Assumption Buster Workshop: “Current Implementations of Cloud Computing Indicate a New Approach to Security”, 52353-52354 [2011-21350]

Download as PDF Federal Register / Vol. 76, No. 162 / Monday, August 22, 2011 / Notices 2. Consider and act on the Finance Committee’s recommendation regarding LSC’s FY 2013 appropriation request. 3. Public comment. 4. Consider and act on other business. 5. Consider and act on adjournment of meeting. CONTACT PERSON FOR INFORMATION: Katherine Ward, Executive Assistant to the Vice President & General Counsel, at (202) 295–1500. Questions may be sent by electronic mail to FR_NOTICE_QUESTIONS@lsc.gov. ACCESSIBILITY: LSC complies with the American’s with Disabilities Act and Section 504 of the 1973 Rehabilitation Act. Upon request, meeting notices and materials will be made available in alternative formats to accommodate individuals with disabilities. Individuals who need other accommodations due to disability in order to attend the meeting in person or telephonically should contact Katherine Ward, at (202) 295–1500 or FR_NOTICE_QUESTIONS@lsc.gov, at least 2 business days in advance of the meeting. If a request is made without advance notice, LSC will make every effort to accommodate the request but cannot guarantee that all requests can be fulfilled. Dated: August 18, 2011. Victor M. Fortuno, Vice President & General Counsel. [FR Doc. 2011–21551 Filed 8–19–11; 4:15 pm] BILLING CODE 7050–01–P NATIONAL SCIENCE FOUNDATION Assumption Buster Workshop: ‘‘Current Implementations of Cloud Computing Indicate a New Approach to Security’’ The National Coordination Office (NCO) for the Networking and Information Technology Research and Development (NITRD) Program, National Science Foundation. ACTION: Call for participation. AGENCY: FOR FURTHER INFORMATION CONTACT: assumptionbusters@nitrd.gov. Workshop: October 21, 2011; Deadline: September 21, 2011. Apply via e-mail to assumptionbusters@nitrd.gov. Travel expenses will be paid for selected participants who live more than 50 miles from Washington, DC, up to the limits established by Federal Government travel regulations and restrictions. SUMMARY: The NCO, on behalf of the Special Cyber Operations Research and jlentini on DSK4TPTVN1PROD with NOTICES DATES: VerDate Mar<15>2010 17:16 Aug 19, 2011 Jkt 223001 Engineering (SCORE) Committee, an interagency working group that coordinates cyber security research activities in support of national security systems, is seeking expert participants in a day-long workshop on the pros and cons of the Security of Distributed Data Schemes. The workshop will be held October 21, 2011 in Gaithersburg, MD. Applications will be accepted until 5 p.m. EST September 21, 2011. Accepted participants will be notified by October 1, 2011. SUPPLEMENTARY INFORMATION: Overview: This notice is issued by the National Coordination Office for the Networking and Information Technology Research and Development (NITRD) Program on behalf of the SCORE Committee. Background: There is a strong and often repeated call for research to provide novel cyber security solutions. The rhetoric of this call is to elicit new solutions that are radically different from existing solutions. Continuing research that achieves only incremental improvements is a losing proposition. We are lagging behind and need technological leaps to get, and keep, ahead of adversaries who are themselves rapidly improving attack technology. To answer this call, we must examine the key assumptions that underlie current security architectures. Challenging those assumptions both opens up the possibilities for novel solutions and provides an even stronger basis for moving forward on those assumptions that are well-founded. The SCORE Committee is conducting a series of four workshops to begin the assumption buster process. The assumptions that underlie this series are as follows: Cyber space is an adversarial domain; the adversary is tenacious, clever, and capable; and re-examining cyber security solutions in the context of these assumptions will result in key insights that will lead to the novel solutions we desperately need. To ensure that our discussion has the requisite adversarial flavor, we are inviting researchers who develop solutions of the type under discussion, and researchers who exploit these solutions. The goal is to engage in robust debate of topics generally believed to be true to determine to what extent that claim is warranted. The adversarial nature of these debates is meant to ensure the threat environment is reflected in the discussion in order to elicit innovative research concepts that will have a greater chance of having a sustained positive impact on our cyber security posture. The fourth topic to be explored in this series is cloud computing. The PO 00000 Frm 00051 Fmt 4703 Sfmt 4703 52353 workshop on this topic will be held in Gaithersburg, MD on October 21, 2011. Assertion: ‘‘Current implementations of cloud computing indicate a new approach to security’’ Implementations of cloud computing have provided new ways of thinking about how to secure data and computation. Cloud is a platform upon which we leverage various opportunities to improve the way in which we think about and implement the practices and technology needed to secure the things that matter most to us. Current implementations of cloud computing security take advantage of the unique capabilities and architectures of cloud computing (e.g. scale). Working from this assertion, we want researchers and cloud implementers to submit, as part of your application to participate in the October 21st Assumption Buster Workshop, a onepage paper stating your opinion of the assertion and outlining your key thoughts on the topic. Below are some additional areas to explore stated specifically in strong language supportive of the assertion. —Controls on provider side, controls on the subscribe-side, and controls of the shared space in cloud implementations can be defined in ways that allow for a comprehensive view of the cloud security landscape to displayed and managed. —A common security risk model can be leveraged when assessing cloud computing services and products, and use of this model provides a consistent baseline for Cloud based technologies. —Cloud computing security is a natural fit when examined against the Federal cybersecurity research themes focused on designed-in-security, tailored trustworthy spaces, moving target, and cyber economic incentives. These themes will be best demonstrated using Cloud Computing. —Opportunities exist to create existence proofs for specific security improvements such as minimal kernels that can be formally verified which could provide a stronger basis for virtual machines. —We can establish a trust boundary remote-control that allows a cloud customer to directly control system boundaries. —Credible explications of security priorities are possible thus enabling customers to obtain