Center for Applied Cybersecurity Research

 

The Center for Applied Cybersecurity Research (CACR) leads the creation of IT security policy, security tools, and secure applications in critical areas of cyberinfrastructure, including health. CACR is affiliated with the Indiana University Pervasive Technology Institute and works closely with its partner organizations at Indiana University: CLEAR Health Information, the Maurer School of Law, the Kelley School of Business, the School of Informatics and Computing, REN-ISAC, the University Information Policy Office, and the University Information Security Office.

Recent Submissions

  • Strawn, George (CTSC, 2016-10-24)
    This presentation covers anecdotes about IT security, observations about IT security, and research for the next generation of IT security from an individual who has many decades of experience in IT.
  • Shankar, Anurag (2016-10-21)
    This article discusses the impact a breach of protected health information (PHI) may have on a university while it acts as a HIPAA business associate of an external covered entity. While much has been written about breaches ...
  • Welch, Von; Heiland, Randy; Garrison, William C. III; Lee, Adam J. (2016-09-30)
    Design documents for an NSF project related to PKI modeling and simulation.
  • Heiland, Randy; Garrison, William C. III; Qiao, Yechen; Lee, Adam J.; Welch, Von (2016-09-30)
    Public key infrastructure (PKI), comprised of X.509 certificates (PKIX) and cryptographic protocols, helps ensure secure communications for the Web. The creation of PKI is a fascinating story that dates back to the 1970s ...
  • Nalley, David (2016-09-27)
  • Heiland, Randy; Sons, Susan (2016-08-16)
    This training session will introduce participants to a broad range of tools and methodologies for promoting secure software development throughout the software life cycle. Learn how software repositories, testing, static ...
  • Sinatra, Michael (2016-08-22)
    Presentation on ScienceDMZ as a Security Architecture. This is part of the CTSC webinar series.
  • Marsteller, James (2016-07-25)
    XSEDE Cybersecurity Program & Information Sharing Overview. This includes the XSEDE Security Team background, goals/mission, structure, history, policies and procedures, and incident response program.
  • Heiland, Randy; Koranda, Scott; Welch, Von (2016-04)
    The Science Gateway Platform as a service (SciGaP) project provides middleware services for science communities. SciGaP has several cybersecurity challenges as it integrates web, campus cyberinfrastructure, and cloud ...
  • Heiland, Randy; Koranda, Scott; Welch, Von (2016-05)
    The Science Gateway Platform as a service (SciGaP) project provides middleware services for science communities. SciGaP has several cybersecurity challenges as it integrates web, campus cyberinfrastructure, and cloud ...
  • Fleury, Terry (2016-06-27)
    In 2016, CTSC launched a webinar series meant to fulfill the mission of providing readily available cybersecurity services tailored to the NSF science community. The Risk Self-Evaluation presentation presents an overview ...
  • Basney, Jim; Jackson, Craig; Marsteller, Jim; Miller, Barton (2016-05-23)
    In 2016, CTSC launched a webinar series meant to fulfill the mission of providing readily available cybersecurity services tailored to the NSF science community. The CCoE Webinar Series Kickoff provides an overview of CTSC, ...
  • Heiland, Randy; Jim, Basney; Von, Welch (2014-06)
    CTSC (trustedci.org) and the Science Gateway Platform (SciGaP, scigap.org ) present a variety of best security practices that pertain to science gateways, in general, and SciGaP, in particular.
  • Heiland, Randy; Marru, Suresh; Pierce, Marlon; Welch, Von (2014-05)
    The Science Gateway Platform (SciGaP, scigap.org ) will provide services to help communities create Science Gateways. SciGaP (via Apache Airavata) will use the Apache Thrift framework ( thrift.apache.org ), a language ...
  • Heiland, Randy; Koranda, Scott; Marru, Suresh; Pierce, Marlon; Welch, Von (ACM, 2015-06-16)
    Distributed cyberinfrastructure requires users (and machines) to perform some sort of authentication and authorization (together simply known as "auth"). In the early days of com- puting, authentication was performed ...
  • Heiland, Randy; Welch, Von (2015-05)
    Discerning meaningful information from network log files is an ongoing challenge in cybersecurity. We demonstrate techniques for analyzing a large log of authentication events and associated graphs. Our approach is ...
  • Heiland, Randy; Adams, Andrew; Heymann, Elisa (2016-01)
    perfSONAR ("Performance focused Service Oriented Network monitoring ARchitecture") is an infrastructure for monitoring network performance. The perfSONAR software toolkit is deployed around the world, primarily at government ...
  • Jackson, Craig; Marsteller, James; Starzynski Coddens, Amy; Welch, Von
  • Basney, Jim (CTSC (Center for Trustworthy Scientific Infrastructure), 2015-11)
    This technical report collects a series of CTSC blog posts on identity management (IdM) best practices published in 2014 for archival purposes.

View more