- About
- Courses
- Research
- Computational Social Science
- Critical Data Studies
- Data Science
- Economics and Information
- Education Technology
- Ethics, Law and Policy
- Human-Computer Interaction
- Human-Robot Interaction
- Incentives and Computation
- Infrastructure Studies
- Interface Design and Ubiquitous Computing
- Natural Language Processing
- Network Science
- Social Computing and Computer-supported Cooperative Work
- Technology and Equity
- People
- Career
- Undergraduate
- Info Sci Majors
- BA - Information Science (College of Arts & Sciences)
- BS - Information Science (CALS)
- BS - Information Science, Systems, and Technology
- MPS Early Credit Option
- Independent Research
- CPT Procedures
- Student Associations
- Undergraduate Minor in Info Sci
- Our Students and Alumni
- Graduation Info
- Contact Us
- Info Sci Majors
- Masters
- PHD
- Prospective PhD Students
- Admissions
- Degree Requirements and Curriculum
- Grad Student Orgs
- For Current PhDs
- Diversity and Inclusion
- Our Students and Alumni
- Graduation Info
- Program Contacts and Student Advising
The Tech/Law Colloquium speaker for Tuesday, October 31, will be Fred Schneider, Samuel B. Eckert Professor of Computer Science at Cornell University and chair of the department. Schneider's research has focused on various aspects of trustworthy systems --- systems that will perform as expected, despite failures and attacks. His early work concerned formal methods to aid in the design and implementation of concurrent and distributed systems that satisfy their specifications. He is author of two texts on that subject: On Concurrent Programming and (co-authored with D. Gries)A Logical Approach to Discrete Mathematics. He is also known for his research in theory and algorithms for building fault-tolerant distributed systems. His paper on the "state machine approach" for managing replication received (in 2007) an SOSP "Hall of Fame" award for seminal research. And his paper on fail-stop processors (with Richard Schlichting) received the Jean-Claude Laprie Award in Dependable Computing. More recently, his interests have turned to system security. His work characterizing what policies can be enforced with various classes of defenses is widely cited, and it is seen as advancing the nascent science base for security. He is also engaged in research concerning legal and economic measures for improving system trustworthiness.
Talk: A Doctrine of Public Cybersecurity
Abstract: With increasing dependence on networked computing systems comes increasing vulnerability. The vulnerabilities are mostly technical in origin, but their remediation is not. Only by coupling technical insights with public policy do we stand a good chance to create a safer and more secure cyberspace. This talk will survey the landscape, discuss why past doctrines have failed, and propose a new doctrine of Public Cybersecurity. Applications to definitions and implementation of privacy will be discussed (Joint work with Deirdre Mulligan and Eleanor Birrell).