Cloud Security and Privacy

Date

July 18, 2011

Speaker

Kristin Lauter, Carl Gunter, and Radu Sion

Affiliation

Microsoft Research, University of Illinois at Urbana-Champaign, Stony Brook University

Overview

“Kristin Lauter chairs this session at Faculty Summit 2011, which includes the following presentations.

  • Cryptographic Cloud Storage and Services—Kristin Lauter, Microsoft Research
  • Encryption as Access Control for Cloud Security—Carl Gunter, University of Illinois
  • The Economics of Cloud Computing: Why a Brooklyn Latte Buys a Million Unforgettable Signatures—Radu Sion, Stony Brook University

*

Speakers

Kristin Lauter, Carl Gunter, and Radu Sion

Dr. Gunter received his BA from the University of Chicago in 1979 and his PhD from the University of Wisconsin at Madison in 1985. He worked as a postdoctoral researcher at Carnegie-Mellon University and the University of Cambridge in England before joining the faculty of the University of Pennsylvania in 1987. He joined the University of Illinois at Urbana-Champaign (UIUC) in 2004 where he is a professor, Director of the Illinois Security Lab, and member of the Arms Control, Disarmament and International Security executive committee and the Information Trust Institute Steering Committee. He is the head of the Systems and Networking Area of the department of Computer Science at UIUC and the chair of the steering committee for the ACM Conference on Computer and Communications Security (CCS).He does research and teaches in his areas of technical expertise: security, networks, programming languages, and software engineering. His work includes contributions to the semantics and design of programming and policy languages, models and analysis techniques for networks and security, and applications of formal logic in computer science. He is the author of more than 80 scientific research publications and patents and a textbook on semantics of programming languages published by MIT Press. He is a founder of Probaris, a company that provides identity management technologies, and has served as a consultant to research labs and companies and as an expert witness on legal cases concerning fraud, contract, copyright, and patent infringement.

People