Harris Series Presents Renowned Computer Science Lecturer Feb. 10, 11

MELBOURNE, FLA.—The Harris Institute for Assured Information at Florida Institute of Technology is hosting Matt Bishop, Ph.D., in the next installment of the Harris Distinguished Lecturer series of presentations. This lecture, which is open to the public, will be held at 6:45 p.m. Feb. 10, in the third floor conference room of the Harris Center for Science and Engineering building on the Florida Tech campus. This lecture will also be the January-February meeting of the Space Coast ISSA chapter.

Bishop will speak on “The Insider Problem, Inside Out.” The insider problem is considered one of the most serious in computer security; but is, in many ways, ill-defined. In this talk, Bishop will outline the problem and discuss a novel analysis technique, which is useful for identifying those insiders who pose the greatest risk to the organization.

Bishop also will present a lecture on Friday, Feb. 11 at noon in the main auditorium of the F.W. Olin Engineering building. Also open to the public, the lecture will examine the history and probable future of electronic voting.
Richard Ford, Ph.D., director of the Harris Institute for Assured Information, said, “We’re very excited to host Dr. Bishop at Florida Tech. Not only is Matt a world-renowned researcher, but he’s a wonderful teacher. This lecture presents a tremendous opportunity for our students and the public to hear from a leader in the field about issues that impact us all.”

In 1984, Bishop received his Ph.D. in computer science from Purdue University, where he specialized in computer security. He was a research scientist at the Research Institute of Advanced Computer Science and was on the faculty at Dartmouth College before joining the Department of Computer Science at the University of California at Davis.

His main research area is the analysis of vulnerabilities in computer systems, including modeling, building tools to detect vulnerabilities, and ameliorating or eliminating them. This includes detecting and handling all types of malicious logic. He is active in the areas of network security, the study of denial of service attacks and defenses, policy modeling, software assurance testing, and formal modeling of access control. Also interested in electronic voting, he was one of the two principal investigators of the California Top-to-Bottom Review, which performed a technical review of all electronic voting systems certified in that state.

He is active in information assurance education. His textbook, Computer Security: Art and Science, was published in December 2002 by Addison-Wesley Professional. He also teaches software engineering, machine architecture, operating systems, programming, and computer security.

For more information, contact Richard Ford at (321) 674-7473.

Show More
Back to top button