATION CONTACT: Margaret M. Falwell, 202–268–2576. SUPPLEMENTARY INFORMATION: The United States Postal Service® hereby gives notice that it has filed with the Postal Regulatory Commission a Request of United States Postal Service To Add International Business Reply Service Competitive Contract 3 to the Competitive Products List, and Notice of Filing Contract (Under Seal). Documents are available at https://www.prc.gov, Docket Nos. MC2011–21 and CP2011– 59. Neva R. Watson, Attorney, Legislative. [FR Doc. 2011–4209 Filed 2–24–11; 8:45 am] BILLING CODE 7710–12–P SECURITIES AND EXCHANGE COMMISSION [Release No. 34–63936; File No. SR–DTC– 2011–03] Self-Regulatory Organizations; the Depository Trust Company; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Regarding Providing Participants With a New Optional Settlement Web Interface February 22, 2011. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (‘‘Act’’),1 notice is hereby given that on February 7, 2011, The Depository Trust Company (‘‘DTC’’) filed with the Securities and Exchange Commission (‘‘Commission’’) the proposed rule change as described in Items I and II below, which Items have been prepared primarily by DTC. DTC filed the proposed rule change pursuant to Section 19(b)(3)(A)(iii) of the Act 2 and Rule 19b–4(f)(4) 3 thereunder so that the proposal was effective upon filing with the Commission. The Commission is publishing this notice to solicit comments on the proposed rule change from interested persons. I. Self-Regulatory Organization’s Statement of the Terms of Substance of the Proposed Rule Change The proposed rule change will establish a new browser-based interface, the ‘‘Settlement Web,’’ that allows Participants to view their settlementrelated activity. 1 15 U.S.C. 78s(b)(1). U.S.C. 78s(b)(3)(A)(iii). 3 17 CFR 240.19b–4(f)(4). 2 15 PO 00000 Frm 00074 Fmt 4703 Sfmt 4703 II. Self-Regulatory Organization’s Statement of the Purpose of, and Statutory Basis for, the Proposed Rule Change In its filing with the Commission, DTC included statements concerning the purpose of and basis for the proposed rule change and discussed any comments it received on the proposed rule change. The text of these statements may be examined at the places specified in Item IV below. DTC has prepared summaries, set forth in sections A, B, and C below, of the most significant aspects of such statements. A. Self-Regulatory Organization’s Statement of the Purpose of, and Statutory Basis for, the Proposed Rule Change DTC Participants have the ability to view all of their settlement related activity using different functions in the Participant Browser System (‘‘PBS’’).4 Based on request from its Participants, DTC has created a more user-friendly interface called Settlement Web that allows Participants to view their settlement related activity. The Settlement Web will reduce the amount of time that Participants spend in PBS by increasing the efficiency in searching for settlement activity. Participants that chose to use the Settlement Web will have access to a Navigation Bar that will provide Participants with improved inquiry and update capabilities for their settlement transactions. Participants will also have the ability to view different settlement related activities using the Dashboard in the Settlement Web homepage. Additionally, Participants will have the option to use an alert function located within the Settlement Web’s dashboard to provide them to set alerts regarding settlement related events.5 Participants will be able to customize the function to control which events for which they want to be notified. These alerts will reduce the amount of time spent in PBS because Participants will no longer have to manually check multiple settlement functions to be made aware of various settlement events. Notifications will be made available to Participants through the alerts window in the dashboard or by e-mail. The e-mail will notify the 4 In 2008, DTCC completed a multi-year initiative to transition all Participant Terminal System (‘‘PTS’’) functions to PBS. Now, rather than toggle between the two tools, Participants can manage all their needs through the web-based PBS, which is more flexible than PTS while offering greater functionality. However, Participants are still able to use PTS for most of their settlement activities. 5 Events, which include, for example, settlement extension broadcasts and the receipt of a specific delivery, are regularly scheduled processing milestones associated with a given settlement cycle. E:\FR\FM\25FEN1.SGM 25FEN1

Agencies

[Federal Register Volume 76, Number 38 (Friday, February 25, 2011)]
[Notices]
[Pages 10627-10628]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 2011-4272]


-----------------------------------------------------------------------

NATIONAL SCIENCE FOUNDATION


Assumption Buster Workshop: Trust Anchors Are Invulnerable

AGENCY: The National Coordination Office (NCO) for the Networking and 
Information Technology Research and Development (NITRD) Program.

ACTION: Call for participation.

