National Academies Press: OpenBook
« Previous: Appendix C: Some Key Concepts
Suggested Citation:"What is CSTB?." National Research Council. 2003. Who Goes There?: Authentication Through the Lens of Privacy. Washington, DC: The National Academies Press. doi: 10.17226/10656.
Page 213
Suggested Citation:"What is CSTB?." National Research Council. 2003. Who Goes There?: Authentication Through the Lens of Privacy. Washington, DC: The National Academies Press. doi: 10.17226/10656.
Page 214

Below is the uncorrected machine-read text of this chapter, intended to provide our own search engines and external engines with highly rich, chapter-representative searchable text of each book. Because it is UNCORRECTED material, please consider the following text as a useful but insufficient proxy for the authoritative book pages.

What Is CSTB? As a part of the National Research Council, the Computer Science and Telecommunications Board (CSTB) was established in 1986 to provide independent advice to the federal government on technical and public policy issues relating to computing and communications. Composed of leaders from industry and academia, CSTB conducts studies of critical national issues and makes recommendations to government, industry, and academic researchers. CSTB also provides a neutral meeting ground for consideration of complex issues where resolution and action may be premature. It convenes invitational discussions that bring together princi- pals from the public and private sectors, assuring consideration of all perspectives. The majority of CSTB's work is requested by federal agen- cies and Congress, consistent with its National Academies context. A pioneer in framing and analyzing Internet policy issues, CSTB is unique in its comprehensive scope and effective, interdisciplinary ap- praisal of technical, economic, social, and policy issues. Beginning with early work in computer and communications security, cyber-assurance and information systems trustworthiness have been a cross-cutting theme in CSTB's work. CSTB has produced several reports known as classics in the field, and it continues to address these topics as they grow in impor- tance. To do its work, CSTB draws on some of the best minds in the country, inviting experts to participate in its projects as a public service. Studies are conducted by balanced committees without direct financial interests in the topics they are addressing. Those committees meet, confer elec- 213

214 WHAT IS CSTB? tropically, and build analyses through their deliberations. Additional expertise from around the country is tapped in a rigorous process of review and critique, further enhancing the quality of CSTB reports. By engaging groups of principals, CSTB obtains the facts and insights critical to assessing key issues. The mission of CSTB is to · Respond to requests from the government, nonprofit organizations, and private industry for advice on computer and telecommunications issues and from the government for advice on computer and telecommu- nications systems planning, utilization, and modernization; · Monitor and promote the health of the gelds of computer science and telecommunications, with attention to issues of human resources, information infrastructure, and societal impacts; · Initiate and conduct studies involving computer science, computer technology, and telecommunications as critical resources; and · Foster interaction among the disciplines underlying computing and telecommunications technologies and other fields, at large and within the National Academies. As of 2003, CSTB activities with security and privacy components address privacy in the information age, critical information infrastructure protection, authentication technologies and their privacy implications, information technology for countering terrorism, and geospatial informa- tion systems. Additional studies examine broadband, digital govern- ment, the fundamentals of computer science, limiting children's access to pornography on the Internet, digital archiving and preservation, and Internet navigation and the domain name system. Explorations touching on security and privacy are under way in the areas of the insider threat, cybersecurity research, cybersecurity principles and practices, depend- able/safe software systems, biometrics, wireless communications and spectrum management, open source software, digital democracy, the "digital divide," manageable systems, information technology and jour- nalism, supercomputing, and information technology and education. More information about CSTB can be obtained online at <http://>.

Who Goes There?: Authentication Through the Lens of Privacy Get This Book
 Who Goes There?: Authentication Through the Lens of Privacy
Buy Paperback | $48.00 Buy Ebook | $38.99
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

Who Goes There?: Authentication Through the Lens of Privacy explores authentication technologies (passwords, PKI, biometrics, etc.) and their implications for the privacy of the individuals being authenticated. As authentication becomes ever more ubiquitous, understanding its interplay with privacy is vital. The report examines numerous concepts, including authentication, authorization, identification, privacy, and security. It provides a framework to guide thinking about these issues when deciding whether and how to use authentication in a particular context. The book explains how privacy is affected by system design decisions. It also describes government's unique role in authentication and what this means for how government can use authentication with minimal invasions of privacy. In addition, Who Goes There? outlines usability and security considerations and provides a primer on privacy law and policy.


  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook,'s online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  6. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  7. ×

    View our suggested citation for this chapter.

    « Back Next »
  8. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!