Browsing by Author "Shankar, Anurag"
Now showing 1 - 20 of 21
- Results Per Page
- Sort Options
Item 2003 Report on Indiana University Accomplishments supported by Shared University Research Grants from IBM, Inc.(2003) Stewart, Craig A.; Papakhian, Mary; Hart, David; Shankar, Anurag; Arenson, Andrew; McMullen, D.F; Palakal, Mathew; Dalkilic, Mehmet; Ortoleva, PeterIndiana University and IBM, Inc. have a very strong history of collaborative research, aided significantly by Shared University Research (SUR) grants from IBM to Indiana University. The purpose of this document is to review progress against recent SUR grants to Indiana University. These grants focus on the joint interests of IBM, Inc. and Indiana University in the areas of deep computing, grid computing, and especially computing for the life sciences. SUR funding and significant funding from other sources, including a $1.8M grant from the NSF and a portion of a $105M grant to Indiana University to create the Indiana Genomics Initiative, have enabled Indiana University to achieve a suite of accomplishments that exceed the ambitious goals set out in these recent SUR grants.Item Aligning Your Research Cyberinfrastructure with HIPAA and FISMA(2015-08-17) Shankar, AnuragItem Building a NIST Risk Management Framework for HIPPA and FISMA Compliance(2016-08-16) Shankar, AnuragItem The centralized life science data service at Indiana University(2004-03-02) Stewart, Craig A.; Arenson, Andrew; Shankar, AnuragItem The Centralized Life Sciences Data Service at Indiana University(2003-01-17) Stewart, Craig A.; Arenson, Andrew; Shankar, AnuragItem Cyber Risks a University Faces as a HIPAA Business Associate(2016-10-21) Shankar, AnuragThis article discusses the impact a breach of protected health information (PHI) may have on a university while it acts as a HIPAA business associate of an external covered entity. While much has been written about breaches affecting covered entities, scant attention has been paid to the risk a third party such as a university assumes by deciding to become a business associate.Item Effective Cybersecurity for Research(2022-06-20) Shankar, Anurag; Drake, WillThe ever-present tension between institutional cybersecurity and researchers has long hampered attempts to secure research. It is also the reason why institutional cybersecurity efforts in academia have been confined to the most sensitive research. The situation has persisted due to other factors also, for instance the complexity of the research environment, but new developments are quickly changing the status quo. Emerging threats and funding requirements scoped beyond individual awards are pointing to a future where securing research holistically is no longer optional. This paper describes an approach to cybersecurity for research that shows great promise in securing research comprehensively. A product of years of work, it focuses exclusively on the researcher and the research mission. It has been stress tested on a large campus, with success exemplified by researchers embracing it voluntarily and research being accelerated greatly.Item Handling Regulated Data, Protected Health Information, and CUI(2017-08-15) Shankar, AnuragHandling regulated government data, protected health information, and controlled unclassified information.Item HIPAA and Advanced Scientific Computing(2013-09-13) Shankar, Anurag; Barnett, WilliamDemand for compute cycles and massive data storage has been growing rapidly in biomedical research. Activities on topics such as electronic health record analytics and gene sequencing are placing an increasing burden on academic medical college IT departments with limited ability to scale. As a result, campus and national advanced scientific computing centers (ASCCs) are being asked to accommodate biomedical researchers. This presents a challenge to these organizations since clinical research data or electronic health records contain identifiable patient information protected by the federal Privacy and Security Rules promulgated under the Health Insurance Portability and Accountability Act (HIPAA) of 1996. The HIPAA Privacy and Security Rules require entities to protect the privacy of individually identifiable health information or protected health information (PHI). The rules specify the types of safeguards that must be put in place including required security controls to ensure patient privacy.Item HIPAA and FISMA: Computing with Regulated Data (A CCoE Webinar Presentation)(2017-04-24) Ramsey, Susan; Shankar, AnuragItem HPC, HIPAA, and FISMA: Meeting the Regulatory Challenge through Effective Risk Management(2014-08-26) Barnett, Bill; Shankar, AnuragItem Indiana University's Advanced Cyberinfrastructure(2011-08) Arenson, Andrew; Boyles, Michael; Cruise, Robert; Gopu, Arvind; Hart, David; Lindenlaub, Peg; Papakhian, Mary; Samuel, John; Seiffert, Kurt; Shankar, Anurag; Stewart, Craig A.; Wernert, EricThe purpose of this document is to introduce researchers to Indiana University’s cyberinfrastructure – to clarify what these facilities make possible, to discuss how to use them and the professional staff available to work with you. The resources described here are complex and varied, among the most advanced in the world. The intended audience is anyone unfamiliar with IU’s cyberinfrastructure.Item INGEN's advanced IT facilities: The least you need to know(2002) Cruise, Robert; Hart, David; Papakhian, Mary; Repasky, Richard; Samuel, John; Shankar, Anurag; Stewart, Craig A.; Wernert, EricItem Research and Academic Computing Implementation Plan(2000-07) Peebles, Christopher S.; Stewart, Craig A.; Bernbom, Gerry; McMullen, Donald