IUScholarWorksIndiana University Libraries
Communities & Collections
All of IUScholarWorks
  • English
  • العربية
  • বাংলা
  • Català
  • Čeština
  • Deutsch
  • Ελληνικά
  • Español
  • Suomi
  • Français
  • Gàidhlig
  • हिंदी
  • Magyar
  • Italiano
  • Қазақ
  • Latviešu
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Српски
  • Svenska
  • Türkçe
  • Yкраї́нська
  • Tiếng Việt
Log In
External Users Only:
New external user? Click here to register. Have you forgotten your external user password?
  1. Home
  2. Browse by Author

Browsing by Author "Shankar, Anurag"

Filter results by typing the first few letters
Now showing 1 - 20 of 21
  • Results Per Page
  • Sort Options
  • Loading...
    Thumbnail Image
    Item
    2003 Report on Indiana University Accomplishments supported by Shared University Research Grants from IBM, Inc.
    (2003) Stewart, Craig A.; Papakhian, Mary; Hart, David; Shankar, Anurag; Arenson, Andrew; McMullen, D.F; Palakal, Mathew; Dalkilic, Mehmet; Ortoleva, Peter
    Indiana University and IBM, Inc. have a very strong history of collaborative research, aided significantly by Shared University Research (SUR) grants from IBM to Indiana University. The purpose of this document is to review progress against recent SUR grants to Indiana University. These grants focus on the joint interests of IBM, Inc. and Indiana University in the areas of deep computing, grid computing, and especially computing for the life sciences. SUR funding and significant funding from other sources, including a $1.8M grant from the NSF and a portion of a $105M grant to Indiana University to create the Indiana Genomics Initiative, have enabled Indiana University to achieve a suite of accomplishments that exceed the ambitious goals set out in these recent SUR grants.
  • Loading...
    Thumbnail Image
    Item
    Aligning Your Research Cyberinfrastructure with HIPAA and FISMA
    (2015-08-17) Shankar, Anurag
  • Loading...
    Thumbnail Image
    Item
    Building a NIST Risk Management Framework for HIPPA and FISMA Compliance
    (2016-08-16) Shankar, Anurag
  • Loading...
    Thumbnail Image
    Item
    The centralized life science data service at Indiana University
    (2004-03-02) Stewart, Craig A.; Arenson, Andrew; Shankar, Anurag
  • Loading...
    Thumbnail Image
    Item
    The Centralized Life Sciences Data Service at Indiana University
    (2003-01-17) Stewart, Craig A.; Arenson, Andrew; Shankar, Anurag
  • Loading...
    Thumbnail Image
    Item
    Cyber Risks a University Faces as a HIPAA Business Associate
    (2016-10-21) Shankar, Anurag
    This article discusses the impact a breach of protected health information (PHI) may have on a university while it acts as a HIPAA business associate of an external covered entity. While much has been written about breaches affecting covered entities, scant attention has been paid to the risk a third party such as a university assumes by deciding to become a business associate.
  • Loading...
    Thumbnail Image
    Item
    Effective Cybersecurity for Research
    (2022-06-20) Shankar, Anurag; Drake, Will
    The ever-present tension between institutional cybersecurity and researchers has long hampered attempts to secure research. It is also the reason why institutional cybersecurity efforts in academia have been confined to the most sensitive research. The situation has persisted due to other factors also, for instance the complexity of the research environment, but new developments are quickly changing the status quo. Emerging threats and funding requirements scoped beyond individual awards are pointing to a future where securing research holistically is no longer optional. This paper describes an approach to cybersecurity for research that shows great promise in securing research comprehensively. A product of years of work, it focuses exclusively on the researcher and the research mission. It has been stress tested on a large campus, with success exemplified by researchers embracing it voluntarily and research being accelerated greatly.
  • Loading...
    Thumbnail Image
    Item
    Handling Regulated Data, Protected Health Information, and CUI
    (2017-08-15) Shankar, Anurag
    Handling regulated government data, protected health information, and controlled unclassified information.
  • Loading...
