Project Status Report Period: April 1, 2011 - August 11, 2011 I. Major accomplishments We held a workshop on attribution at GEC11. We had 20 attendees, which is quite good considering that members of related projects came, and the workshop was on the last day. We are currently going through the scribe notes from that workshop. One of our papers, "Attribution Requirements for Next Generation Internets," was accepted at the 2011 IEEE International Conference on Technologies for Homeland Security in November. We submitted a second paper, "Insider and Outsider," to the Third International Workshop on Managing Insider Security Threats, also in November A. Milestones achieved (Modified) Attrib: S3.a, report begun; will be completed after workshop is held (Modified) Attrib: S3.b, workshop held at GEC11 B. Deliverables made N/A II. Description of work performed during last quarter A. Activities and findings We worked on the workshop, two papers, and the report during this time period. We held a workshop on attribution at GEC11. We are still going through the scribe notes. There is plenty of interest in the overall framework. A key question is how to make the implementation of the framework as useful as possible; clearly, flexibility is one of the key issues, as is the ability to handle attribution at multiple levels and trying to define a standard notion of "levels of assurance". We will be examining these points, and others, in light of the work being done by other projects in GENI (specifically, NetKarma, LIFA/Shibboleth, and ABAC). Our paper highlighting attribution requirements for future Internet testbeds, and future Internets was accepted by the 2011 IEEE International Conference on Technologies for Homeland Security. In conjunction with other (non-GENI) work on the insider problem, we observed that there is a fundamental difference between resource attributes and use attributes (namely, the use to which the resource is put), and that this can be used to characterize attacks as "insider" and "outsider". We wrote a short paper on this observation, and submitted it to the Third International Workshop on Managing Insider Security Threats B. Project participants Matt Bishop, University of California at Davis Jeffrey Hunker, Jeffrey Hunker Associates Carrie Gates, CA Technologies C. Publications (individual and organizational) J. Hunker, C. Gates, and M. Bishop, "Attribution Requirements for Next Generation Internets," to appear in the Proceedings of the 2011 IEEE International Conference on Technologies for Homeland Security in November D. Outreach activities N/A E. Collaborations N/A F. Other Contributions N/A