F.; Shankar, Anurag; Samuel, John; Daniels, John; Papakhian, Mary; Hart, David; Walsh, John; Wernert, EricItem SCI: ETF Early Operations - Indiana University(2006-06-20) Stewart, Craig A.; Voss, Brian D.; McRobbie, Michael A.; Shankar, Anurag; Simms, Stephen; McCaulay, D. ScottItem SecureMyResearch: Security for Research Productivity(Indiana University Digital Collections Services, 2020-02-19) Welch, Von; Shankar, AnuragSecuring research data, especially meeting new and stricter regulatory and other cybersecurity requirements, is becoming a challenge for both researchers and campus units at IU that support research. To help them navigate this complex landscape, IU is launching SecureMyResearch, a collaborative effort by the Center of Applied Cybersecurity Research (CACR), the Information Security division within the Office of the Vice President for IT, and UITS Research Technologies. Its goal is to accelerate research by empowering researchers with a resource that reduces both their cybersecurity and compliance burden and risk to regulated and open research data at IU. This presentation will describe SecureMyResearch and how it aims to weave research data security and compliance into the institutional fabric.Item Security standards compliance and ease of use of high performance computing systems in clinical research(2021-07) Link, Matthew; Shankar, Anurag; Hancock, David Y.; Henschel, Robert; Michael, Scott; Stewart, Craig A.Precision health research and personalized health therapies involve analysis of protected health information. In 2007, Indiana University established the ability to analyze protected health information (HIPAA alignment) as the minimal and default security level for its research high performance computing (HPC) systems and research storage systems. This resulted in a drastic increase in the use of IU HPC systems by clinical researchers. Security levels were later upgraded to FISMA Low as a default. We recommend that, within the US, FISMA (Federal Information Security Modernization Act) Low compliance be the default minimal level of security for large-scale HPC systems. This would facilitate precision medicine research and enable higher education HPC resources to be used in response to future civil health emergencies.Item TeraGrid: Analysis of Organization, System Architecture, and Middleware Enabling New Types of Applications(IOS Press, 2008) Catlett, Charlie; Allcock, William E.; Andrews, Phil; Aydt, Ruth; Bair, Ray; Balac, Natasha; Banister, Bryan; Barker, Trish; Bartelt, Mark; Beckman, Pete; Berman, Francine; Bertoline, Gary; Blatecky, Alan; Boisseau, Jay; Bottum, Jim; Brunett, Sharon; Bunn, Julian; Butler, Michelle; Carver, David; Cobb, John; Cockerill, Tim; Couvares, Peter F.; Dahan, Maytal; Diehl, Diana; Dunning, Thom; Foster, Ian; Gaither, Kelly; Gannon, Dennis; Goasguen, Sebastien; Grobe, Michael; Hart, Dave; Heinzel, Matt; Hempel, Chris; Huntoon, Wendy; Insley, Joseph; Jordan, Christopher; Judson, Ivan; Kamrath, Anke; Karonis, Nicholas; Kesselman, Carl; Kovatch, Patricia; Lane, Lex; Lathrop, Scott; Levine, Michael; Lifka, David; Liming, Lee; Livny, Miron; Loft, Rich; Marcusiu, Doru; Marsteller, Jim; Martin, Stuart; McCaulay, D. Scott; McGee, John; McGinnis, Laura; McRobbie, Michael; Messina, Paul; Moore, Reagan; Moore, Richard; Navarro, J.P.; Nichols, Jeff; Papka, Michael E.; Pennington, Rob; Pike, Greg; Pool, Jim; Reddy, Raghu; Reed, Dan; Rimovsky, Tony; Roberts, Eric; Roskies, Ralph; Sanielevici, Sergiu; Scott, J. Ray; Shankar, Anurag; Sheddon, Mark; Showerman, Mike; Simmel, Derek; Singer, Abe; Skow, Dane; Smallen, Shava; Smith, Warren; Song, Carol; Stevens, Rick; Stewart, Craig A.; Stock, Robert B.; Stone, Nathan; Towns, John; Urban, Tomislav; Vildibill, Mike; Walker, Edward; Welch, Von; Wilkins-Diehr, Nancy; Williams, Roy; Winkler, Linda; Zhao, Lan; Zimmerman, AnnTeraGrid is a national-scale computational science facility supported through a partnership among thirteen institutions, with funding from the US Na- tional Science Foundation [1]. Initially created through a Major Research Equip- ment Facilities Construction (MREFC [2]) award in 2001, the TeraGrid facility began providing production computing, storage, visualization, and data collections services to the national science, engineering, and education community in January 2004. In August 2005 NSF funded a five-year program to operate, enhance, and expand the capacity and capabilities of the TeraGrid facility to meet the growing needs of the science and engineering community through 2010. This paper de- scribes TeraGrid in terms of the structures, architecture, technologies, and services that are used to provide national-scale, open cyberinfrastructure. The focus of the paper is specifically on the technology approach and use of middleware for the purposes of discussing the impact of such approaches on scientific use of compu- tational infrastructure. While there are many individual science success stories, we do not focus on these in this paper. Similarly, there are many software tools and systems deployed in TeraGrid but our coverage is of the basic system middleware and is not meant to be exhaustive of all technology efforts within TeraGrid. We look in particular at growth and events during 2006 as the user population ex- panded dramatically and reached an initial “tipping point” with respect to adoption of new “grid” capabilities and usage modalities.Item Trusted CI UCB Engagement: Final Report(2020-07-20) Adams, Andrew K.; Peisert, Sean; Shankar, Anurag; Zage, JohnFinal report of the Trusted CI UC Berkeley EngagementItem Trusted CI: Galaxy Engagement Final Report(2021-02-02) Krenz, Mark; Shankar, Anurag; Adams, Andrew; Filus, Shane; Shute, Kelli