Center for Applied Cybersecurity Research
Permanent link for this collectionhttps://hdl.handle.net/2022/15468
The Center for Applied Cybersecurity Research (CACR) leads the creation of IT security policy, security tools, and secure applications in critical areas of cyberinfrastructure, including health. CACR is affiliated with the Indiana University Pervasive Technology Institute and works closely with its partner organizations at Indiana University: CLEAR Health Information, the Maurer School of Law, the Kelley School of Business, the School of Informatics and Computing, REN-ISAC, the University Information Policy Office, and the University Information Security Office.
Browse
Browsing Center for Applied Cybersecurity Research by Type "Article"
Now showing 1 - 15 of 15
- Results Per Page
- Sort Options
Item Authentication and Authorization Considerations for a Multi-tenant Service(ACM, 2015-06-16) Heiland, Randy; Koranda, Scott; Marru, Suresh; Pierce, Marlon; Welch, VonDistributed cyberinfrastructure requires users (and machines) to perform some sort of authentication and authorization (together simply known as "auth"). In the early days of com- puting, authentication was performed with just a username and password combination, and this is still prevalent today. But during the past several years, we have seen an evolution of approaches and protocols for auth: Kerberos, SSH keys, X.509, OpenID, API keys, OAuth, and more. Not surpris- ingly, there are trade-offs, both technical and social, for each approach. The NSF Science Gateway communities have had to deal with a variety of auth issues. However, most of the early gateways were rather restrictive in their model of access and development. The practice of using community credentials (certificates), a well-intentioned idea to alleviate restrictive access, still posed a barrier to researchers and challenges for security and auditing. And while the web portal-based gate- way clients offered users easy access from a browser, both the interface and the back-end functionality were constrained in the flexibility and extensibility they could provide. Design- ing a well-defined application programming interface (API) to fine-grained, generic gateway services (on secure, hosted cyberinfrastructure), together with an auth approach that has a lower barrier to entry, will hopefully present a more welcoming environment for both users and developers. This paper provides a review and some thoughts on these topics, with a focus on the role of auth between a Science Gateway and a service provider.Item Cyber Risks a University Faces as a HIPAA Business Associate(2016-10-21) Shankar, AnuragThis article discusses the impact a breach of protected health information (PHI) may have on a university while it acts as a HIPAA business associate of an external covered entity. While much has been written about breaches affecting covered entities, scant attention has been paid to the risk a third party such as a university assumes by deciding to become a business associate.Item Education researchers need more understanding of security environment(Trusted CI, 2022-03-16) McCaffrey, DebDeb McCaffrey is a Fellow with Trusted CI, the NSF Cybersecurity Center of Excellence, and a research computing facilitator at the University of Michigan. She explores the security needs of higher education research and clinical research and concludes that both groups need a better understanding of their security environments in order to protect their data.Item Facilitating Scientific Collaboration by Delegating Identity Management: Reducing Barriers & Roadmap for Incremental Implementation(ACM) Cowles, Robert; Jackson, Craig; Welch, VonItem Manage risk with the classification and protection of digital research data(Trusted CI, 2022-03-16) Kyle, MichaelMichael Kyle is a Fellow with Trusted CI, the NSF Cybersecurity Center of Excellence, and is a scientific applications consultant for the University of Delaware. He describes how researchers can manage their risks with the proper classification and protection of digital research data.Item The Medical Science DMZ(Oxford University Press on behalf of the American Medical Informatics Association, 2016-05-02) Peisert, S.; Barnett, W.; Dart, E.; Cuff, J.; Grossman, R.L.; Balas, E.; Berman, A.; Shankar, A.; Tierney, B.J.The exponentially increasing amounts of “omics” data, the rapid increase of high-quality imaging, and other rapidly growing clinical data sets have resulted in the rise of biomedical research “big data.” The storage, analysis, and network resources required to process these data and integrate them into patient diagnoses and treatments have grown to scales that strain the capabilities of academic health centers. Some data are not generated locally and cannot be sustained locally, and shared data repositories such as those provided by the National Library of Medicine, the National Cancer Institute, and international partners such as the European Bioinformatics Institute are rapidly growing. The ability to store and compute using these data must therefore be addressed by a combination of local, national, and industry resources that exchange large data sets. Maintaining data-intensive flows that comply with HIPAA and other regulations presents a new challenge for biomedical research. Recognizing this, we describe a strategy that marries performance and security by borrowing from and redefining the concept of a “Science DMZ”—a framework that is used in physical sciences and engineering research to manage high-capacity data flows.Item Science and Security: Sound odd?(Trusted CI, 2021-01-27) Christopherson, Laura2020 Trusted CI Fellow, Laura Christopherson reports on the lack of security in science research and the importance of making scientific discovery more secure.Item Trusted CI Success Story Academic Research Fleet(Trusted CI, 2021-09-22) Songer, JulieTrusted CI helps U.S. Academic Research Fleet meet 21st century demandsItem Trusted CI Success Story Chicago Array of Things(Trusted CI, 2021-09-21) Songer, JulieTrusted CI aids Chicago Array of Things with public engagement and privacy policyItem Trusted CI Success Story Gemini Observatory(Trusted CI, 2021-09-22) Songer, JulieTrusted CI creates roadmap to ensure data integrity for Gemini ObservatoryItem Trusted CI Success Story Open XDMoD(Trusted CI, 2021-09-22) Songer, JulieTrusted CI helps Open XDMoD harden its defensesItem Trusted CI Success Story Pegasus(Trusted CI, 2021-09-22) Songer, JulieTrusted CI engagement with Pegasus focuses on credentialsItem Trusted CI Success Story TransPAC(Trusted CI, 2021-09-22) Songer, JulieTrusted CI guides TransPAC through NSF cybersecurity requirementsItem Trusted CI Success Story UC Berkeley(Trusted CI, 2021-09-22) Songer, JulieUC Berkeley was looking for experts in higher ed cybersecurity and found Trusted CIItem Trusted CI Success Story Wildbook(Trusted CI, 2021-09-22) Songer, JulieTrusted CI helps Wildbook protect endangered species