Assumption Buster Workshop: “Current Implementations of Cloud Computing Indicate a New Approach to Security”, 52353-52354 [2011-21350]
Download as PDF
Federal Register / Vol. 76, No. 162 / Monday, August 22, 2011 / Notices
2. Consider and act on the Finance
Committee’s recommendation regarding
LSC’s FY 2013 appropriation request.
3. Public comment.
4. Consider and act on other business.
5. Consider and act on adjournment of
meeting.
CONTACT PERSON FOR INFORMATION:
Katherine Ward, Executive Assistant to
the Vice President & General Counsel, at
(202) 295–1500. Questions may be sent
by electronic mail to
FR_NOTICE_QUESTIONS@lsc.gov.
ACCESSIBILITY: LSC complies with the
American’s with Disabilities Act and
Section 504 of the 1973 Rehabilitation
Act. Upon request, meeting notices and
materials will be made available in
alternative formats to accommodate
individuals with disabilities.
Individuals who need other
accommodations due to disability in
order to attend the meeting in person or
telephonically should contact Katherine
Ward, at (202) 295–1500 or
FR_NOTICE_QUESTIONS@lsc.gov, at
least 2 business days in advance of the
meeting. If a request is made without
advance notice, LSC will make every
effort to accommodate the request but
cannot guarantee that all requests can be
fulfilled.
Dated: August 18, 2011.
Victor M. Fortuno,
Vice President & General Counsel.
[FR Doc. 2011–21551 Filed 8–19–11; 4:15 pm]
BILLING CODE 7050–01–P
NATIONAL SCIENCE FOUNDATION
Assumption Buster Workshop:
‘‘Current Implementations of Cloud
Computing Indicate a New Approach to
Security’’
The National Coordination
Office (NCO) for the Networking and
Information Technology Research and
Development (NITRD) Program,
National Science Foundation.
ACTION: Call for participation.
AGENCY:
FOR FURTHER INFORMATION CONTACT:
assumptionbusters@nitrd.gov.
Workshop: October 21, 2011;
Deadline: September 21, 2011. Apply
via e-mail to
assumptionbusters@nitrd.gov. Travel
expenses will be paid for selected
participants who live more than 50
miles from Washington, DC, up to the
limits established by Federal
Government travel regulations and
restrictions.
SUMMARY: The NCO, on behalf of the
Special Cyber Operations Research and
jlentini on DSK4TPTVN1PROD with NOTICES
DATES:
VerDate Mar<15>2010
17:16 Aug 19, 2011
Jkt 223001
Engineering (SCORE) Committee, an
interagency working group that
coordinates cyber security research
activities in support of national security
systems, is seeking expert participants
in a day-long workshop on the pros and
cons of the Security of Distributed Data
Schemes. The workshop will be held
October 21, 2011 in Gaithersburg, MD.
Applications will be accepted until
5 p.m. EST September 21, 2011.
Accepted participants will be notified
by October 1, 2011.
SUPPLEMENTARY INFORMATION:
Overview: This notice is issued by the
National Coordination Office for the
Networking and Information
Technology Research and Development
(NITRD) Program on behalf of the
SCORE Committee.
Background: There is a strong and
often repeated call for research to
provide novel cyber security solutions.
The rhetoric of this call is to elicit new
solutions that are radically different
from existing solutions. Continuing
research that achieves only incremental
improvements is a losing proposition.
We are lagging behind and need
technological leaps to get, and keep,
ahead of adversaries who are themselves
rapidly improving attack technology. To
answer this call, we must examine the
key assumptions that underlie current
security architectures. Challenging those
assumptions both opens up the
possibilities for novel solutions and
provides an even stronger basis for
moving forward on those assumptions
that are well-founded. The SCORE
Committee is conducting a series of four
workshops to begin the assumption
buster process. The assumptions that
underlie this series are as follows: Cyber
space is an adversarial domain; the
adversary is tenacious, clever, and
capable; and re-examining cyber
security solutions in the context of these
assumptions will result in key insights
that will lead to the novel solutions we
desperately need. To ensure that our
discussion has the requisite adversarial
flavor, we are inviting researchers who
develop solutions of the type under
discussion, and researchers who exploit
these solutions. The goal is to engage in
robust debate of topics generally
believed to be true to determine to what
extent that claim is warranted. The
adversarial nature of these debates is
meant to ensure the threat environment
is reflected in the discussion in order to
elicit innovative research concepts that
will have a greater chance of having a
sustained positive impact on our cyber
security posture.
The fourth topic to be explored in this
series is cloud computing. The
PO 00000
Frm 00051
Fmt 4703
Sfmt 4703
52353
workshop on this topic will be held in
Gaithersburg, MD on October 21, 2011.
