ABSTRACT

2004 Research and Development Exchange Workshop Proceedings: A Year Later: Research and Development Issues to Ensure Trustworthiness in Telecommunications and Information Systems that Directly or Indirectly Impact National Security and Emergency Preparedness   [open pdf - 705KB]

"From October 28 to October 29, 2004, the President's National Security Telecommunications Advisory Committee (NSTAC) conducted its sixth Research and Development Exchange (RDX) Workshop entitled, A Year Later: Research and Development Issues to Ensure Trustworthiness in Telecommunications and Information Systems that Directly or Indirectly Impact National Security and Emergency Preparedness. The purpose of the event was to stimulate an exchange of ideas among researchers and practitioners from the telecommunications industry, Government, and academia on issues regarding trustworthiness of national security and emergency preparedness (NS/EP) telecommunications systems. Increasing reliance on the public switched network, the Internet, and computer applications to support national security, homeland security, emergency preparedness, and public safety places a premium on trusted systems (e.g., systems that are available, secure, reliable, and survivable even in the face of attacks, failures, or accidents). The August 14, 2003, Northeast blackout underscored the critical importance of networked information systems in supporting national crisis management and response previously demonstrated by the September 11, 2001, terrorist attacks. Ensuring that national leaders, first responders, infrastructure owners and operators, and the public receive timely, accurate, and complete information from trusted networked information systems is crucial to both national and homeland security. To date, a majority of the research studies and activities on the trustworthiness of networked information systems have focused on vulnerabilities in cyberspace (e.g., the National Research Council's seminal report, Trust in Cyberspace). However, achieving and sustaining trustworthiness in those systems is jeopardized by a host of other threats (e.g., exploitation by insiders, physical destruction) that extend beyond cyberspace."

Publisher:
Date:
2004-10
Copyright:
Public Domain
Retrieved From:
National Security Telecommunications Advisory Committee (NSTAC): http://www.ncs.gov/nstac/
Format:
pdf
Media Type:
application/pdf
Source:
2004 Research and Development Exchange Workshop, Monterey, California, October 28-29, 2004
URL:
Help with citations