National Academies Press: OpenBook

Software Update as a Mechanism for Resilience and Security: Proceedings of a Workshop (2017)

Chapter: Appendix B: Steering Committee Biographies

« Previous: Appendix A: Workshop Agenda and Participants List
Suggested Citation:"Appendix B: Steering Committee Biographies." National Academies of Sciences, Engineering, and Medicine. 2017. Software Update as a Mechanism for Resilience and Security: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/24833.
×

B

Steering Committee Biographies

FRED B. SCHNEIDER is the Samuel B. Eckert Professor of Computer Science at Cornell University and chair of the department. He joined Cornell’s faculty in fall 1978, having completed a Ph.D. at Stony Brook University and a B.S. in engineering at Cornell in 1975. Schneider’s research has always concerned various aspects of trustworthy systems—systems that will perform as expected, despite failures and attacks. Most recently, his interests have focused on system security. His work characterizing what policies can be enforced with various classes of defenses is widely cited, and it is seen as advancing the nascent science base for security. He is also engaged in research concerning legal and economic measures for improving system trustworthiness. Schneider was elected a fellow of the American Association for the Advancement of Science (AAAS, 1992), the Association of Computing Machinery (ACM, 1995), and the Institute of Electrical and Electronics Engineers (IEEE, 2008). He was named professor-at-large at the University of Tromso (Norway) in 1996 and was awarded a doctor of science honoris causa by the University of Newcastle-upon-Tyne in 2003 for his work in computer dependability and security. He received the 2012 IEEE Emanuel R. Piore Award for “contributions to trustworthy computing through novel approaches to security, fault-tolerance, and formal methods for concurrent and distributed systems.” The National Academy of Engineering (NAE) elected Schneider to membership in 2011, and the Norges Tekniske Vitenskapsakademi (Norwegian Academy of Technological Sciences) named him a foreign member in 2010. He is currently a member of the Naval Studies Board and the Computer Science and Telecommunications Board of the National Academies of Sciences, Engineering, and Medicine, and is founding chair of the National Academies’ Forum on Cyber Resilience.

ANITA L. ALLEN is the Henry R. Silverman Professor of Law and Professor of Philosophy at the University of Pennsylvania Law School, where she is also the university’s vice provost for faculty. She is an expert on privacy law, bioethics, and contemporary values, and is recognized for her scholarship about legal philosophy, women’s rights, and race relations. In 2010 she was appointed by President Obama to the Presidential Commission for the Study of Bioethical Issues. Her books include Unpopular Privacy: What Must We Hide (2011); Privacy Law and Society (2011); The New Ethics: A Guided Tour of the 21st Century Moral Landscape (2004); Why Privacy Isn’t Everything: Feminist Reflections on

Suggested Citation:"Appendix B: Steering Committee Biographies." National Academies of Sciences, Engineering, and Medicine. 2017. Software Update as a Mechanism for Resilience and Security: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/24833.
×

Personal Accountability (2003); and Uneasy Access: Privacy for Women in a Free Society (1988). She co-edited (with Milton Regan) Debating Democracy’s Discontent (1998). Allen, who has written more than a 100 scholarly articles, has also contributed to popular magazines and blogs and has frequently appeared on nationally broadcast television and radio programs. She has served on numerous editorial and advisory boards and on the boards of a number of local and national nonprofits and professional associations, including the Hastings Center, the Electronic Information Privacy Center, and the Bazelon Center for Mental Health Law.

ERIC GROSSE is a senior member of the Google security team and was previously vice president, Security & Privacy Engineering, at Google in Mountain View, California, leading a team of 512 who ensure systems and data stay safe and users’ privacy remains secure. Improved and wider use of SSL, stronger consumer authentication technology, detection and blocking of espionage, transparency on legal requests for data, sophisticated malware analysis, tools and frameworks for safer building of Web applications are among the achievements of the Google Security Team. Before Google, Grosse was a research director and fellow at Lucent Bell Labs where he worked on security, networking, algorithms for approximation and visualization, software distribution, and scientific computing. He has a Ph.D. in computer science from Stanford University.