    Thumbnail Image
    Item
    HIPAA and Advanced Scientific Computing
    (2013-09-13) Shankar, Anurag; Barnett, William
    Demand for compute cycles and massive data storage has been growing rapidly in biomedical research. Activities on topics such as electronic health record analytics and gene sequencing are placing an increasing burden on academic medical college IT departments with limited ability to scale. As a result, campus and national advanced scientific computing centers (ASCCs) are being asked to accommodate biomedical researchers. This presents a challenge to these organizations since clinical research data or electronic health records contain identifiable patient information protected by the federal Privacy and Security Rules promulgated under the Health Insurance Portability and Accountability Act (HIPAA) of 1996. The HIPAA Privacy and Security Rules require entities to protect the privacy of individually identifiable health information or protected health information (PHI). The rules specify the types of safeguards that must be put in place including required security controls to ensure patient privacy.
  • Loading...
    Thumbnail Image
    Item
    HIPAA and FISMA: Computing with Regulated Data (A CCoE Webinar Presentation)
    (2017-04-24) Ramsey, Susan; Shankar, Anurag
  • Loading...
    Thumbnail Image
    Item
    HPC, HIPAA, and FISMA: Meeting the Regulatory Challenge through Effective Risk Management
    (2014-08-26) Barnett, Bill; Shankar, Anurag
  • Loading...
    Thumbnail Image
    Item
    Indiana University's Advanced Cyberinfrastructure
    (2011-08) Arenson, Andrew; Boyles, Michael; Cruise, Robert; Gopu, Arvind; Hart, David; Lindenlaub, Peg; Papakhian, Mary; Samuel, John; Seiffert, Kurt; Shankar, Anurag; Stewart, Craig A.; Wernert, Eric
    The purpose of this document is to introduce researchers to Indiana University’s cyberinfrastructure – to clarify what these facilities make possible, to discuss how to use them and the professional staff available to work with you. The resources described here are complex and varied, among the most advanced in the world. The intended audience is anyone unfamiliar with IU’s cyberinfrastructure.
  • Loading...
    Thumbnail Image
    Item
    INGEN's advanced IT facilities: The least you need to know
    (2002) Cruise, Robert; Hart, David; Papakhian, Mary; Repasky, Richard; Samuel, John; Shankar, Anurag; Stewart, Craig A.; Wernert, Eric
  • Loading...
    Thumbnail Image
    Item
    Research and Academic Computing Implementation Plan
    (2000-07) Peebles, Christopher S.; Stewart, Craig A.; Bernbom, Gerry; McMullen, Donald F.; Shankar, Anurag; Samuel, John; Daniels, John; Papakhian, Mary; Hart, David; Walsh, John; Wernert, Eric
  • Loading...
    Thumbnail Image
    Item
    SCI: ETF Early Operations - Indiana University
    (2006-06-20) Stewart, Craig A.; Voss, Brian D.; McRobbie, Michael A.; Shankar, Anurag; Simms, Stephen; McCaulay, D. Scott
  • Loading...
    Thumbnail Image
    Item
    SecureMyResearch: Security for Research Productivity
    (Indiana University Digital Collections Services, 2020-02-19) Welch, Von; Shankar, Anurag
    Securing research data, especially meeting new and stricter regulatory and other cybersecurity requirements, is becoming a challenge for both researchers and campus units at IU that support research. To help them navigate this complex landscape, IU is launching SecureMyResearch, a collaborative effort by the Center of Applied Cybersecurity Research (CACR), the Information Security division within the Office of the Vice President for IT, and UITS Research Technologies. Its goal is to accelerate research by empowering researchers with a resource that reduces both their cybersecurity and compliance burden and risk to regulated and open research data at IU. This presentation will describe SecureMyResearch and how it aims to weave research data security and compliance into the institutional fabric.
  • Loading...
    Thumbnail Image
    Item
    Security standards compliance and ease of use of high performance computing systems in clinical research
    (2021-07) Link, Matthew; Shankar, Anurag; Hancock, David Y.; Henschel, Robert; Michael, Scott; Stewart, Craig A.
    Precision health research and personalized health therapies involve analysis of protected health information. In 2007, Indiana University established the ability to analyze protected health information (HIPAA alignment) as the minimal and default security level for its research high performance computing (HPC) systems and research storage systems. This resulted in a drastic increase in the use of IU HPC systems by clinical researchers. Security levels were later upgraded to FISMA Low as a default. We recommend that, within the US, FISMA (Federal Information Security Modernization Act) Low compliance be the default minimal level of security for large-scale HPC systems. This would facilitate precision medicine research and enable higher education HPC resources to be used in response to future civil health emergencies.
