- 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
- 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
- 4、该文档为VIP文档,如果想要下载,成为VIP会员后,下载免费。
- 5、成为VIP后,下载本文档将扣除1次下载权益。下载后,不支持退款、换文档。如有疑问请联系我们。
- 6、成为VIP后,您将拥有八大权益,权益包括:VIP文档下载权益、阅读免打扰、文档格式转换、高级专利检索、专属身份标志、高级客服、多端互通、版权登记。
- 7、VIP文档为合作方或网友上传,每下载1次, 网站将根据用户上传文档的质量评分、类型等,对文档贡献者给予高额补贴、流量扶持。如果你也想贡献VIP文档。上传文档
查看更多
National Science Foundation Yale University耶鲁大学国家科学基金会
NSF Cyber Trust PI MeetingMark Seiden, Yahoo!Tomas Sander, HP LabsMoti Yung, GoogleEvelyne Viegas, Microsoft What are Underfunded Areas in Information Security and Privacy that Would (most) Benefit Industry? Methodology First, enumerate unsolved problems of Industry. + bits of wish lists from colleagues = Corpus of Unsolved Problems Make sure these are research-worthy, and require Science versus “just” engineering. To be fair, filter out those which should properly be the responsibility of industrial research organizations (not the taxpayer) = Big Unsolved Industry Problems needing NSF-funded Research Then calculate the set of NSF funded research areas…. Start with what’s being funded now Measure funding adequacy wrt hardness of problem being solved = Underfunded research areas Then simply match up the two sets and now we can talk about the common elements! Why are so many problems in industry woefully unsolved? Industry is unaware of relevant research Research papers are often not industrial-strength recipes for building anything Industry does not highly value findings without implementation and examples Legacy, complicated context, scaling problems, user expectations prevents change Hard to make business cases for disruptive change or bleeding edge technology Sometimes research is not applied skilfully Static authenticators (a source of chronic pain and suffering) … have facilitated an entire set of plagues: Identity theft (phishing, keylogging, bribery, etc) Dictionary-based/Brute force cracking which requires CAPTCHA and distributed abuse detection for defense Password reuse means the damage is often widespread. Not just passwords! We need A replacement for Social Security Number with finer grained credentials that can convey one’s limited rights (e.g. right to vote, right to drink, right to drive, right to borrow books, etc.) but not all details of identity on a single card Desirable technologies for research? R
您可能关注的文档
- Molecular Biomimetics Synthesizing Gold 分子仿生合成金.ppt
- Mola vescicolare belscienziato囊泡 belscienziato砂轮.altervista.ppt
- Molecular Cloning Methods homepage分子克隆方法网页.smc.ppt
- Molecular Computation RNA solutions to chess problems国际象棋问题的分子计算方法.ppt
- Molecular Cloning Methods Santa Monica College分子克隆方法圣莫尼卡学院.ppt
- Molecular Docking Using GOLD Aalto分子对接使用金阿尔托.ppt
- Molecular docking with ArgusLab An efficient shape 分子对接的一种有效的形状与ArgusLab.ppt
- Molecular Geometry Eleanor Roosevelt High School分子几何罗斯福埃利诺高中.ppt
- Molecular Geometry MrsDelaRiartemrsdelariarte分子几何.ppt
- Molecular Geometry Ms分子几何质谱. Allan's Biology Webpage.ppt
- National Training Facility for Hydrogen Safety Five Year Plan国家五年计划氢安全培训设施.ppt
- National Athletic Trainers‘ Association Position Statement国家运动鞋协会职位声明.ppt
- Nationalism and Cultural Landscapes民族主义与文化景观.ppt
- National Weather Service ema国家气象局EMA.alabama.gov.ppt
- Nationalism and Sectionalism in Literature Weebly民族主义和地方主义文学Weebly.ppt
- Nationalism Case Studies German Nationalism 民族主义个案研究德国民族主义.ppt
- Nationalism in Europe coachsambrooks民族主义在欧洲coachsambrooks.ppt
- Native American based Materials for Integration into 以美国本土为基础的整合为一体的材料.ppt
- NATIVE AMERICAN LITERATURE loudoun美国本土文学劳顿.k12.va.us.ppt
- Native Americans Seattle Central College土生土长的美国人西雅图中央学院.ppt
原创力文档


文档评论(0)