{"598041":{"#nid":"598041","#data":{"type":"event","title":"Cybersecurity Lecture Series with Margaret Loper","body":[{"value":"\u003Ch5\u003E\u003Cstrong\u003E\u003Cem\u003ECan Trust Be Delivered as a Service?\u003C\/em\u003E\u003C\/strong\u003E\u003C\/h5\u003E\r\n\r\n\u003Cp\u003ETrust is an abstract, multi-faceted and subjective concept. It is difficult to define and identify the fundamentals that establish trust. At the same time, trust is regarded as an essential pillar for our digital economy, our cyber infrastructure and the success of Internet of Things. In this talk, we will review the definition of trust from a multi-disciplinary perspective and summarize characteristics of trust found in the literature. By integrating the diverse perspectives, we can categorize trust into three types based on how trust is established, leveraged and maintained in the real world. The elements that are pertinent to the formation of trust and to the foundations for provisioning Trust as a Service will be discussed.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cbr \/\u003E\r\n\u003Cbr \/\u003E\r\n\u003Ca href=\u0022http:\/\/iisp.gatech.edu\/margaret-loper\u0022\u003E\u003Cstrong\u003EMargaret L. Loper\u003C\/strong\u003E\u003C\/a\u003E\u003Cstrong\u003E,\u003C\/strong\u003E Ph.D., is an associate director of the Institute for Information Security \u0026amp; Privacy (IISP) for the area of trust research, and chief scientist of the\u0026nbsp;\u003Ca href=\u0022https:\/\/gtri.gatech.edu\/laboratories\/information-and-communications-laboratory\u0022\u003EGeorgia Tech Research Institute\u0026#39;s\u0026nbsp;Information and Communications Laboratory\u003C\/a\u003E\u0026nbsp;(ICL). Her current research is in the area of computational trust algorithms for machine-to-machine communications. Loper also teaches simulation courses for both academic and professional education, and she is involved in projects that bring modeling and simulation into K-12 education.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EShe has been involved in modeling and simulation for more than 30 years, specifically focused on parallel and distributed systems. Loper has led projects on compliance testing and federation testing, as well as the interoperability of live, virtual and constructive systems. Previous work in casual ordering focused on improving performance of synchronization algorithms by exploiting temporal uncertainty of simulation events. Past projects at Georgia Tech included the Department of Defense High-Level Architecture Federate Testing project, which consisted of the process, tools, and procedures used for HLA compliance and the HLA Federation Verification Tool used to assist federation developers during federation integration. Other projects included the M\u0026amp;S WebBook, Distributed Interactive Simulation Standards Development, and DIS compliance test procedures and tools.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003EThe \u003Ca href=\u0022http:\/\/www.iisp.gatech.edu\/cyber-lecture\u0022\u003ECybersecurity Lecture Series at Georgia Tech\u003C\/a\u003E is a free, one-hour lecture from a thought leader who is advancing the field of information security and privacy. Invited speakers include executives and researchers from Fortune 500 companies, federal intelligence agencies, start-ups and incubators, as well as Georgia Tech faculty and students presenting their research. Lectures are open to all -- students, faculty, industry, government, or simply the curious.\u003C\/p\u003E\r\n\r\n\u003Ch6\u003E\u003Cem\u003E\u003Cstrong\u003EPresented by the \u003Ca href=\u0022http:\/\/cyber.gatech.edu\/\u0022\u003EInstitute for Information Security \u0026amp; Privacy\u003C\/a\u003E\u003C\/strong\u003E\u003C\/em\u003E\u003C\/h6\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EResearch Scientist Margaret Loper discusses how trust should be established, leveraged and maintained for cybersecurity in the age of \u0026quot;Internet of Things.\u0026quot;\u003C\/p\u003E\r\n","format":"limited_html"}],"field_summary_sentence":[{"value":"Research Scientist Margaret Loper discusses trust in an IoT age."}],"uid":"27490","created_gmt":"2017-10-30 13:07:42","changed_gmt":"2017-10-30 13:33:26","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2017-11-10T12:00:00-05:00","event_time_end":"2017-11-10T13:00:00-05:00","event_time_end_last":"2017-11-10T13:00:00-05:00","gmt_time_start":"2017-11-10 17:00:00","gmt_time_end":"2017-11-10 18:00:00","gmt_time_end_last":"2017-11-10 18:00:00","rrule":null,"timezone":"America\/New_York"},"extras":[],"hg_media":{"598042":{"id":"598042","type":"image","title":"Margaret Loper, IISP","body":null,"created":"1509369015","gmt_created":"2017-10-30 13:10:15","changed":"1509369015","gmt_changed":"2017-10-30 13:10:15","alt":"","file":{"fid":"227989","name":"Cybersecurity expert_Margaret Loper_lores_200x250.jpg","image_path":"\/sites\/default\/files\/images\/Cybersecurity%20expert_Margaret%20Loper_lores_200x250.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/Cybersecurity%20expert_Margaret%20Loper_lores_200x250.jpg","mime":"image\/jpeg","size":602895,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/Cybersecurity%20expert_Margaret%20Loper_lores_200x250.jpg?itok=4B1y4V7a"}},"593723":{"id":"593723","type":"image","title":"Cybersecurity Lecture Series by IISP","body":null,"created":"1500996186","gmt_created":"2017-07-25 15:23:06","changed":"1500996186","gmt_changed":"2017-07-25 15:23:06","alt":"","file":{"fid":"226333","name":"CLS_logo_FY18 w tag.jpg","image_path":"\/sites\/default\/files\/images\/CLS_logo_FY18%20w%20tag.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/CLS_logo_FY18%20w%20tag.jpg","mime":"image\/jpeg","size":580256,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/CLS_logo_FY18%20w%20tag.jpg?itok=8s4XWw-w"}}},"media_ids":["598042","593723"],"groups":[{"id":"47223","name":"College of Computing"},{"id":"322011","name":"College of Computing Events"},{"id":"430601","name":"Institute for Information Security and Privacy"},{"id":"69599","name":"IPaT"},{"id":"50876","name":"School of Interactive Computing"},{"id":"50875","name":"School of Computer Science"}],"categories":[],"keywords":[{"id":"174439","name":"cybersecurity policy"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1795","name":"Seminar\/Lecture\/Colloquium"}],"invited_audience":[{"id":"78761","name":"Faculty\/Staff"},{"id":"78771","name":"Public"},{"id":"174045","name":"Graduate students"},{"id":"78751","name":"Undergraduate students"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003E\u003Ca href=\u0022mailto:lindsey.panetta@gtri.gatech.edu\u0022\u003Elindsey.panetta@gtri.gatech.edu\u003C\/a\u003E\u003C\/p\u003E\r\n","format":"limited_html"}],"email":[],"slides":[],"orientation":[],"userdata":""}}}