Share on Facebook Tweet on Twitter Share on LinkedIn Share by email
External Research: Trustworthy Computing Curriculum 2004 Awards

Trustworthy Computing Curriculum 2004 Awards

Microsoft Research announced the recipients of the Trustworthy Computing (TWC) Curriculum 2004 awards, totaling $750,000 in funding. Award criteria for this competitive program included the creation of a new course or series of courses designed to introduce students to all four areas of trustworthy computing: security, privacy, reliability, and business integrity.

Trustworthy Computing Curriculum award recipients

Columbia University
Gail Kaiser, Angelos Keromytis
Synergizing Security and Software Engineering

The Department of Computer Science at Columbia University aims to become a center of excellence in computing and communications security, both in research and teaching. We propose to develop a new course, Introduction to Trustworthy Computing, aimed at undergraduates. We also propose to incorporate awareness of the basic elements of security and reliability throughout higher level courses and develop a new “student programming competition” specifically focused on trustworthy computing.

Cornell University
Fred Schneider
Pervasive Trustworthiness Education Initiative

Cornell’s Computer Science Department faculty feels that every student who takes computing courses must be exposed and sensitized to the need for trustworthy computing. Society is becoming increasingly dependent on computing systems, so graduates must be able to understand the issues, advance the debate, and help ensure that sensible decisions are made about the risks and their mitigation. Progress in building trustworthy computing systems requires solving problems that are intellectually challenging, making this area a very exciting part of Computer Science today.

Georgia Institute of Technology
Mustaque Ahamad, Wenke Lee, Jim Xu
Integrating Trustworthy Computing Concepts in an Undergraduate Computer Science Curriculum

The goal of this proposal is to develop a plan to infuse Trustworthy Computing concepts in the entire general computer science curriculum. Although our focus will be the courses that are offered in our curriculum, it will be possible for other universities and colleges to integrate such modules in their courses. We currently work with several colleges in the Atlanta area (Georgia State, Spelman College, Clark-Atlanta University, Morehouse College) under the Georgia Tech Information Security Center education outreach umbrella.

Harvard University
Jonathan Zittrain, Molly Krause, John Palfrey, Hal Roberts
Trustworthy Computing Curriculum

Our ability to fully utilize the power of computing is critically limited by our inability to trust computers. For this reason, we are developing a curriculum that explores questions on trustworthy computing and its legal implications. We aim to provide an educational resource that deals with an issue fundamental to many aspects of a healthy networked world and is available for free use on a worldwide scale.

Indiana University
Fred Cate, Markus Jakobsson
Introduction to Trustworthy Computing

This course will meet a long-term demonstrated need to educate students about responsible computer use prior to providing them with unlimited broadband access through university networks. It will cut across traditional disciplinary boundaries to include concepts from computer science, law, policy, ethics, organizational behavior, economics, and sociology. To meet the practical demands of such an interdisciplinary approach, the course will be designed by IU�s Center for Applied Cybersecurity Research (CACR), which brings together academics and practitioners in diverse areas relating to information assurance. It will be offered through the School of Informatics and will be open to all undergraduates.

Michigan State University
Richard Enbody, Kurt Stirewalt, Li Xiao
Trustworthy Computing: Integrating Threat Modeling and Privacy into an Undergraduate Computer Science Curriculum

As computing and information technology become more deeply integrated into society, software systems must become as �trustworthy� as other pervasive technologies, such as the telephone system or the automobile. It is our firm belief that an integrated treatment of security and privacy is necessary in order to impart facility in these critical areas. We see threat modeling as the current best practice to build upon in developing security and therefore propose to integrate threat modeling and general security principles into three levels of our curriculum�freshmen, sophomore, and upper-school.

Northwestern University
Yan Chen, Andrea Matwyshyn
Interdisciplinary Trustworthy Computing Curriculum Development

We will offer the following three new courses: Introduction to Trustworthy Computing, Internet Regulation and Policy, and Internet Security. The first course is an introductory course covering the basic principles of trustworthy computing from multiple disciplines. The second course focuses on the legal, social, business, and computational issues. This proposed curriculum will build a solid foundation in our program toward our long-term goal: creation of a new, radically interdisciplinary, undergraduate program of trustworthy computing.