-----------------------------------------------------------------------

SUMMARY: The NCO, on behalf of the Special Cyber Operations Research 
and Engineering (SCORE) Committee, an interagency working group that 
coordinates cyber security research activities in support of national 
security systems, is seeking expert participants in a day-long workshop 
on the pros and cons of the use and implementation of trust anchors. 
The workshop will be held April 27, 2011 in the Savage, MD area. 
Applications will be accepted until 5 p.m. EST March 18, 2011. Accepted 
participants will be notified by March 30, 2011.

DATES: Workshop: April 27, 2011; Deadline: March 18, 2011. Apply via e-
mail to assumptionbusters@nitrd.gov. Travel expenses will be paid for 
selected participants who live more than 50 miles from Washington, DC, 
up to the limits established by Federal Government travel regulations 
and restrictions.

FOR FURTHER INFORMATION CONTACT: assumptionbusters@nitrd.gov.

SUPPLEMENTARY INFORMATION:
    Overview: This notice is issued by the National Coordination Office 
for the Networking and Information Technology Research and Development 
(NITRD) Program on behalf of the SCORE Committee.
    Background: There is a strong and often repeated call for research 
to provide novel cyber security solutions. The rhetoric of this call is 
to elicit new solutions that are radically different from existing 
solutions. Continuing research that achieves only incremental 
improvements is a losing proposition. We are lagging behind and need 
technological leaps to get, and keep, ahead of adversaries who are 
themselves rapidly improving attack technology. To answer this call, we 
must examine the key assumptions that underlie current security 
architectures. Challenging those assumptions both opens up the 
possibilities for novel solutions that are rooted in a fundamentally 
different understanding of the problem and provides an even stronger 
basis for moving forward on those assumptions that are well-founded. 
The SCORE Committee is conducting a series of four workshops to begin 
the assumption buster process. The assumptions that underlie this 
series are that cyber space is an adversarial domain, that the 
adversary is tenacious, clever, and capable, and that re-examining 
cyber security solutions in the context of these assumptions will 
result in key insights that will lead to the novel solutions we 
desperately need. To ensure that our discussion has the requisite 
adversarial flavor, we are inviting researchers who develop solutions 
of the type under discussion, and researchers who exploit these 
solutions. The goal is to engage in robust debate of topics generally 
believed to be true to determine to what extent that claim is 
warranted. The adversarial nature of these debates is meant to ensure 
the threat environment is reflected in the discussion in order to 
elicit innovative research concepts that will have a greater chance of 
having a sustained positive impact on our cyber security posture.
    The second topic to be explored in this series is ``Trust Anchors 
are Invulnerable.'' The workshop on this topic will be held in the 
Savage, MD area on April 27, 2011.
    Assertion: ``Trust anchors are invulnerable thus users who 
faithfully deploy reliable trust anchors can be confident that they are 
immune from the attacks.''
    This assertion underlies significant cyber security research and 
development that is aimed at developing and implementing invulnerable 
trust anchors, security keystones that cannot be circumvented, and that 
assure that trust in a system is well grounded. Numerous trust anchors 
are proffered at different levels of assurance and for different 
aspects of the system. Platform trust is assured by

[[Page 10628]]

the Trusted Platform Module. Trusted authentication is provided by 
tokens. The padlock on the browser assures we can trust web 
interactions since they are protected by SSL. Close-held keys and 
strong key management systems assure cryptographic trust.
    At the workshop we will explore what assurances these trust anchors 
do and do not provide, what they depend upon, how they do or do not 
interact with the rest of the system, how they typically fail, and what 
needs to be addressed to enable effective use of them.

How To Apply

    If you would like to participate in this workshop, please submit 
(1) a resume or curriculum vita of no more than two pages which 
highlights your expertise in this area and (2) a one-page paper stating 
your opinion of the assertion and outlining your key thoughts on the 
topic. The workshop will accommodate no more than 60 participants, so 
these brief documents need to make a compelling case for your 
participation. Applications should be submitted to 
assumptionbusters@nitrd.gov no later than 5 p.m. EST on March 18, 2011.
    Selection and Notification: The SCORE committee will select an 
expert group that reflects a broad range of opinions on the assertion. 
Accepted participants will be notified by e-mail no later than March 
30, 2011. We cannot guarantee that we will contact individuals who are 
not selected, though we will attempt to do so unless the volume of 
responses is overwhelming.
    Submitted by the National Science Foundation for the National 
Coordination Office (NCO) for Networking and Information Technology 
Research and Development (NITRD) on February 22, 2011.

Suzanne H. Plimpton,
Reports Clearance Officer, National Science Foundation.
[FR Doc. 2011-4272 Filed 2-24-11; 8:45 am]
BILLING CODE 7555-01-P
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.