a complete picture and insight into the security offered by their cloud implementation. —Cloud customers are able to measure the strength of the logical separation E:\FR\FM\22AUN1.SGM 22AUN1 52354 Federal Register / Vol. 76, No. 162 / Monday, August 22, 2011 / Notices of their cloud data from the other customers. In this workshop, we will explore whether, or in what circumstances, this confidence is warranted. How To Apply If you would like to participate in this workshop, please submit (1) a resume or curriculum vita of no more than two pages which highlights your expertise in this area and (2) a one-page paper stating your opinion of the assertion and outlining your key thoughts on the topic. The workshop will accommodate no more than 60 participants, so these brief documents need to make a compelling case for your participation. Applications should be submitted electronically via e-mail to assumptionbusters@nitrd.gov no later than 5 p.m. EST on September 21, 2011. Selection and Notification: The SCORE committee will select an expert group that reflects a broad range of opinions on the assertion. Accepted participants will be notified by e-mail no later than October 1, 2011. We cannot guarantee that we will contact individuals who are not selected, though we will attempt to do so unless the volume of responses is overwhelming. Dated: August 17, 2011. Suzanne H. Plimpton, Reports Clearance Officer, National Science Foundation. [FR Doc. 2011–21350 Filed 8–19–11; 8:45 am] BILLING CODE 7555–01–P NATIONAL SCIENCE FOUNDATION Notice of Permit Application Received Under the Antarctic Conservation Act of 1978 National Science Foundation. Notice of Permit Applications Received Under the Antarctic Conservation Act. AGENCY: ACTION: Notice is hereby given that the National Science Foundation (NSF) has received a waste management permit application for operation of a field research camp located in ASPA #149–Cape Shirreff, Livingston Island by the Antarctic Marine Living Resources (AMLR) Program, Southwest Fisheries Science Center, La Jolla, CA. The application is submitted to NSF pursuant to regulations issued under the Antarctic Conservation Act of 1978. DATES: Interested parties are invited to submit written data, comments, or views with respect to this permit application within September 21, 2011. jlentini on DSK4TPTVN1PROD with NOTICES SUMMARY: VerDate Mar<15>2010 17:16 Aug 19, 2011 Jkt 223001 Permit applications may be inspected by interested parties at the Permit Office, address below. ADDRESSES: Comments should be addressed to Permit Office, Room 755, Office of Polar Programs, National Science Foundation, 4201 Wilson Boulevard, Arlington, Virginia 22230. FOR FURTHER INFORMATION CONTACT: Dr. Polly A. Penhale at the above address or (703) 292–8030. SUPPLEMENTARY INFORMATION: NSF’s Antarctic Waste Regulation, 45 CFR part 671, requires all U.S. citizens and entities to obtain a permit for the use or release of a designated pollutant in Antarctica, and for the release of waste in Antarctica. NSF has received a permit application under this Regulation for operation of remote research field camp at ASPA #149 Cape Shirreff, Livingston Island. The camp consists of four structures on the beach between Llano Point and Sphinx Hill which has been in use during the summer since 1977. The camp is used to house researchers (typically 6 people), provide a base of research operations, and allow laboratory studies. Biological investigation of seabirds and pinnipeds is the primary research conducted from the camp. Designated pollutants would be associated with camp operations [typically air emissions and waste water (urine, grey-water, and human solid waste)] and scientific activities (typically research materials). All wastes would be packaged and removed from the site for proper disposal in Chile or the U.S. under approved guidelines prior to the end of each season. In addition, the AMLR Program conducts 30–90 days of vessel operations in the Antarctic Peninsula region. The vessel follows a standardized survey grid, and depending on the focus any given year, additional smaller sections of the region are surveyed. During annual surveys, the Program deploys drifters and expendable bathythermographs (XBT’s) to collect hydrographic data. In addition to drifters and XBT’s, the AMLR Program also deploys and recovers a variety of gear that are not intentionally released into the environment: (1) Conductivity-Temperature-Depth profilers (CTD’s) are lowered to collect water in attached PCV bottles. Due to storms or heavy waves the bottles can be broken and release plastic into the ocean. (2) Fishing nets: (a) Plankton nets come in a variety of configurations and sizes. The Program has lost a net ad frame once every 3–5 years. (B) Commercial bottom trawl nets are PO 00000 Frm 00052 Fmt 4703 Sfmt 4703 deployed every two to three years. Due to the submarine terrain being volcanic, ice scoured and highly variable in makeup, trawls can be lost if the trawl is snagged on boulders or rock outcroppings. (3) Other gears: Towed or undulating instruments (e.g. Continuous plankton recorder, Winged Optical Particle Counters, towed Current profilers) can be lost. In many cases these instruments, if lost are buoyant, and can be recovered. In other cases, the instruments are heavy, and made of mostly metal and sink in the rather deep water surrounding the Antarctic Continent. The permit applicant is: George Watters, Director, US AMLR Program, Southwest Fisheries Service, NOAA, 8604 La Jolla Shores Drive, La Jolla, CA 92037 Permit application No. 2012 WM–001. Nadene G. Kennedy, Permit Officer. [FR Doc. 2011–21295 Filed 8–19–11; 8:45 am] BILLING CODE 7555–01–P NATIONAL SCIENCE FOUNDATION Notice of Permit Applications Received Under the Antarctic Conservation Act of 1978 (Pub. L. 95–541) National Science Foundation. Notice of Permit Applications Received under the Antarctic Conservation Act of 1978, Public Law 95–541. AGENCY: ACTION: The National Science Foundation (NSF) is required to publish notice of permit applications received to conduct activities regulated under the Antarctic Conservation Act of 1978. NSF has published regulations under the Antarctic Conservation Act at Title 45 part 670 of the Code of Federal Regulations. This is the required notice of permit applications received. DATES: Interested parties are invited to submit written data, comments, or views with respect to this permit application by September 21, 2011. This application may be inspected by interested parties at the Permit Office, address below. ADDRESSES: Comments should be addressed to Permit Office, Room 755, Office of Polar Programs, National Science Foundation, 4201 Wilson Boulevard, Arlington, Virginia 22230. FOR FURTHER INFORMATION CONTACT: Polly A. Penhale at the above address or (703) 292–7420. SUPPLEMENTARY INFORMATION: The National Science Foundation, as SUMMARY: E:\FR\FM\22AUN1.SGM 22AUN1

