Future of Trust in Computing

June 30, 2008 - July 2, 2008
The focus of the event is on the future of Trusted Computing and adjacent technologies. The 1st track addresses the Future of Trust in Computing. The 2nd track focuses on uses, applications, infrastructure requirements, and barriers to adoption. The 3d track looks at issues of user privacy and other policy challenges, including security assurance. Two workshops focusing on adoption & privacy complete the program.

Arkadiusz Warguła / iStock / Getty Images Plus via Getty Images
Maliciously crafted inputs can exploit machine learning models at the algorithmic level, bypassing traditional cybersecurity defenses.
Pakhnyushchyy / iStock / Getty Images Plus via Getty Images
Advocates highlight that with proper oversight and adherence to the Five Cs — Community Engagement, Civil Liberties Protection, Common Procedures, Clear Oversight, and Cybersecurity — drones can enhance public safety without compromising civil rights.