Assumption Buster Workshop: Distributed Data Schemes Provide Security, 17158-17159 [2011-7173]
Download as PDF
17158
Federal Register / Vol. 76, No. 59 / Monday, March 28, 2011 / Notices
The agenda will focus on the following
topics:
• Workgroup Report-Outs and Open
Committee Discussion
• Extended Discussion on Proposed
Pre-Apprenticeship Framework
• Review of Available Data
Capabilities
• Long-Term Planning
• Apprenticeship Community of
Practice
• Public Comment
Any member of the public who
wishes to speak at the meeting must
indicate the nature of the intended
presentation and the amount of time
needed by furnishing a written
statement to the Designated Federal
Official, Mr. John V. Ladd, by Monday,
May 9, 2011. The Chairperson will
announce at the beginning of the
meeting the extent to which time will
permit the granting of such requests.
Signed at Washington, DC, this 22nd day
of March 2011.
Jane Oates,
Assistant Secretary for the Employment and
Training Administration.
[FR Doc. 2011–7153 Filed 3–25–11; 8:45 am]
BILLING CODE 4510–FR–P
NATIONAL AERONAUTICS AND
SPACE ADMINISTRATION
[Notice: (11–026)]
NASA Advisory Council; Science
Committee; Meeting
National Aeronautics and
Space Administration.
ACTION: Notice of meeting.
AGENCY:
In accordance with the
Federal Advisory Committee Act, Public
Law 92–463, as amended, the National
Aeronautics and Space Administration
(NASA) announces a meeting of the
Science Committee of the NASA
Advisory Council (NAC). This
Committee reports to the NAC. The
Meeting will be held for the purpose of
soliciting from the scientific community
and other persons scientific and
technical information relevant to
program planning.
DATES: Thursday, April 21, 2011, 8:30
a.m. to 4 p.m., and Friday, April 22,
2011, 8:30 a.m. to 2 p.m., Local Time.
ADDRESSES: NASA Headquarters, 300 E
Street, SW., Room 5H45, Washington,
DC 20546.
FOR FURTHER INFORMATION CONTACT: Ms.
Marian Norris, Science Mission
Directorate, NASA Headquarters,
Washington, DC 20546, (202) 358–4452,
fax (202) 358–4118, or
mnorris@nasa.gov.
Emcdonald on DSK2BSOYB1PROD with NOTICES
SUMMARY:
VerDate Mar<15>2010
17:14 Mar 25, 2011
Jkt 223001
The
meeting will be open to the public up
to the capacity of the room. This
meeting is also available telephonically
and by WebEx. Any interested person
may call the USA toll free conference
call number 888–381–5774, pass code
Science Committee, to participate in
this meeting by telephone. The WebEx
link is https://nasa.webex.com/,
meeting number on April 21 is 994 561
164, and password SC_Apr21; the
meeting number on April 22 is 992 613
633, and password SC_Apr22. The
agenda for the meeting includes the
following topics:
—Planetary Science Decadal Survey.
—Fiscal Year 2012 Budget Request.
—Program and Subcommittee Updates.
It is imperative that the meeting be
held on these dates to accommodate the
scheduling priorities of the key
participants. Attendees will be
requested to sign a register and to
comply with NASA security
requirements, including the
presentation of a valid picture ID, before
receiving an access badge. Foreign
nationals attending this meeting will be
required to provide a copy of their
passport, visa, or resident alien card in
addition to providing the following
information no less than 10 working
days prior to the meeting: full name;
gender; date/place of birth; citizenship;
visa/green card information (number,
type, expiration date); passport
information (number, country,
expiration date); employer/affiliation
information (name of institution,
address, country, telephone); title/
position of attendee. To expedite
admittance, attendees with U.S.
citizenship can provide identifying
information 3 working days in advance
by contacting Marian Norris via e-mail
at mnorris@nasa.gov or by telephone at
(202) 358–4452.
SUPPLEMENTARY INFORMATION:
Dated: March 22, 2011.
