词条 | Ross J. Anderson |
释义 |
| name = Ross Anderson | birth_name = Ross John Anderson | image = Ross Anderson (security researcher).jpg | image_size = 150px | caption = Ross Anderson in 2008 | birth_date = {{birth date and age|df=yes|1956|9|15}}[1] | birth_place = | residence = | nationality = British | field = {{Plainlist|
| work_institution = {{Plainlist|
| alma_mater = Trinity College, Cambridge (BA, MA, PhD) | doctoral_advisor = Roger Needham[4] | thesis_title = Robust Computer Security | thesis_url = http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.338198 | thesis_year = 1995 | awards = {{Plainlist|
| doctoral_students = {{Plainlist|
| known_for = {{Plainlist|
| website = {{URL|http://www.cl.cam.ac.uk/~rja14}} }}Ross John Anderson, FRS, FREng[1] (born 15 September 1956)[1] is a researcher, author, and industry consultant in security engineering.[2] He is Professor of Security Engineering at the Computer Laboratory, University of Cambridge[3] where he is part of the University's security group.[4][5][6] EducationAnderson was educated at the High School of Glasgow.[1] In 1978, he graduated with a Bachelor of Arts in mathematics and natural science from Trinity College, Cambridge, and subsequently received a qualification in computer engineering. Anderson worked in the avionics and banking industry before moving back to the University of Cambridge in 1992, to work on his doctorate under the supervision of Roger Needham[7] and start his career as an academic researcher.[8] He received his PhD in 1995, and became a lecturer in the same year.[9] ResearchAnderson's research interests[10][11][4] are in security, cryptology, dependability and technology policy.[10] In cryptography, he designed with Eli Biham the BEAR, LION and Tiger cryptographic primitives, and co-wrote with Biham and Lars Knudsen the block cipher Serpent, one of the finalists in the Advanced Encryption Standard (AES) competition. He has also discovered weaknesses in the FISH cipher and designed the stream cipher Pike. In 1998, Anderson founded the Foundation for Information Policy Research, a think tank and lobbying group on information-technology policy. Anderson is also a founder of the UK-Crypto mailing list and the economics of security research domain.[12] He is well-known among Cambridge academics as an outspoken defender of academic freedoms, intellectual property and other matters of university politics. He is engaged in the ″Campaign for Cambridge Freedoms″[13] and has been an elected member of Cambridge University Council since 2002.[14] In January 2004, the student newspaper Varsity declared Anderson to be Cambridge University's "most powerful person".[15] In 2002, he became an outspoken critic of trusted computing proposals, in particular Microsoft's Palladium operating system vision.[16] Anderson's TCPA FAQ has been characterised by IBM TC researcher David R. Safford as "full of technical errors" and of "presenting speculation as fact."[17] For years Anderson has been arguing that by their nature large databases will never be free of abuse by breaches of security. He has said that if a large system is designed for ease of access it becomes insecure; if made watertight it becomes impossible to use. This is sometimes known as Anderson's Rule.[18] Anderson is the author of Security Engineering, published by Wiley in 2001.[2] He was the founder and editor of Computer and Communications Security Reviews.[8] After the vast Global surveillance disclosure leaked by Edward Snowden beginning in June 2013 Anderson suggested one way to begin stamping out the British state's unaccountable involvement in this NSA spying scandal is to entirely end the domestic secret services. Anderson: “Were I a legislator, I would simply abolish MI5." Anderson notes the only way this kind of systemic data collection has been made possible was through the business models of private industry. The value of information-driven web companies such as Facebook and Google is built around their ability to gather vast tracts of data. It was something the intelligence agencies would have struggled with alone.[19] Anderson is a critic of smart meters, writing that there are various privacy and energy security concerns.