BUTLER W. LAMPSON is a technical fellow at Microsoft Corporation and an adjunct professor at the Massachusetts Institute of Technology (MIT). He has worked on computer architecture, local area networks, raster printers, page description languages, operating systems, remote procedure call, programming languages and their semantics, programming in the large, fault-tolerant computing, transaction processing, computer security, WYSIWYG editors, and tablet computers. He was one of the designers of the SDS 940 time-sharing system, the Alto personal distributed computing system, the Xerox 9700 laser printer, two-phase commit protocols, the Autonet LAN, the SPKI system for network security, the Microsoft Tablet PC software, the Microsoft Palladium high-assurance stack, and several programming languages. He received the ACM Software Systems Award in 1984 for his work on the Alto, the IEEE Computer Pioneer award in 1996, the von Neumann Medal in 2001, the Turing Award in 1992, and the NAE’s Draper Prize in 2004. He is a member of the National Academy of Sciences and the NAE and a fellow of the ACM and the American Academy of Arts and Sciences.

SUSAN LANDAU is a professor of cybersecurity policy in the Department of Social Science and Policy Studies at Worcester Polytechnic Institute. Landau has been a senior

Suggested Citation:"Appendix B: Steering Committee Biographies." National Academies of Sciences, Engineering, and Medicine. 2017. Software Update as a Mechanism for Resilience and Security: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/24833.
×

staff privacy analyst at Google, a Distinguished Engineer at Sun Microsystems, a faculty member at the University of Massachusetts, Amherst, and at Wesleyan University. She has held visiting positions at Harvard, Cornell, Yale, and the Mathematical Sciences Research Institute. Landau is the author of Surveillance or Security? The Risks Posed by New Wiretapping Technologies (2011) and co-author, with Whitfield Diffie, of Privacy on the Line: The Politics of Wiretapping and Encryption (1998, rev. ed. 2007). She has written numerous computer science and public policy papers and op-eds on cybersecurity and encryption policy and testified to Congress on the security risks of wiretapping and on cybersecurity activities at National Institute of Standards and Technology’s Information Technology Laboratory. Landau currently serves on the Computer Science Telecommunications Board of the National Academies. A 2012 Guggenheim fellow, Landau was a 2010–2011 fellow at the Radcliffe Institute for Advanced Study, the recipient of the 2008 Women of Vision Social Impact Award, and a fellow of the AAAS and the ACM. She received her B.A. from Princeton University, her M.S. from Cornell University, and her Ph.D. from MIT.

Suggested Citation:"Appendix B: Steering Committee Biographies." National Academies of Sciences, Engineering, and Medicine. 2017. Software Update as a Mechanism for Resilience and Security: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/24833.
×
Page 75
Suggested Citation:"Appendix B: Steering Committee Biographies." National Academies of Sciences, Engineering, and Medicine. 2017. Software Update as a Mechanism for Resilience and Security: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/24833.
×
Page 76
Suggested Citation:"Appendix B: Steering Committee Biographies." National Academies of Sciences, Engineering, and Medicine. 2017. Software Update as a Mechanism for Resilience and Security: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/24833.
×
Page 77
Next: Appendix C: Speaker Biographies »
Software Update as a Mechanism for Resilience and Security: Proceedings of a Workshop Get This Book
×
Buy Paperback | $60.00 Buy Ebook | $48.99
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

Software update is an important mechanism by which security changes and improvements are made in software, and this seemingly simple concept encompasses a wide variety of practices, mechanisms, policies, and technologies. To explore the landscape further, the Forum on Cyber Resilience hosted a workshop featuring invited speakers from government, the private sector, and academia. This publication summarizes the presentations and discussions from the workshop.

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    Switch between the Original Pages, where you can read the report as it appeared in print, and Text Pages for the web version, where you can highlight and search the text.

    « Back Next »
  6. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  7. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  8. ×

    View our suggested citation for this chapter.

    « Back Next »
  9. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!