P. Diane Rausch,
Advisory Committee Management Officer,
National Aeronautics and Space
Administration.
[FR Doc. 2011–7138 Filed 3–25–11; 8:45 am]
BILLING CODE 7510–13–P
NATIONAL SCIENCE FOUNDATION
Assumption Buster Workshop:
Distributed Data Schemes Provide
Security
The National Coordination
Office (NCO) for the Networking and
Information Technology Research and
Development (NITRD) Program.
ACTION: Call for participation.
AGENCY:
PO 00000
Frm 00056
Fmt 4703
Sfmt 4703
FOR FURTHER INFORMATION CONTACT:
assumptionbusters@nitrd.gov.
Workshop: May 17, 2011;
Deadline: April 15, 2011. Apply via email to assumptionbusters@nitrd.gov.
Travel expenses will be paid for
selected participants who live more
than 50 miles from Washington, DC, up
to the limits established by Federal
Government travel regulations and
restrictions.
SUMMARY: The NCO, on behalf of the
Special Cyber Operations Research and
Engineering (SCORE) Committee, an
interagency working group that
coordinates cyber security research
activities in support of national security
systems, is seeking expert participants
in a day-long workshop on the pros and
cons of the Security of Distributed Data
Schemes. The workshop will be held
May 17, 2011 in Gaithersburg, MD.
Applications will be accepted until 5
p.m. EST April 15, 2011. Accepted
participants will be notified by April 27,
2011.
SUPPLEMENTARY INFORMATION:
Overview: This notice is issued by the
National Coordination Office for the
Networking and Information
Technology Research and Development
(NITRD) Program on behalf of the
SCORE Committee.
Background: There is a strong and
often repeated call for research to
provide novel cyber security solutions.
The rhetoric of this call is to elicit new
solutions that are radically different
from existing solutions. Continuing
research that achieves only incremental
improvements is a losing proposition.
We are lagging behind and need
technological leaps to get, and keep,
ahead of adversaries who are themselves
rapidly improving attack technology. To
answer this call, we must examine the
key assumptions that underlie current
security architectures. Challenging those
assumptions both opens up the
possibilities for novel solutions that are
rooted in a fundamentally different
understanding of the problem and
provides an even stronger basis for
moving forward on those assumptions
that are well-founded. The SCORE
Committee is conducting a series of four
workshops to begin the assumption
buster process. The assumptions that
underlie this series are that cyber space
is an adversarial domain, that the
adversary is tenacious, clever, and
capable, and that re-examining cyber
security solutions in the context of these
assumptions will result in key insights
that will lead to the novel solutions we
desperately need. To ensure that our
discussion has the requisite adversarial
flavor, we are inviting researchers who
DATES:
E:\FR\FM\28MRN1.SGM
28MRN1
Emcdonald on DSK2BSOYB1PROD with NOTICES
Federal Register / Vol. 76, No. 59 / Monday, March 28, 2011 / Notices
develop solutions of the type under
discussion, and researchers who exploit
these solutions. The goal is to engage in
robust debate of topics generally
believed to be true to determine to what
extent that claim is warranted. The
adversarial nature of these debates is
meant to ensure the threat environment
is reflected in the discussion in order to
elicit innovative research concepts that
will have a greater chance of having a
sustained positive impact on our cyber
security posture.
The third topic to be explored in this
series is ‘‘Distributed Data Schemes
Provide Security.’’ The workshop on this
topic will be held in Gaitherburg, MD
on May 17, 2011.
Assertion: ‘‘Distributed Data Schemes
Provide Security’’.
Distributed data architectures, such as
cloud computing, offer very attractive
cost savings and provide new means of
large scale analysis and information
sharing. There has been much
discussion about securing such
architectures, and it is generally felt that
distribution, and the replication that is
usually associated with it, provides
some inherent protection; adversaries
will have difficulty locating your data in
the cloud, and by breaking it up and
replicating different segments
throughout the platform we send the
adversary on a wild goose chase to find
and reassemble all the relevant bits. It
is also felt that cryptographic
mechanisms like bound tags,
encryption, and keyed access control
can be used to develop distributed
platforms with a high level of assurance.