Assertion: ‘‘Current implementations
of cloud computing indicate a new
approach to security’’
Implementations of cloud computing
have provided new ways of thinking
about how to secure data and
computation. Cloud is a platform upon
which we leverage various
opportunities to improve the way in
which we think about and implement
the practices and technology needed to
secure the things that matter most to us.
Current implementations of cloud
computing security take advantage of
the unique capabilities and
architectures of cloud computing (e.g.
scale).
Working from this assertion, we want
researchers and cloud implementers to
submit, as part of your application to
participate in the October 21st
Assumption Buster Workshop, a onepage paper stating your opinion of the
assertion and outlining your key
thoughts on the topic. Below are some
additional areas to explore stated
specifically in strong language
supportive of the assertion.
—Controls on provider side, controls on
the subscribe-side, and controls of the
shared space in cloud
implementations can be defined in
ways that allow for a comprehensive
view of the cloud security landscape
to displayed and managed.
—A common security risk model can be
leveraged when assessing cloud
computing services and products, and
use of this model provides a
consistent baseline for Cloud based
technologies.
—Cloud computing security is a natural
fit when examined against the Federal
cybersecurity research themes focused
on designed-in-security, tailored
trustworthy spaces, moving target,
and cyber economic incentives. These
themes will be best demonstrated
using Cloud Computing.
—Opportunities exist to create existence
proofs for specific security
improvements such as minimal
kernels that can be formally verified
which could provide a stronger basis
for virtual machines.
—We can establish a trust boundary
remote-control that allows a cloud
customer to directly control system
boundaries.
—Credible explications of security
priorities are possible thus enabling
customers to obtain a complete
picture and insight into the security
offered by their cloud
implementation.
—Cloud customers are able to measure
the strength of the logical separation
E:\FR\FM\22AUN1.SGM
22AUN1
52354
Federal Register / Vol. 76, No. 162 / Monday, August 22, 2011 / Notices
of their cloud data from the other
customers.
In this workshop, we will explore
whether, or in what circumstances, this
confidence is warranted.
How To Apply
If you would like to participate in this
workshop, please submit (1) a resume or
curriculum vita of no more than two
pages which highlights your expertise in
this area and (2) a one-page paper
stating your opinion of the assertion and
outlining your key thoughts on the
topic. The workshop will accommodate
no more than 60 participants, so these
brief documents need to make a
compelling case for your participation.
Applications should be submitted
electronically via e-mail to
assumptionbusters@nitrd.gov no later
than 5 p.m. EST on September 21, 2011.
Selection and Notification: The
SCORE committee will select an expert
group that reflects a broad range of
opinions on the assertion. Accepted
participants will be notified by e-mail
no later than October 1, 2011. We
cannot guarantee that we will contact
individuals who are not selected,
though we will attempt to do so unless
the volume of responses is
overwhelming.
Dated: August 17, 2011.
Suzanne H. Plimpton,
Reports Clearance Officer, National Science
Foundation.
[FR Doc. 2011–21350 Filed 8–19–11; 8:45 am]
BILLING CODE 7555–01–P
NATIONAL SCIENCE FOUNDATION
Notice of Permit Application Received
Under the Antarctic Conservation Act
of 1978
National Science Foundation.
Notice of Permit Applications
Received Under the Antarctic
Conservation Act.
AGENCY:
ACTION:
Notice is hereby given that
the National Science Foundation (NSF)
has received a waste management
permit application for operation of a
field research camp located in ASPA
#149–Cape Shirreff, Livingston Island
by the Antarctic Marine Living
Resources (AMLR) Program, Southwest
Fisheries Science Center, La Jolla, CA.
The application is submitted to NSF
pursuant to regulations issued under the
Antarctic Conservation Act of 1978.
DATES: Interested parties are invited to
submit written data, comments, or
views with respect to this permit
application within September 21, 2011.
jlentini on DSK4TPTVN1PROD with NOTICES
SUMMARY:
VerDate Mar<15>2010
17:16 Aug 19, 2011
Jkt 223001
Permit applications may be inspected by
interested parties at the Permit Office,
address below.
ADDRESSES: Comments should be
addressed to Permit Office, Room 755,
Office of Polar Programs, National
Science Foundation, 4201 Wilson
Boulevard, Arlington, Virginia 22230.
FOR FURTHER INFORMATION CONTACT: Dr.
Polly A. Penhale at the above address or
(703) 292–8030.
SUPPLEMENTARY INFORMATION: NSF’s
Antarctic Waste Regulation, 45 CFR part
671, requires all U.S. citizens and
entities to obtain a permit for the use or
release of a designated pollutant in
Antarctica, and for the release of waste
in Antarctica. NSF has received a permit
application under this Regulation for
operation of remote research field camp
at ASPA #149 Cape Shirreff, Livingston
Island. The camp consists of four
structures on the beach between Llano
Point and Sphinx Hill which has been
in use during the summer since 1977.
