Computing Community Consortium Blog

The goal of the Computing Community Consortium (CCC) is to catalyze the computing research community to debate longer range, more audacious research challenges; to build consensus around research visions; to evolve the most promising visions toward clearly defined initiatives; and to work with the funding organizations to move challenges and visions toward funding initiatives. The purpose of this blog is to provide a more immediate, online mechanism for dissemination of visioning concepts and community discussion/debate about them.


Posts Tagged ‘WATCH

 

November 13 WATCH Talk- The burden of authentication: What friction points reveal

November 4th, 2014 / in NSF, Research News, videos / by Helen Wright

On November 13, the National Science Foundation (NSF) will host it’s next Washington Area Trustworthy Computing Hour (WATCH) talk. The talk will be “The burden of authentication: What friction points reveal.” The speaker will be Dana Chisnell, from the Center for Civic Design. From the abstract: Everyone whines about dealing with passwords and authentication, but what is the real cost to individual users? In a study conducted with 23 people at the National Institute of Standards and Technology, we asked participants to tell us about every time they authenticated in a 24-hour period. From this, we learned that the friction of authentication goes beyond the specific act of authenticating, spilling over into tasks, productivity, and […]

WATCH – Reflections on Decades of Defending Imperfect Software

July 14th, 2014 / in Announcements, NSF, Research News / by Helen Wright

The next WATCH Talk is scheduled for July 17 at noon EDT. Crispin Cowan will reflect on decades of defending imperfect software. Dr. Cowan works for Microsoft adding security to existing operating systems, including the recent Windows 8.1 release. He is especially interested in usable security and effective sandboxing.  Abstract:  “Perfect” (bug-free) software is impractically expensive and slow to produce, and so the vast bulk of consumer and enterprise software products are shipped when they are “good enough” but far from bug-free. As a consequence, there has been a constant struggle to keep attackers from exploiting these chronically inevitable bugs. Much of that attention has been on memory corruption attacks against […]