There are several applications of
distributed architectures that offer nonsensitive peer to peer TV services.
Applications are also offered for
potentially sensitive uses like document
collaboration. Yet it is unclear whether
these applications can safely be
extended to highly sensitive uses. Could
we readily support a distributed
electronic health care system that
securely supports ad hoc consultations
or remote surgery with full access to
patient history while protecting patient
privacy, for example?
To answer this question we need to
take a closer look at the protection
provided inherently and
cryptographically. With respect to the
former, we must think about how the
architecture can be designed to provide
secure availability to friend and not foe.
We must examine the impact of the
design for security, resilience, and
availability and understand the trades
we are implicitly making among these
attributes. We must consider whether
the data about data that is required by
these architectures introduces a new
VerDate Mar<15>2010
17:14 Mar 25, 2011
Jkt 223001
data risk. We must think about the
multiplicity of paths provide by these
architectures. We must figure how to do
risk analysis on a system when key
information like data location is
unavailable by design. With respect to
the latter, we must consider whether the
key management strategy is robust
enough to operate in a distributed
architecture. We have to think about the
assurance of tag binding and access
update and revocation. We must
consider the vulnerabilities of the
platforms that host the cryptographic
mechanisms and the distribution of
those functions in the architecture.
In this workshop, we will explore the
implications of distributed data on
security. We will consider what effect
the introduction of the notion of a
determined adversary has on our
analysis of data security requirements.
In the first session, we will discuss the
properties of distributed platforms that
are thought to make such architectures
inherently more secure. In the second,
we will discuss the issue of
cryptography and distributed platforms.
How To Apply
If you would like to participate in this
workshop, please submit (1) a resume or
curriculum vita of no more than two
pages which highlights your expertise in
this area and (2) a one-page paper
stating your opinion of the assertion and
outlining your key thoughts on the
topic. The workshop will accommodate
no more than 60 participants, so these
brief documents need to make a
compelling case for your participation.
Applications should be submitted to
assumptionbusters@nitrd.gov no later
than 5 p.m. EST on April 15, 2011.
Selection and Notification: The
SCORE committee will select an expert
group that reflects a broad range of
opinions on the assertion. Accepted
participants will be notified by e-mail
no later than April 27, 2011. We cannot
guarantee that we will contact
individuals who are not selected,
though we will attempt to do so unless
the volume of responses is
overwhelming.
Submitted by the National Science
Foundation for the National Coordination
Office (NCO) for Networking and Information
Technology Research and Development
(NITRD) on March 18, 2011.
Suzanne H. Plimpton,
Reports Clearance Officer, National Science
Foundation.
[FR Doc. 2011–7173 Filed 3–25–11; 8:45 am]
BILLING CODE 7555–01–P
PO 00000
Frm 00057
Fmt 4703
Sfmt 4703
17159
NATIONAL SCIENCE FOUNDATION
Advisory Committee for Engineering;
Notice of Meeting
In accordance with the Federal
Advisory Committee Act (Pub. L. 92–
463, as amended), the National Science
Foundation announces the following
meeting:
Name: Advisory Committee for
Engineering Meeting, #1170.
Date/Time: April 13, 2011: 12 p.m. to 6
p.m., April 14, 2011: 8 a.m. to 12 p.m.
Place: National Science Foundation, 4201
Wilson Boulevard, Suite 1235, Arlington,
Virginia 22230.
Type of Meeting: Open.
Contact Person: Deborah Young, National
Science Foundation, 4201 Wilson Boulevard,
Suite 505, Arlington, Virginia 22230.
Purpose of Meeting: To provide advice,
recommendations and counsel on major goals
and policies pertaining to engineering
programs and activities.