The camp is used to house researchers
(typically 6 people), provide a base of
research operations, and allow
laboratory studies. Biological
investigation of seabirds and pinnipeds
is the primary research conducted from
the camp.
Designated pollutants would be
associated with camp operations
[typically air emissions and waste water
(urine, grey-water, and human solid
waste)] and scientific activities
(typically research materials). All wastes
would be packaged and removed from
the site for proper disposal in Chile or
the U.S. under approved guidelines
prior to the end of each season.
In addition, the AMLR Program
conducts 30–90 days of vessel
operations in the Antarctic Peninsula
region. The vessel follows a
standardized survey grid, and
depending on the focus any given year,
additional smaller sections of the region
are surveyed. During annual surveys,
the Program deploys drifters and
expendable bathythermographs (XBT’s)
to collect hydrographic data. In addition
to drifters and XBT’s, the AMLR
Program also deploys and recovers a
variety of gear that are not intentionally
released into the environment:
(1) Conductivity-Temperature-Depth
profilers (CTD’s) are lowered to collect
water in attached PCV bottles. Due to
storms or heavy waves the bottles can be
broken and release plastic into the
ocean.
(2) Fishing nets: (a) Plankton nets
come in a variety of configurations and
sizes. The Program has lost a net ad
frame once every 3–5 years. (B)
Commercial bottom trawl nets are
PO 00000
Frm 00052
Fmt 4703
Sfmt 4703
deployed every two to three years. Due
to the submarine terrain being volcanic,
ice scoured and highly variable in
makeup, trawls can be lost if the trawl
is snagged on boulders or rock
outcroppings.
(3) Other gears: Towed or undulating
instruments (e.g. Continuous plankton
recorder, Winged Optical Particle
Counters, towed Current profilers) can
be lost. In many cases these
instruments, if lost are buoyant, and can
be recovered. In other cases, the
instruments are heavy, and made of
mostly metal and sink in the rather deep
water surrounding the Antarctic
Continent.
The permit applicant is: George
Watters, Director, US AMLR Program,
Southwest Fisheries Service, NOAA,
8604 La Jolla Shores Drive, La Jolla, CA
92037 Permit application No. 2012
WM–001.
Nadene G. Kennedy,
Permit Officer.
[FR Doc. 2011–21295 Filed 8–19–11; 8:45 am]
BILLING CODE 7555–01–P
NATIONAL SCIENCE FOUNDATION
Notice of Permit Applications Received
Under the Antarctic Conservation Act
of 1978 (Pub. L. 95–541)
National Science Foundation.
Notice of Permit Applications
Received under the Antarctic
Conservation Act of 1978, Public Law
95–541.
AGENCY:
ACTION:
The National Science
Foundation (NSF) is required to publish
notice of permit applications received to
conduct activities regulated under the
Antarctic Conservation Act of 1978.
NSF has published regulations under
the Antarctic Conservation Act at Title
45 part 670 of the Code of Federal
Regulations. This is the required notice
of permit applications received.
DATES: Interested parties are invited to
submit written data, comments, or
views with respect to this permit
application by September 21, 2011. This
application may be inspected by
interested parties at the Permit Office,
address below.
ADDRESSES: Comments should be
addressed to Permit Office, Room 755,
Office of Polar Programs, National
Science Foundation, 4201 Wilson
Boulevard, Arlington, Virginia 22230.
FOR FURTHER INFORMATION CONTACT:
Polly A. Penhale at the above address or
(703) 292–7420.
SUPPLEMENTARY INFORMATION: The
National Science Foundation, as
SUMMARY:
E:\FR\FM\22AUN1.SGM
22AUN1
Agencies
[Federal Register Volume 76, Number 162 (Monday, August 22, 2011)]
[Notices]
[Pages 52353-52354]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 2011-21350]
=======================================================================
-----------------------------------------------------------------------
NATIONAL SCIENCE FOUNDATION
Assumption Buster Workshop: ``Current Implementations of Cloud
Computing Indicate a New Approach to Security''
AGENCY: The National Coordination Office (NCO) for the Networking and
Information Technology Research and Development (NITRD) Program,
National Science Foundation.
ACTION: Call for participation.
-----------------------------------------------------------------------
FOR FURTHER INFORMATION CONTACT: assumptionbusters@nitrd.gov.
DATES: Workshop: October 21, 2011; Deadline: September 21, 2011. Apply
via e-mail to assumptionbusters@nitrd.gov. Travel expenses will be paid
for selected participants who live more than 50 miles from Washington,
DC, up to the limits established by Federal Government travel
regulations and restrictions.
