Center for Applied Cybersecurity Research
Permanent link for this collectionhttps://hdl.handle.net/2022/15468
The Center for Applied Cybersecurity Research (CACR) leads the creation of IT security policy, security tools, and secure applications in critical areas of cyberinfrastructure, including health. CACR is affiliated with the Indiana University Pervasive Technology Institute and works closely with its partner organizations at Indiana University: CLEAR Health Information, the Maurer School of Law, the Kelley School of Business, the School of Informatics and Computing, REN-ISAC, the University Information Policy Office, and the University Information Security Office.
Browse
Browsing Center for Applied Cybersecurity Research by Issue Date
Now showing 1 - 20 of 193
- Results Per Page
- Sort Options
Item Year 1 Report: Center for Trustworthy Scientific Cyberinfrastructure(2013) Welch, VonItem InCommon Membership in eduGAIN: the LIGO Perspective(2013-05) Basney, Jim; Koranda, ScottItem Pegasus-CTSC Engagement Final Report(2013-05) Heiland, Randy; Koranda, Scott; Welch, VonItem Center for Trustworthy Scientific Cyberinfrastructure Engagement Plan: Final Report for LIGO Engagement(2013-07) Basney, Jim; Koranda, ScottThe Center for Trustworthy Scientific Cyberinfrastructure (CTSC) engages with NSF-funded projects to address their cybersecurity challenges. This document presents the results of one such engagement with the Laser Interferometer Gravitational-Wave Observatory (LIGO), a large research project funded by the National Science Foundation. LIGO seeks to make the first direct detection of gravitational waves, use them to explore the fundamental physics of gravity, and develop the emerging field of gravitational wave science as a tool of astronomical discovery. The primary goal of this engagement was to apply CTSC experience and expertise in leveraging SAML identify federations to support scientific projects to remove barriers for efficient international collaboration between LIGO and other astronomy and astrophysics projects by decreasing the effort required for LIGO to federate with those projects.Item A Study of Three Approaches to International Identity Federation for the LIGO Project(2013-07-02) Basney, Jim; Koranda, ScottItem Streamlining Collaboration with InCommon and Identity Federations(2013-09-30) Anderson, Warren G.; Basney, JimItem Secure Coding Practices (and Other Good Things)(2013-09-30) Miller, Barton P.; Kupsch, James A.; Heymann, ElisaItem Building a Cybersecurity Program: A Tutorial for Managers and PIs(2013-09-30) Duda, Patrick; Marsteller, James; Butler, Randy; Bobba, Rakesh; Welch, Von; Jackson, CraigItem CyberGIS-CTSC Engagement Final Report(2013-10) Butler, Randy; Fleury, Terry; Marsteller, Jim; Welch, VonItem DataONE: Identity Management System Review(2013-10-22) Basney, Jim; Duda, Patrick; Welch, Von; Jackson, CraigItem CACR final retrospective brochure(2014) Welch, VonItem IceCube Cybersecurity Improvement Plan(2014-01) Marsteller, James; Heiland, RandyItem CTSC Recommended Security Practices for Thrift Clients: Case Study - Evernote(2014-05) Heiland, Randy; Marru, Suresh; Pierce, Marlon; Welch, VonThe Science Gateway Platform (SciGaP, scigap.org ) will provide services to help communities create Science Gateways. SciGaP (via Apache Airavata) will use the Apache Thrift framework ( thrift.apache.org ), a language independent, richly typed interface definition language (IDL) to generate both client and server software development kits (SDKs). Thrift takes a departure from many public services in that it is not a RESTful( http://en.wikipedia.org/wiki/Representational_state_transfer ) API. To gain a better understanding of Thrift (for the CTSC-SciGaP engagement), we examine an existing application/service that uses it: Evernote (evernote.com). Hopefully, the design and use cases of Evernote will help inform the design and use cases of SciGaP, at least from a security perspective. This document provides an overview of Evernote with an emphasis on its Cloud API, some examples of its SDKs, and a list of recommended practices for using Evernote.Item Report of the 2013 NSF Cybersecurity Summit for Cyberinfrastructure and Large Facilities: Designing Cybersecurity Programs in Support of Science(2014-05-14) Jackson, Craig; Marsteller, James; Welch, VonThis 3-day summit focused on challenges of supporting those who secure scientific cyberinfrastructure. Tutorials covered identity management, network security and monitoring cybersecurity planning, and secure software development. Working group efforts continue in the Trusted CI Forum (trustedci.groupside.com). Future summits were discussed.Item Suggested Security Practices for SciGaP: A Preliminary Report(2014-06) Heiland, Randy; Jim, Basney; Von, WelchCTSC (trustedci.org) and the Science Gateway Platform (SciGaP, scigap.org ) present a variety of best security practices that pertain to science gateways, in general, and SciGaP, in particular.Item Item Developing Cybersecurity Programs for NSF Projects(2014-08-26) Marsteller, Jim; Sons, Susan; Jackson, Craig; Allar, JaredItem Incident Response Training 2014(2014-08-26) Butler, Randy; Raquel, Warren; Duda, PatrickItem HPC, HIPAA, and FISMA: Meeting the Regulatory Challenge through Effective Risk Management(2014-08-26) Barnett, Bill; Shankar, AnuragItem Secure Coding Practices (and Other Good Things)(2014-08-28) Miller, Barton P.; Kupsch, James A.; Heymann, Elisa