Center for Applied Cybersecurity Research

 

The Center for Applied Cybersecurity Research (CACR) leads the creation of IT security policy, security tools, and secure applications in critical areas of cyberinfrastructure, including health. CACR is affiliated with the Indiana University Pervasive Technology Institute and works closely with its partner organizations at Indiana University: CLEAR Health Information, the Maurer School of Law, the Kelley School of Business, the School of Informatics and Computing, REN-ISAC, the University Information Policy Office, and the University Information Security Office.

Recent Submissions

  • LeDuc, Rich; Peisert, Sean; Stocks, Karen; Welch, Von (2017-01-23)
  • Peisert, S.; Barnett, W.; Dart, E.; Cuff, J.; Grossman, R.L.; Balas, E.; Berman, A.; Shankar, A.; Tierney, B.J. (Oxford University Press on behalf of the American Medical Informatics Association, 2016-05-02)
    The exponentially increasing amounts of “omics” data, the rapid increase of high-quality imaging, and other rapidly growing clinical data sets have resulted in the rise of biomedical research “big data.” The storage, ...
  • Nikolich, Anita; Fu, Xinwen; Joshi, James; Stengel, Brian; Flidr, Jaroslav; Gemmill, Jill (2016-12-12)
  • Welch, Von (CTSC, 2016-12)
    The Center for Trustworthy Scientific Cyberinfrastructure (CTSC) was funded as the NSF Cybersecurity Center of Excellence on January 1st, 2016. This report covers CTSC’s first year (January 1, 2016-December 31, 2016) as ...
  • Marsteller, James; Welch, Von; Starzynski Coddens, Amy (2016-12)
    This event was supported in part by the National Science Foundation under Grant Number 1547272. Any opinions, findings, and conclusions or recommendations expressed at the event or in this report are those of the authors ...
  • Strawn, George (CTSC, 2016-10-24)
    This presentation covers anecdotes about IT security, observations about IT security, and research for the next generation of IT security from an individual who has many decades of experience in IT.
  • Shankar, Anurag (2016-10-21)
    This article discusses the impact a breach of protected health information (PHI) may have on a university while it acts as a HIPAA business associate of an external covered entity. While much has been written about breaches ...
  • Welch, Von; Heiland, Randy; Garrison, William C. III; Lee, Adam J. (2016-09-30)
    Design documents for an NSF project related to PKI modeling and simulation.
  • Heiland, Randy; Garrison, William C. III; Qiao, Yechen; Lee, Adam J.; Welch, Von (2016-09-30)
    Public key infrastructure (PKI), comprised of X.509 certificates (PKIX) and cryptographic protocols, helps ensure secure communications for the Web. The creation of PKI is a fascinating story that dates back to the 1970s ...
  • Nalley, David (2016-09-27)
  • Heiland, Randy; Sons, Susan (2016-08-16)
    This training session will introduce participants to a broad range of tools and methodologies for promoting secure software development throughout the software life cycle. Learn how software repositories, testing, static ...
  • Sinatra, Michael (2016-08-22)
    Presentation on ScienceDMZ as a Security Architecture. This is part of the CTSC webinar series.
  • Marsteller, James (2016-07-25)
    XSEDE Cybersecurity Program & Information Sharing Overview. This includes the XSEDE Security Team background, goals/mission, structure, history, policies and procedures, and incident response program.
  • Heiland, Randy; Koranda, Scott; Welch, Von (2016-04)
    The Science Gateway Platform as a service (SciGaP) project provides middleware services for science communities. SciGaP has several cybersecurity challenges as it integrates web, campus cyberinfrastructure, and cloud ...
  • Heiland, Randy; Koranda, Scott; Welch, Von (2016-05)
    The Science Gateway Platform as a service (SciGaP) project provides middleware services for science communities. SciGaP has several cybersecurity challenges as it integrates web, campus cyberinfrastructure, and cloud ...
  • Fleury, Terry (2016-06-27)
    In 2016, CTSC launched a webinar series meant to fulfill the mission of providing readily available cybersecurity services tailored to the NSF science community. The Risk Self-Evaluation presentation presents an overview ...
  • Basney, Jim; Jackson, Craig; Marsteller, Jim; Miller, Barton (2016-05-23)
    In 2016, CTSC launched a webinar series meant to fulfill the mission of providing readily available cybersecurity services tailored to the NSF science community. The CCoE Webinar Series Kickoff provides an overview of CTSC, ...
  • Heiland, Randy; Jim, Basney; Von, Welch (2014-06)
    CTSC (trustedci.org) and the Science Gateway Platform (SciGaP, scigap.org ) present a variety of best security practices that pertain to science gateways, in general, and SciGaP, in particular.
  • Heiland, Randy; Marru, Suresh; Pierce, Marlon; Welch, Von (2014-05)
    The Science Gateway Platform (SciGaP, scigap.org ) will provide services to help communities create Science Gateways. SciGaP (via Apache Airavata) will use the Apache Thrift framework ( thrift.apache.org ), a language ...

View more