Agencies

[Federal Register Volume 76, Number 162 (Monday, August 22, 2011)]
[Notices]
[Pages 52353-52354]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 2011-21350]


=======================================================================
-----------------------------------------------------------------------

NATIONAL SCIENCE FOUNDATION


Assumption Buster Workshop: ``Current Implementations of Cloud 
Computing Indicate a New Approach to Security''

AGENCY: The National Coordination Office (NCO) for the Networking and 
Information Technology Research and Development (NITRD) Program, 
National Science Foundation.

ACTION: Call for participation.

-----------------------------------------------------------------------

FOR FURTHER INFORMATION CONTACT: assumptionbusters@nitrd.gov.

DATES: Workshop: October 21, 2011; Deadline: September 21, 2011. Apply 
via e-mail to assumptionbusters@nitrd.gov. Travel expenses will be paid 
for selected participants who live more than 50 miles from Washington, 
DC, up to the limits established by Federal Government travel 
regulations and restrictions.
SUMMARY: The NCO, on behalf of the Special Cyber Operations Research 
and Engineering (SCORE) Committee, an interagency working group that 
coordinates cyber security research activities in support of national 
security systems, is seeking expert participants in a day-long workshop 
on the pros and cons of the Security of Distributed Data Schemes. The 
workshop will be held October 21, 2011 in Gaithersburg, MD. 
Applications will be accepted until 5 p.m. EST September 21, 2011. 
Accepted participants will be notified by October 1, 2011.

