Personal tools
You are here: Home Press Room awards ACM Group Honors Computer Privacy and Security Experts
Document Actions

ACM Group Honors Computer Privacy and Security Experts

acm
The Association for Computing Machinery
Advancing Computing as a Science & Profession

Contact: Virginia Gold
212-626-0505
vgold@acm.org

small_ms-word.gif Printable Word File

CHICAGO  –  October 18, 2011 -- ACM's Special Interest Group on Security, Audit and Control (SIGSAC) will present today its top honors to Virgil Gligor of Carnegie Mellon University and Ravishankar Iyer of the University of Illinois for their contributions to the computer and communications security community.  Gligor receives the SIGSAC Outstanding Innovation Award for innovations in secure operating systems as well as covert channel analysis, intrusion detection, and secure wireless sensor networks.  Iyer receives the SIGSAC Outstanding Contributions Award for his fundamental contributions to the assessment and design of secure, dependable computing systems.  The awards will be presented at the ACM Conference on Computer and Communications Security

         Gligor is co-director of Carnegie Mellon University’s CyLab, one of the largest university-based cybersecurity research and education centers in the U.S.  He has advocated a special focus on how to design and implement trustworthy communication between users and their interactive parties.  His approach includes creating trusted paths beyond logins, verifiying input/output legitimacy, establishing  accountability and recovery, and securing sender/receiver compliance. 

         A graduate of the University of California at Berkeley, where he earned B.SC, M.Sc, and Ph.D degrees, Gligor serves on Microsoft’s Trustworthy Computing Academic Advisory Board and on SAP’s Security Advisory Board.  He received the outstanding paper award at the 1988 IEEE Symposium on Security and Privacy.  A consultant to the Burroughs Corporation and IBM, he was a member of several U.S. government INFOSEC Study Groups that set research agendas in information security.  

         Iyer is director of the Center for Reliable and High-Performance Computing at the University of Illinois’ Coordinated Science Laboratory.  He currently leads the TRUSTED ILLIAC project at Illinois, which is developing an application-aware adaptive system that jointly supports a range of dependability and security requirements.  

         The George and Ann Fisher Distinguished Professor of Engineering at the University of Illinois at Urbana-Champaign, Iyer is a graduate of the University of Queensland in Australia, where he earned B.E. and Ph.D. degrees in electrical engineering.  His is a Fellow of ACM, AAAS, and IEEE.  Iyer received the Humboldt Foundation Senior Distinguished Scientist Award for excellence in research and teaching, and the AIAA (American Institute for Aeronautics and Astronautics) Information Systems Award for his contributions to dependable aerospace computing systems.  He is a recipient of the IEEE Emanuel R. Piore Award for contributions to reliable computing systems. 

         The ACM SIGSAC Outstanding Innovation and Outstanding Contributions Awards each carry a $1,000 prize. 

 

About ACM

ACM, the Association for Computing Machinery www.acm.org, is the world’s largest educational and scientific computing society, uniting computing educators, researchers and professionals to inspire dialogue, share resources and address the field’s challenges. ACM strengthens the computing profession’s collective voice through strong leadership, promotion of the highest standards, and recognition of technical excellence. ACM supports the professional growth of its members by providing opportunities for life-long learning, career development, and professional networking.  

 

About SIGSAC

SIGSAC, the ACM Special Interest Group on Security, Audit and Control sponsors research conferences and workshops on security technologies, systems, applications, and policies. Technology topics include access control, assurance, authentication, cryptography, intrusion detection, penetration techniques, risk analysis, and secure protocols. These technologies apply to operating systems, database systems, networks and distributed systems, and middleware. Applications for these systems are critical to the operation of information and workflow systems, electronic cash and commerce, copyright and intellectual property protection, telecommunications systems, and healthcare. These applications provide confidentiality, integrity, availability, privacy, and survivability policies that benefit science, business and society. 

#   #   #