| 15 | The goal of this session is to discuss the following five questions: |
| 16 | |
| 17 | 1. what kind of security experiments can be run on GENI? |
| 18 | 2. are any of these new classes of experiments that are particular to GENI? |
| 19 | 3. what modifications might be needed to GENI policies or infrastructure to enable such experiments to be run? |
| 20 | 4. if or how should GENI Operations should be involved with security experiments? |
| 21 | 5. what is considered a "security"-relevant experiment? |
| 22 | |
| 23 | We will have short presentations from Gale Pomper (Indiana Univ.) and Stephen Schwab (USC ISI) followed by a (moderated) group discussion. |
| 24 | |