You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 5 Next »

Co-Leaders

  • Mark Cather – University of Maryland, Baltimore County
  • J. Scott Ransbottom – Virginia Tech
  • Donna Tatro – Princeton University


Draft Scope Statement:

Develop an architecture and implementation approach to enable “End to end trust and security” for the Research & Education community

Note: Address trust, identity, privacy, physical & cyber security, compliance, etc.

Potential areas for innovation
  • Scalable and extensible approaches integrating capabilities for trust, identify, privacy, security, compliance
  • “Chip to device to network to clouds” trust and security models
Some related initiatives
  • Many individual member institution programs
  • InCommon, TIER, NET+, Internet2 CCSO initiatives
  • External organizations e.g., NIST, Cloud Security Alliance, the International Association of Privacy Professionals
A few potential use cases
  • Protection of sensitive and regulated research data
  • Mitigation of risks to enterprise operations
  • Material for new educational programs

 

 

 

First NameLast NameOrganization
CraigAndersonUniversity of Central Florida
EdwardAractingi  Marshall University
MarkArmstrongOracle
GerardAubertUniversity of Central Florida
PatriciaBeaneNorthrup Grumman
DavidBlahutVassar
BobBrammerInternet2
StevenCarmodyBrown University
MarkCatherUniversity of Maryland, Baltimore County
MaryDunkerVirginia Tech
LesterEisnerUniversity of South Carolina
PeterElfordAARNet
DeborahEverhartBlackboard
JillGemmill

Clemson University

   
   

 

 

  • No labels