SUPPLEMENTARY INFORMATION: 
    Overview: This notice is issued by the National Coordination Office 
for the Networking and Information Technology Research and Development 
(NITRD) Program on behalf of the SCORE Committee.
    Background: There is a strong and often repeated call for research 
to provide novel cyber security solutions. The rhetoric of this call is 
to elicit new solutions that are radically different from existing 
solutions. Continuing research that achieves only incremental 
improvements is a losing proposition.
    We are lagging behind and need technological leaps to get, and 
keep, ahead of adversaries who are themselves rapidly improving attack 
technology. To answer this call, we must examine the key assumptions 
that underlie current security architectures. Challenging those 
assumptions both opens up the possibilities for novel solutions and 
provides an even stronger basis for moving forward on those assumptions 
that are well-founded. The SCORE Committee is conducting a series of 
four workshops to begin the assumption buster process. The assumptions 
that underlie this series are as follows: Cyber space is an adversarial 
domain; the adversary is tenacious, clever, and capable; and re-
examining cyber security solutions in the context of these assumptions 
will result in key insights that will lead to the novel solutions we 
desperately need. To ensure that our discussion has the requisite 
adversarial flavor, we are inviting researchers who develop solutions 
of the type under discussion, and researchers who exploit these 
solutions. The goal is to engage in robust debate of topics generally 
believed to be true to determine to what extent that claim is 
warranted. The adversarial nature of these debates is meant to ensure 
the threat environment is reflected in the discussion in order to 
elicit innovative research concepts that will have a greater chance of 
having a sustained positive impact on our cyber security posture.
    The fourth topic to be explored in this series is cloud computing. 
The workshop on this topic will be held in Gaithersburg, MD on October 
21, 2011.
    Assertion: ``Current implementations of cloud computing indicate a 
new approach to security''
    Implementations of cloud computing have provided new ways of 
thinking about how to secure data and computation. Cloud is a platform 
upon which we leverage various opportunities to improve the way in 
which we think about and implement the practices and technology needed 
to secure the things that matter most to us. Current implementations of 
cloud computing security take advantage of the unique capabilities and 
architectures of cloud computing (e.g. scale).
    Working from this assertion, we want researchers and cloud 
implementers to submit, as part of your application to participate in 
the October 21st Assumption Buster Workshop, a one-page paper stating 
your opinion of the assertion and outlining your key thoughts on the 
topic. Below are some additional areas to explore stated specifically 
in strong language supportive of the assertion.

--Controls on provider side, controls on the subscribe-side, and 
controls of the shared space in cloud implementations can be defined in 
ways that allow for a comprehensive view of the cloud security 
landscape to displayed and managed.
--A common security risk model can be leveraged when assessing cloud 
computing services and products, and use of this model provides a 
consistent baseline for Cloud based technologies.
--Cloud computing security is a natural fit when examined against the 
Federal cybersecurity research themes focused on designed-in-security, 
tailored trustworthy spaces, moving target, and cyber economic 
incentives. These themes will be best demonstrated using Cloud 
Computing.
--Opportunities exist to create existence proofs for specific security 
improvements such as minimal kernels that can be formally verified 
which could provide a stronger basis for virtual machines.
--We can establish a trust boundary remote-control that allows a cloud 
customer to directly control system boundaries.
--Credible explications of security priorities are possible thus 
enabling customers to obtain a complete picture and insight into the 
security offered by their cloud implementation.
--Cloud customers are able to measure the strength of the logical 
separation

[[Page 52354]]

of their cloud data from the other customers.

    In this workshop, we will explore whether, or in what 
circumstances, this confidence is warranted.

How To Apply

    If you would like to participate in this workshop, please submit 
(1) a resume or curriculum vita of no more than two pages which 
highlights your expertise in this area and (2) a one-page paper stating 
your opinion of the assertion and outlining your key thoughts on the 
topic. The workshop will accommodate no more than 60 participants, so 
these brief documents need to make a compelling case for your 
participation.
    Applications should be submitted electronically via e-mail to 
assumptionbusters@nitrd.gov no later than 5 p.m. EST on September 21, 
2011.
    Selection and Notification: The SCORE committee will select an 
expert group that reflects a broad range of opinions on the assertion. 
Accepted participants will be notified by e-mail no later than October 
1, 2011. We cannot guarantee that we will contact individuals who are 
not selected, though we will attempt to do so unless the volume of 
responses is overwhelming.

    Dated: August 17, 2011.
Suzanne H. Plimpton,
Reports Clearance Officer, National Science Foundation.
[FR Doc. 2011-21350 Filed 8-19-11; 8:45 am]
BILLING CODE 7555-01-P
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.