Browsing Office of the Vice President for Information Technology/University Information Technology Services by Subject "cybersecurity"

Sort by: Order: Results:

  • Heiland, Randy; Welch, Von (2015-05)
    Discerning meaningful information from network log files is an ongoing challenge in cybersecurity. We demonstrate techniques for analyzing a large log of authentication events and associated graphs. Our approach is ...
  • Heiland, Randy; Koranda, Scott; Marru, Suresh; Pierce, Marlon; Welch, Von (ACM, 2015-06-16)
    Distributed cyberinfrastructure requires users (and machines) to perform some sort of authentication and authorization (together simply known as "auth"). In the early days of com- puting, authentication was performed ...
  • Basney, Jim; Jackson, Craig; Marsteller, Jim; Miller, Barton (2016-05-23)
    In 2016, CTSC launched a webinar series meant to fulfill the mission of providing readily available cybersecurity services tailored to the NSF science community. The CCoE Webinar Series Kickoff provides an overview of CTSC, ...
  • Basney, Jim; Koranda, Scott (2013-07)
    The Center for Trustworthy Scientific Cyberinfrastructure (CTSC) engages with NSF-funded projects to address their cybersecurity challenges. This document presents the results of one such engagement with the Laser ...
  • Heiland, Randy; Marru, Suresh; Pierce, Marlon; Welch, Von (2014-05)
    The Science Gateway Platform (SciGaP, scigap.org ) will provide services to help communities create Science Gateways. SciGaP (via Apache Airavata) will use the Apache Thrift framework ( thrift.apache.org ), a language ...
  • Heiland, Randy; Sons, Susan (2016-08-16)
    This training session will introduce participants to a broad range of tools and methodologies for promoting secure software development throughout the software life cycle. Learn how software repositories, testing, static ...
  • Butler, Randy; Fleury, Terry; Marsteller, Jim; Welch, Von (2013-10)
  • Welch, Von (2/8/2012)
    This document represents a cybersecurity risk assessment of the Globus Online File Transfer service and associated Website service. It provides a set of concerns related to cybersecurity risk and a set of recommendations ...
  • Marsteller, James; Heiland, Randy (2014-01)
  • Basney, Jim; Koranda, Scott (2013-05)
  • Heiland, Randy; Adams, Andrew; Heymann, Elisa (2016-01)
    perfSONAR ("Performance focused Service Oriented Network monitoring ARchitecture") is an infrastructure for monitoring network performance. The perfSONAR software toolkit is deployed around the world, primarily at government ...
  • Welch, Von; Heiland, Randy; Garrison, William C. III; Lee, Adam J. (2016-09-30)
    Design documents for an NSF project related to PKI modeling and simulation.
  • Butler, Randy; Welch, Von; Basney, Jim; Koranda, Scott; Barnett, William K.; Pearson, Doug (11/9/2011)
    Over the period of 2010‐2011, a series of two workshops were held in response to NSF Dear Colleague Letter NSF 10‐050 calling for exploratory workshops to consider requirements for Scientific Software Innovation Institutes ...
  • Sinatra, Michael (2016-08-22)
    Presentation on ScienceDMZ as a Security Architecture. This is part of the CTSC webinar series.
  • Strawn, George (CTSC, 2016-10-24)
    This presentation covers anecdotes about IT security, observations about IT security, and research for the next generation of IT security from an individual who has many decades of experience in IT.
  • Heiland, Randy; Koranda, Scott; Welch, Von (2016-05)
    The Science Gateway Platform as a service (SciGaP) project provides middleware services for science communities. SciGaP has several cybersecurity challenges as it integrates web, campus cyberinfrastructure, and cloud ...
  • Heiland, Randy; Koranda, Scott; Welch, Von (2016-04)
    The Science Gateway Platform as a service (SciGaP) project provides middleware services for science communities. SciGaP has several cybersecurity challenges as it integrates web, campus cyberinfrastructure, and cloud ...
  • Welch, Von; Pearson, Douglas; Tierney, Brian; Williams, James (2012-03)
    International research network connections are unusual in the operation of network connections that cross the U.S. border. This places these networks in a position to see traffic crossing national boundaries, between ...
  • Heiland, Randy; Jim, Basney; Von, Welch (2014-06)
    CTSC (trustedci.org) and the Science Gateway Platform (SciGaP, scigap.org ) present a variety of best security practices that pertain to science gateways, in general, and SciGaP, in particular.

Search IUScholarWorks


Advanced Search

Browse

My Account