SUMMARY: The NCO, on behalf of the Special Cyber Operations Research
and Engineering (SCORE) Committee, an interagency working group that
coordinates cyber security research activities in support of national
security systems, is seeking expert participants in a day-long workshop
on the pros and cons of the Security of Distributed Data Schemes. The
workshop will be held October 21, 2011 in Gaithersburg, MD.
Applications will be accepted until 5 p.m. EST September 21, 2011.
Accepted participants will be notified by October 1, 2011.
SUPPLEMENTARY INFORMATION:
Overview: This notice is issued by the National Coordination Office
for the Networking and Information Technology Research and Development
(NITRD) Program on behalf of the SCORE Committee.
Background: There is a strong and often repeated call for research
to provide novel cyber security solutions. The rhetoric of this call is
to elicit new solutions that are radically different from existing
solutions. Continuing research that achieves only incremental
improvements is a losing proposition.
We are lagging behind and need technological leaps to get, and
keep, ahead of adversaries who are themselves rapidly improving attack
technology. To answer this call, we must examine the key assumptions
that underlie current security architectures. Challenging those
assumptions both opens up the possibilities for novel solutions and
provides an even stronger basis for moving forward on those assumptions
that are well-founded. The SCORE Committee is conducting a series of
four workshops to begin the assumption buster process. The assumptions
that underlie this series are as follows: Cyber space is an adversarial
domain; the adversary is tenacious, clever, and capable; and re-
examining cyber security solutions in the context of these assumptions
will result in key insights that will lead to the novel solutions we
desperately need. To ensure that our discussion has the requisite
adversarial flavor, we are inviting researchers who develop solutions
of the type under discussion, and researchers who exploit these
solutions. The goal is to engage in robust debate of topics generally
believed to be true to determine to what extent that claim is
warranted. The adversarial nature of these debates is meant to ensure
the threat environment is reflected in the discussion in order to
elicit innovative research concepts that will have a greater chance of
having a sustained positive impact on our cyber security posture.
The fourth topic to be explored in this series is cloud computing.
The workshop on this topic will be held in Gaithersburg, MD on October
21, 2011.
Assertion: ``Current implementations of cloud computing indicate a
new approach to security''
Implementations of cloud computing have provided new ways of
thinking about how to secure data and computation. Cloud is a platform
upon which we leverage various opportunities to improve the way in
which we think about and implement the practices and technology needed
to secure the things that matter most to us. Current implementations of
cloud computing security take advantage of the unique capabilities and
architectures of cloud computing (e.g. scale).
Working from this assertion, we want researchers and cloud
implementers to submit, as part of your application to participate in
the October 21st Assumption Buster Workshop, a one-page paper stating
your opinion of the assertion and outlining your key thoughts on the
topic. Below are some additional areas to explore stated specifically
in strong language supportive of the assertion.
--Controls on provider side, controls on the subscribe-side, and
controls of the shared space in cloud implementations can be defined in
ways that allow for a comprehensive view of the cloud security
landscape to displayed and managed.
--A common security risk model can be leveraged when assessing cloud
computing services and products, and use of this model provides a
consistent baseline for Cloud based technologies.
--Cloud computing security is a natural fit when examined against the
Federal cybersecurity research themes focused on designed-in-security,
tailored trustworthy spaces, moving target, and cyber economic
incentives. These themes will be best demonstrated using Cloud
Computing.
--Opportunities exist to create existence proofs for specific security
improvements such as minimal kernels that can be formally verified
which could provide a stronger basis for virtual machines.
--We can establish a trust boundary remote-control that allows a cloud
customer to directly control system boundaries.
--Credible explications of security priorities are possible thus
enabling customers to obtain a complete picture and insight into the
security offered by their cloud implementation.
--Cloud customers are able to measure the strength of the logical
separation
[[Page 52354]]
of their cloud data from the other customers.
In this workshop, we will explore whether, or in what
circumstances, this confidence is warranted.
How To Apply
If you would like to participate in this workshop, please submit
(1) a resume or curriculum vita of no more than two pages which
highlights your expertise in this area and (2) a one-page paper stating
your opinion of the assertion and outlining your key thoughts on the
topic. The workshop will accommodate no more than 60 participants, so
these brief documents need to make a compelling case for your
participation.
Applications should be submitted electronically via e-mail to
assumptionbusters@nitrd.gov no later than 5 p.m. EST on September 21,
2011.
Selection and Notification: The SCORE committee will select an
expert group that reflects a broad range of opinions on the assertion.
Accepted participants will be notified by e-mail no later than October
1, 2011. We cannot guarantee that we will contact individuals who are
not selected, though we will attempt to do so unless the volume of
responses is overwhelming.
Dated: August 17, 2011.
Suzanne H. Plimpton,
Reports Clearance Officer, National Science Foundation.
[FR Doc. 2011-21350 Filed 8-19-11; 8:45 am]
BILLING CODE 7555-01-P