sigsac-logo

The First ACM Workshop on Scalable Trusted Computing (STC'06)




Invited Talk I: Scalable Trust: Engineering Challenge or Complexity Barrier?

by Kenneth P. Birman, Cornell University

Abstract. We're rapidly entering a new world in which management of large-scale, dynamically evolving, trust relationships and security policies will be of critical importance.  Potential applications range from electronic medical health record management to protection of private banking data.  Yet we lack a scalable trust-management and enforcement technology. This talk asks to what extent these challenges can be solved, with the goal of identifying open problems on which basic research will be needed.


BIO. Ken Birman is Professor of Computer Science at Cornell University. He is best known for developing the Isis Toolkit and founding a company, Isis Distributed Systems, which introduced the virtual synchrony execution model for multicast communication and then used it as the basis for a wide range of robust software solutions for stock exchanges, air traffic control, and factory automation. Although the company no longer exists, Isis continues to operate the New York and Swiss Stock Exchanges, the French air traffic control system, and the US Navy AEGIS warship. The technology permits these and other systems to automatically adapt themselves when failures or other disruptions occur, to securely share keys and security policy data, and to replicate critical services so that availability can be maintained even while some system components are down. Birman is also the author of several books, most recently "Reliable Distributed Computing: Technologies, Web Services, and Applications", which was published by Springer-Verlag in May of 2005. He was Editor in Chief of ACM Transactions on Computer Systems from 1993-1998 and is a Fellow of the ACM. Starting in 1990, Birman’s primary research emphasis has been on scalability of distributed systems, security technologies, and system management tools. A complete list of publications can be found at  http://www.cs.cornell.edu/ken



Invited Talk II: The Role of Trusted Computing in Internet Scale DRM


by Geoffrey Strongin (AMD)


Abstract. The XRI Data Interchange (XDI) protocols and schemas provide a foundation for internet scale exchange of data between parties based on mutually agreed upon policies.  Local enforcement of the policy and the preservation of the persistent binding between the data and policy imply a local policy enforcement system.  This talk explores the relationship between trusted computing, remote attestation and local policy enforcement capabilities in an Internet scale environment.

BIO. Geoffrey Strongin is an AMD Fellow, and serves as AMD’s chief platform security architect.  In this role he contributes to the definition of security features incorporated into AMD’s processors and supporting platforms.  A long-time supporter of Trusted Computing, Mr. Strongin was a founding board member of the Trusted Computing Group.  Mr. Strongin also serves as co-chair of the OASIS XDI Technical Committee, and is Member of the Board of Trustees of XDI.ORG, a non-profit public-trust organization responsible for overseeing and administering XDI-based global services. Mr. Strongin’s outside interests include the intersection of technology, public policy and law.  An award winning designer with over 30 patents, Mr. Strongin holds a BSEE degree from Arizona State University.