AttributionForGENI: 2011-t2.txt

File 2011-t2.txt, 2.6 KB (added by bishop@cs.ucdavis.edu, 13 years ago)
Line 
1Project Status Report
2Period: April 1, 2011 - August 11, 2011
3
4I. Major accomplishments
5
6We held a workshop on attribution at GEC11. We had 20 attendees, which is quite good considering that members of related projects came, and the workshop was on the last day. We are currently going through the scribe notes from that workshop.
7
8One of our papers, "Attribution Requirements for Next Generation Internets," was accepted at the 2011 IEEE International Conference on Technologies for Homeland Security in November.
9
10We submitted a second paper, "Insider and Outsider," to the Third International Workshop on Managing Insider Security Threats, also in November
11
12A. Milestones achieved
13
14(Modified) Attrib: S3.a, report begun; will be completed after workshop is held
15(Modified) Attrib: S3.b, workshop held at GEC11
16
17B. Deliverables made
18
19N/A
20
21II. Description of work performed during last quarter
22
23A. Activities and findings
24
25We worked on the workshop, two papers, and the report during this time period.
26
27We held a workshop on attribution at GEC11. We are still going through the scribe notes. There is plenty of interest in the overall framework. A key question is how to make the implementation of the framework as useful as possible; clearly, flexibility is one of the key issues, as is the ability to handle attribution at multiple levels and trying to define a standard notion of "levels of assurance". We will be examining these points, and others, in light of the work being done by other projects in GENI (specifically, NetKarma, LIFA/Shibboleth, and ABAC).
28
29Our paper highlighting attribution requirements for future Internet testbeds, and future Internets was accepted by the 2011 IEEE International Conference on Technologies for Homeland Security.
30
31In conjunction with other (non-GENI) work on the insider problem, we observed that there is a fundamental difference between resource attributes and use attributes (namely, the use to which the resource is put), and that this can be used to characterize attacks as "insider" and "outsider". We wrote a short paper on this observation, and submitted it to the Third International Workshop on Managing Insider Security Threats
32
33B. Project participants
34
35Matt Bishop, University of California at Davis
36Jeffrey Hunker, Jeffrey Hunker Associates
37Carrie Gates, CA Technologies
38
39C. Publications (individual and organizational)
40
41J. Hunker, C. Gates, and M. Bishop, "Attribution Requirements for Next Generation Internets," to appear in the Proceedings of the 2011 IEEE International Conference on Technologies for Homeland Security in November
42
43D. Outreach activities
44
45N/A
46
47E. Collaborations
48
49N/A
50
51F. Other Contributions
52
53N/A
54