[20] Awards and honoursAnderson was elected a Fellow of the Royal Society (FRS) in 2009. His nomination reads: {{centred pull quote|Professor Ross Anderson, Personal Chair in Security Engineering, Computer Laboratory, University of Cambridge. Ross Anderson is a pioneer and world leader in security engineering, and is distinguished for starting a number of new areas of research in hardware, software and systems. His early work on how systems fail established a base of empirical evidence for building threat models for a wide range of applications from banking to healthcare. He has made trailblazing contributions that helped establish a number of new research topics, including security usability, hardware tamper-resistance, information hiding, and the analysis of application programming interfaces. He is also one of the founders of the study of information security economics, which not only illuminates where the most effective attacks and defences may be found, but is also of fundamental importance to making policy for the information society.[21]}} Anderson was also elected a Fellow of the Royal Academy of Engineering (FREng)[1] in 2009.[9][8][22] References1. ^1 2 {{cite web|title=List of Fellows|url=http://www.raeng.org.uk/about-us/people-council-committees/the-fellowship/list-of-fellows}} {{FRS 2009}}{{Authority control}}{{DEFAULTSORT:Anderson, Ross J.}}2. ^1 2 {{cite book |author=Anderson, Ross |title=Security engineering: a guide to building dependable distributed systems |publisher=John Wiley |location=New York |year=2008 |pages= |isbn=978-0-470-06852-6 |oclc= |doi= |accessdate=|url=http://www.cl.cam.ac.uk/~rja14/book.html|authorlink=Ross J. Anderson}} 3. ^The Blue Book – "The Computer Laboratory: an Introduction”, University of Cambridge Computer Laboratory, August 2007 {{webarchive |url=https://web.archive.org/web/20120805130114/http://www.cl.cam.ac.uk/intro/overview/ |date=5 August 2012 }} 4. ^1 {{Scopus|id=7408239884}} 5. ^{{ACMPortal|id=81100104164}} 6. ^{{Cite journal | pmid = 10078187| year = 1999| author1 = Anderson| first1 = R. J.| title = Information technology in medical practice: Safety and privacy lessons from the United Kingdom| journal = The Medical Journal of Australia| volume = 170| issue = 4| pages = 181–4| doi = 10.5694/j.1326-5377.1999.tb127721.x}} 7. ^{{cite thesis |degree=PhD |first=Ross John|last=Anderson |title=Robust Computer Security |publisher=University of Cambridge |date=2014 |url=http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.338198|authorlink=Ross J. Anderson}} 8. ^1 2 3 Curriculum Vitae – Ross Anderson, May 2007 9. ^1 2 3 4 5 {{Who's Who | surname = ANDERSON | othernames = Prof. Ross John | id = U70837 | volume = 2014 | edition = online edition via Oxford University Press}} {{subscription required}} 10. ^1 2 {{GoogleScholar|WgyDcoUAAAAJ}} 11. ^1 2 {{MathGenealogy |id=137937 }} 12. ^Ross Anderson: Why information security is hard – an economic perspective, ACSAC 2001. 13. ^Campaign for Cambridge Freedoms 14. ^Election to the Council: Notices 2 December 2002 and 7 November 2006, Cambridge University Reporter 15. ^Cambridge Power 100, Varsity, Issue 591, 16 January 2004 16. ^Ross Anderson: ‘Trusted Computing’ Frequently Asked Questions, August 2003 17. ^http://domino.research.ibm.com/comm/research_projects.nsf/pages/gsal.TCG.html/$FILE/tcpa_rebuttal.pdf{{dead link|date=April 2018 |bot=InternetArchiveBot |fix-attempted=yes }} 18. ^[https://www.theguardian.com/commentisfree/henryporter/2009/aug/10/id-card-database-breach Guardian newspaper article on a security breach, in which Anderson's Rule is formulated] 19. ^[https://www.forbes.com/sites/tamlinmagee/2014/01/03/cambridges-head-of-cryptography-i-would-abolish-mi5 Cambridge's Head of Cryptography: I Would Abolish MI5], Forbes, 3 January 2013 20. ^https://www.fipr.org/100110smartmeters.pdf 21. ^1 {{cite web |url=https://collections.royalsociety.org/DServe.exe?dsqIni=Dserve.ini&dsqApp=Archive&dsqDb=Catalog&dsqCmd=show.tcl&dsqSearch=(RefNo==%27EC/2009/02%27) |title=EC/2009/02: Anderson, Ross |publisher=The Royal Society |archivedate=30 July 2014 |archiveurl=https://www.webcitation.org/6RS6Nnaoj?url=https://collections.royalsociety.org/DServe.exe?dsqIni=Dserve.ini&dsqApp=Archive&dsqDb=Catalog&dsqCmd=show.tcl&dsqSearch=%28RefNo%3D%3D%27EC%2F2009%2F02%27%29 |location=London |deadurl=yes |df=dmy-all }} 22. ^{{YouTube|id=6H_LxgLhV04|title=Technology Visionaries: Professor Ross Anderson FRS FREng – Royal Academy of Engineering}}, Royal Academy of Engineering 11 : British technology writers|Modern cryptographers|Fellows of the Institute of Physics|Computer security academics|Copyright scholars|Alumni of Trinity College, Cambridge|Members of the University of Cambridge Computer Laboratory|Living people|Fellows of the Royal Society|1956 births|People from Sandy, Bedfordshire |
随便看 |
|
开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。