Last updated: 05/10/2004 16:36:57 -0400

Schedule

 

Date

Presenters

Topic Suggested Reading
1

Jan. 13

  Overview  
2 Jan. 20 Ashley Green,
Brad Rosen
Smart Environments
(ppt, pdf)
2 Jan. 27 Ashley Green,
Brad Rosen
Distributed Sharing of Resources
(ppt, pdf)
3 Feb. 3 Hong Ge, Zheng Ma, Wesley C. Maness Distributed Storage
(ppt, pdf)
4 Feb. 10 Diego Montenegro, Andrew Park, Raghava Vellanki Distributed Interactive Applications (ppt, pdf)
5 Feb. 17 Ashley Green,
Brad Rosen
Communication Infrastructure: the Optical Backbone Networks
(ppt, pdf)
6 Feb. 24 Diego Montenegro, Andrew Park, Raghava Vellanki Protecting the Infrastructure
(ppt, pdf)
  • In July, 1996 the President's Commission on Critical Infrastructure Protection was established as the first national effort to address the vulnerabilities created in the new information age. http://www.info-sec.com/pccip/web/

  • In February 1998, the FBI established the National Infrastructure Protection Center (NIPC), which has the mission to serve as the U.S. government's focal point for threat assessment, warning, investigation, and response for threats or attacks against our critical infrastructures. http://www.nipc.gov/index.html

  • In last summer, James Adams in his "Virtual Defense" article in Foreign Affairs, argued that given the U.S. military dominance and high-tech weapons, the next war is apt to be against the highly insecure civilian infrastructure through their information systems. Thomas Friedman in his July 27 New York Times article claimed that cyberattack is the big threat, not atomic bombs.

  • Last October the President created the Office of Homeland Security, the Homeland Security Council and the President's Critical Infrastructure Protection Board to recommend policies and coordinate programs protecting information systems for critical infrastructure. http://www.ciao.gov

  • Last fall the Congress has been working on bills to support the improvement of vulnerability assessment and technological and systems solutions

  • "Practical Network Support for IP Traceback," Stefan Savage, David Wetherall, Anna Karlin, Tom Anderson, In SIGCOMM 2001.

  • "SOS: Secure Overlay Services," A. Keromytis, V. Misra  and D. Rubenstein, SIGCOMM 2002.

7 Mar. 2 Hong Ge, Zheng Ma, and Wesley C. Maness Querying the Internet and the Web
(ppt, pdf)
8 Mar. 23 Yinghua Wu, Haiyong Xie Sensor Database
(ppt, pdf)
9 Mar. 30 David Goldenberg Unconventional Database
10 Apr. 6 Hong Ge, Zheng Ma, Wesley C. Maness Protecting the Privacy of Data
(ppt, pdf)
11 Apr. 13 Dimitrios Lymberopoulos Operating Systems for Embedded/Low Power Systems
(ppt, pdf)
12 Apr. 20 Yinghua Wu, Haiyong Xie Designing and Debugging Distributed Large-scale Systems
(ppt, pdf)
        Summary of Black Boxes (ppt, pdf)
  5:00PM
May 11
Survey due