Co-Leaders
- Mark Cather – University of Maryland, Baltimore County
- J. Scott Ransbottom – Virginia Tech
- Donna Tatro – Princeton University
Draft Scope Statement:
Develop an architecture and implementation approach to enable “End to end trust and security” for the Research & Education community
Note: Address trust, identity, privacy, physical & cyber security, compliance, etc.
Potential areas for innovation
- Scalable and extensible approaches integrating capabilities for trust, identify, privacy, security, compliance
- “Chip to device to network to clouds” trust and security models
Some related initiatives
- Many individual member institution programs
- InCommon, TIER, NET+, Internet2 CCSO initiatives
- External organizations e.g., NIST, Cloud Security Alliance, the International Association of Privacy Professionals
A few potential use cases
- Protection of sensitive and regulated research data
- Mitigation of risks to enterprise operations
- Material for new educational programs
First Name | Last Name | Organization |
---|---|---|
Craig | Anderson | University of Central Florida |
Edward | Aractingi | Marshall University |
Mark | Armstrong | Oracle |
Gerard | Aubert | University of Central Florida |
Patricia | Beane | Northrup Grumman |
David | Blahut | Vassar |
Bob | Brammer | Internet2 |
Steven | Carmody | Brown University |
Mark | Cather | University of Maryland, Baltimore County |
Mary | Dunker | Virginia Tech |
Lester | Eisner | University of South Carolina |
Peter | Elford | AARNet |
Deborah | Everhart | Blackboard |
Jill | Gemmill | Clemson University |