Southern Polytechnic State University
Andy Ju An Wang
A Web-Based Electronic Laboratory for Trustworthy Computing

This project will produce a teaching and learning tool called MICS (Multimedia + Interactive Courseware for information Security), which consists of a collection of interactive multimedia animations to enhance the undergraduate curriculum in trustworthy computing for a state-wide Web-based higher education program in Georgia as well as for our regular onsite information security courses at Southern Polytechnic State University.

University of California at Santa Cruz
Ira Pohl
Trustworthy Computing Curriculum Development

Our goal is to integrate education on Trustworthy Computing into the computing curriculum. We will introduce Trustworthy Computing contents into a few key undergraduate Computer Science courses, both by revising the present content and by developing new modules. We are initially targeting six courses: Introduction to Operating Systems, Software Methodology, Software Design Project, Computer Security, Advanced Programming, and Hypermedia and the Web. Collectively, these courses reach many of the students that we educate on software systems and software development.

University of Colorado at Boulder
Patrick Ryan, John Bennett, Tom Lookabaugh, Douglas Sicker, Phillip Weiser
University of Colorado: Trustworthy Computing Curriculum

Our first plan is to create a graduate interdisciplinary course in Trustworthy Computing within the University of Colorado�s Interdisciplinary Telecommunications Program, and cross-listed with the School of Law, called �Introduction to Trustworthy Computing.� This is the first step in the eventual creation of a Certificate in Trustworthy Computing, which will be offered as a specialization available to graduate students and which will compliment the new certificate programs that are being implemented this year for Wireless and Security.

University of Illinois at Urbana-Champaign
Michael Shaw
Introduction to Trustworthy Computing

Trustworthy computing is analogous to the Total Quality Management movement a decade ago, but the focus now is on IT. We will create a trustworthy computing curriculum as systematic and comprehensive as the TQM programs that have helped major corporations improve the qualities of their products and services. Trustworthy computing should be embedded in every enterprise process and transaction. In terms of IT applications development, trustworthy computing should be incorporated in the system-development lifecycle.

University of Maryland at College Park
Gang Qu
A Multidisciplinary and Integrated Approach to Raise the Global Awareness of Trustworthy Computing

This new course on Trustworthy Computing will have deep computer science and engineering content, but will also include business case studies and analysis, guest speakers from social science and industry, a seminar series associated with the course, and a column in the school paper on Trustworthy Computing topics. We will conduct two campus-wide surveys on trustworthy computing, before and after this project, not only to test the success of this project, but also to raise the publicity and visibility of trustworthy computing.

University of Nevada at Las Vegas
Yoohwan Kim
Introducing Trustworthy Computing to Computer Science and Computer Engineering Curriculums at UNLV

The proposed course will fill the gap of lacking general security course at UNLV and enhance the current CS and CE curriculums in computer/network security areas. Our goals in this course are to expose the students in highly diversified majors to the concepts and fundamentals of trustworthy computing; to educate the students in depth about issues surrounding security, privacy, and reliability; and to train students to enter the workforce well-versed in Trustworthy Computing.

University of Texas at Dallas
Edwin Sha
Development of the New Course: Introduction to Trustworthy Computing

Most of the existing security-related courses in the U.S. focus on only a few aspects of Trustworthy Computing. Instead, we need to address all aspects: security, privacy, reliability and business integrity. In this course, students will complete a series of well-designed real-world projects in Information Security requiring them to conduct experiments, develop programs, perform analysis, and write reports. At least 100 students are expected to take this new course annually.

University of Virginia
Alfred Weaver
Introduction to Trustworthy Computing—A Hands-on Approach

Rather than just exposing the principles of trustworthy computing, student groups will actually build a trustworthy system and test its components. Our student projects will be chosen from the general domain of computer applications to medicine. We chose this particular application area because we know from experience that it is highly motivational for our students, the need for privacy/security/reliability in this context is obvious to all, it immediately satisfies our students’ desire to be involved in a project that is simultaneously technically challenging and socially rewarding.

 > Collaboration > Opportunities