Agenda: The principal focus of the meeting
on both days will be to discuss emerging
issues and opportunities for the Directorate
for Engineering and its divisions and review
Committee of Visitors Reports.
Dated: March 23, 2011.
Susanne Bolton,
Committee Management Officer.
[FR Doc. 2011–7175 Filed 3–25–11; 8:45 am]
BILLING CODE 7555–01–P
NUCLEAR REGULATORY
COMMISSION
[NRC–2009–0476; DC/COL–ISG–018]
Office of New Reactors; Final Interim
Staff Guidance on Standard Review
Plan, Section 17.4, ‘‘Reliability
Assurance Program’’
Nuclear Regulatory
Commission (NRC).
ACTION: Notice of availability.
AGENCY:
The NRC staff is issuing its
Final Interim Staff Guidance (ISG) DC/
COL–ISG–018 (Agencywide Documents
Access and Management System
(ADAMS) Accession No.
ML103010113). The purpose of this ISG
is to clarify the NRC staff guidance on
the design reliability assurance program
(RAP). This ISG updates the guidance
provided to the staff in Standard Review
Plan (SRP), Section 17.4, ‘‘Reliability
Assurance Program,’’ of NUREG–0800,
‘‘Standard Review Plan for the Review of
Safety Analysis Reports for Nuclear
Power Plants,’’ March 2007. This ISG
revises the NRC staff’s review
responsibilities and further clarifies the
acceptance criteria and evaluation
findings contained in the SRP Section
17.4 in support of the NRC reviews of
SUMMARY:
E:\FR\FM\28MRN1.SGM
28MRN1
Agencies
[Federal Register Volume 76, Number 59 (Monday, March 28, 2011)]
[Notices]
[Pages 17158-17159]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 2011-7173]
=======================================================================
-----------------------------------------------------------------------
NATIONAL SCIENCE FOUNDATION
Assumption Buster Workshop: Distributed Data Schemes Provide
Security
AGENCY: The National Coordination Office (NCO) for the Networking and
Information Technology Research and Development (NITRD) Program.
ACTION: Call for participation.
-----------------------------------------------------------------------
FOR FURTHER INFORMATION CONTACT: assumptionbusters@nitrd.gov.
DATES: Workshop: May 17, 2011; Deadline: April 15, 2011. Apply via e-
mail to assumptionbusters@nitrd.gov. Travel expenses will be paid for
selected participants who live more than 50 miles from Washington, DC,
up to the limits established by Federal Government travel regulations
and restrictions.
SUMMARY: The NCO, on behalf of the Special Cyber Operations Research
and Engineering (SCORE) Committee, an interagency working group that
coordinates cyber security research activities in support of national
security systems, is seeking expert participants in a day-long workshop
on the pros and cons of the Security of Distributed Data Schemes. The
workshop will be held May 17, 2011 in Gaithersburg, MD. Applications
will be accepted until 5 p.m. EST April 15, 2011. Accepted participants
will be notified by April 27, 2011.
SUPPLEMENTARY INFORMATION:
Overview: This notice is issued by the National Coordination Office
for the Networking and Information Technology Research and Development
(NITRD) Program on behalf of the SCORE Committee.
Background: There is a strong and often repeated call for research
to provide novel cyber security solutions. The rhetoric of this call is
to elicit new solutions that are radically different from existing
solutions. Continuing research that achieves only incremental
improvements is a losing proposition.