  • Loading...
    Thumbnail Image
    Item
    TeraGrid: Analysis of Organization, System Architecture, and Middleware Enabling New Types of Applications
    (IOS Press, 2008) Catlett, Charlie; Allcock, William E.; Andrews, Phil; Aydt, Ruth; Bair, Ray; Balac, Natasha; Banister, Bryan; Barker, Trish; Bartelt, Mark; Beckman, Pete; Berman, Francine; Bertoline, Gary; Blatecky, Alan; Boisseau, Jay; Bottum, Jim; Brunett, Sharon; Bunn, Julian; Butler, Michelle; Carver, David; Cobb, John; Cockerill, Tim; Couvares, Peter F.; Dahan, Maytal; Diehl, Diana; Dunning, Thom; Foster, Ian; Gaither, Kelly; Gannon, Dennis; Goasguen, Sebastien; Grobe, Michael; Hart, Dave; Heinzel, Matt; Hempel, Chris; Huntoon, Wendy; Insley, Joseph; Jordan, Christopher; Judson, Ivan; Kamrath, Anke; Karonis, Nicholas; Kesselman, Carl; Kovatch, Patricia; Lane, Lex; Lathrop, Scott; Levine, Michael; Lifka, David; Liming, Lee; Livny, Miron; Loft, Rich; Marcusiu, Doru; Marsteller, Jim; Martin, Stuart; McCaulay, D. Scott; McGee, John; McGinnis, Laura; McRobbie, Michael; Messina, Paul; Moore, Reagan; Moore, Richard; Navarro, J.P.; Nichols, Jeff; Papka, Michael E.; Pennington, Rob; Pike, Greg; Pool, Jim; Reddy, Raghu; Reed, Dan; Rimovsky, Tony; Roberts, Eric; Roskies, Ralph; Sanielevici, Sergiu; Scott, J. Ray; Shankar, Anurag; Sheddon, Mark; Showerman, Mike; Simmel, Derek; Singer, Abe; Skow, Dane; Smallen, Shava; Smith, Warren; Song, Carol; Stevens, Rick; Stewart, Craig A.; Stock, Robert B.; Stone, Nathan; Towns, John; Urban, Tomislav; Vildibill, Mike; Walker, Edward; Welch, Von; Wilkins-Diehr, Nancy; Williams, Roy; Winkler, Linda; Zhao, Lan; Zimmerman, Ann
    TeraGrid is a national-scale computational science facility supported through a partnership among thirteen institutions, with funding from the US Na- tional Science Foundation [1]. Initially created through a Major Research Equip- ment Facilities Construction (MREFC [2]) award in 2001, the TeraGrid facility began providing production computing, storage, visualization, and data collections services to the national science, engineering, and education community in January 2004. In August 2005 NSF funded a five-year program to operate, enhance, and expand the capacity and capabilities of the TeraGrid facility to meet the growing needs of the science and engineering community through 2010. This paper de- scribes TeraGrid in terms of the structures, architecture, technologies, and services that are used to provide national-scale, open cyberinfrastructure. The focus of the paper is specifically on the technology approach and use of middleware for the purposes of discussing the impact of such approaches on scientific use of compu- tational infrastructure. While there are many individual science success stories, we do not focus on these in this paper. Similarly, there are many software tools and systems deployed in TeraGrid but our coverage is of the basic system middleware and is not meant to be exhaustive of all technology efforts within TeraGrid. We look in particular at growth and events during 2006 as the user population ex- panded dramatically and reached an initial “tipping point” with respect to adoption of new “grid” capabilities and usage modalities.
  • Loading...
    Thumbnail Image
    Item
    Trusted CI UCB Engagement: Final Report
    (2020-07-20) Adams, Andrew K.; Peisert, Sean; Shankar, Anurag; Zage, John
    Final report of the Trusted CI UC Berkeley Engagement
  • Loading...
    Thumbnail Image
    Item
    Trusted CI: Galaxy Engagement Final Report
    (2021-02-02) Krenz, Mark; Shankar, Anurag; Adams, Andrew; Filus, Shane; Shute, Kelli
  • «
  • 1 (current)
  • 2
  • »
  • Accessibility
  • Privacy Notice
  • Harmful Language Statement
  • Copyright © 2024 The Trustees of Indiana University