We are lagging behind and need technological leaps to get, and
keep, ahead of adversaries who are themselves rapidly improving attack
technology. To answer this call, we must examine the key assumptions
that underlie current security architectures. Challenging those
assumptions both opens up the possibilities for novel solutions that
are rooted in a fundamentally different understanding of the problem
and provides an even stronger basis for moving forward on those
assumptions that are well-founded. The SCORE Committee is conducting a
series of four workshops to begin the assumption buster process. The
assumptions that underlie this series are that cyber space is an
adversarial domain, that the adversary is tenacious, clever, and
capable, and that re-examining cyber security solutions in the context
of these assumptions will result in key insights that will lead to the
novel solutions we desperately need. To ensure that our discussion has
the requisite adversarial flavor, we are inviting researchers who
[[Page 17159]]
develop solutions of the type under discussion, and researchers who
exploit these solutions. The goal is to engage in robust debate of
topics generally believed to be true to determine to what extent that
claim is warranted. The adversarial nature of these debates is meant to
ensure the threat environment is reflected in the discussion in order
to elicit innovative research concepts that will have a greater chance
of having a sustained positive impact on our cyber security posture.
The third topic to be explored in this series is ``Distributed Data
Schemes Provide Security.'' The workshop on this topic will be held in
Gaitherburg, MD on May 17, 2011.
Assertion: ``Distributed Data Schemes Provide Security''.
Distributed data architectures, such as cloud computing, offer very
attractive cost savings and provide new means of large scale analysis
and information sharing. There has been much discussion about securing
such architectures, and it is generally felt that distribution, and the
replication that is usually associated with it, provides some inherent
protection; adversaries will have difficulty locating your data in the
cloud, and by breaking it up and replicating different segments
throughout the platform we send the adversary on a wild goose chase to
find and reassemble all the relevant bits. It is also felt that
cryptographic mechanisms like bound tags, encryption, and keyed access
control can be used to develop distributed platforms with a high level
of assurance. There are several applications of distributed
architectures that offer non-sensitive peer to peer TV services.
Applications are also offered for potentially sensitive uses like
document collaboration. Yet it is unclear whether these applications
can safely be extended to highly sensitive uses. Could we readily
support a distributed electronic health care system that securely
supports ad hoc consultations or remote surgery with full access to
patient history while protecting patient privacy, for example?
To answer this question we need to take a closer look at the
protection provided inherently and cryptographically. With respect to
the former, we must think about how the architecture can be designed to
provide secure availability to friend and not foe. We must examine the
impact of the design for security, resilience, and availability and
understand the trades we are implicitly making among these attributes.
We must consider whether the data about data that is required by these
architectures introduces a new data risk. We must think about the
multiplicity of paths provide by these architectures. We must figure
how to do risk analysis on a system when key information like data
location is unavailable by design. With respect to the latter, we must
consider whether the key management strategy is robust enough to
operate in a distributed architecture. We have to think about the
assurance of tag binding and access update and revocation. We must
consider the vulnerabilities of the platforms that host the
cryptographic mechanisms and the distribution of those functions in the
architecture.
In this workshop, we will explore the implications of distributed
data on security. We will consider what effect the introduction of the
notion of a determined adversary has on our analysis of data security
requirements. In the first session, we will discuss the properties of
distributed platforms that are thought to make such architectures
inherently more secure. In the second, we will discuss the issue of
cryptography and distributed platforms.
How To Apply
If you would like to participate in this workshop, please submit
(1) a resume or curriculum vita of no more than two pages which
highlights your expertise in this area and (2) a one-page paper stating
your opinion of the assertion and outlining your key thoughts on the
topic. The workshop will accommodate no more than 60 participants, so
these brief documents need to make a compelling case for your
participation.
Applications should be submitted to assumptionbusters@nitrd.gov no
later than 5 p.m. EST on April 15, 2011.
Selection and Notification: The SCORE committee will select an
expert group that reflects a broad range of opinions on the assertion.
Accepted participants will be notified by e-mail no later than April
27, 2011. We cannot guarantee that we will contact individuals who are
not selected, though we will attempt to do so unless the volume of
responses is overwhelming.
Submitted by the National Science Foundation for the National
Coordination Office (NCO) for Networking and Information Technology
Research and Development (NITRD) on March 18, 2011.
Suzanne H. Plimpton,
Reports Clearance Officer, National Science Foundation.
[FR Doc. 2011-7173 Filed 3-25-11; 8:45 am]
BILLING CODE 7555-01-P