INSTITUTE FOR CYBER SECURITY 11 Research Opportunities at the Institute for Cyber Security (ICS) Ravi Sandhu Executive Director and Endowed Professor www.ics.utsa.edu.

Slides:



Advertisements
Similar presentations
INSTITUTE FOR CYBER SECURITY 1 Trusted Computing Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University.
Advertisements

INSTITUTE FOR CYBER SECURITY 1 The ASCAA * Principles Applied to Usage Control Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber.
Cyber-Identity, Authority and Trust in an Uncertain World
1 Trust Evidence in Heterogeneous Environments: Towards a Research Agenda Ravi Sandhu Executive Director and Endowed Professor May 2010
Cyber-Identity, Authority and Trust in an Uncertain World
INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber.
INSTITUTE FOR CYBER SECURITY 1 Cyber Security: What You Need to Know Prof. Ravi Sandhu Executive Director and Chief Scientist Institute for Cyber Security.
INSTITUTE FOR CYBER SECURITY April Access Control and Semantic Web Technologies Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber.
1 Trust Evidence in Heterogeneous Environments: Towards a Research Agenda Ravi Sandhu Executive Director and Endowed Professor May 2010
INSTITUTE FOR CYBER SECURITY 1 Industry-Academia Research Synergy: Fantasy or Reality? Ravi Sandhu Executive Director and Endowed Professor Institute for.
Institute for Cyber Security (ICS) Prof. Ravi Sandhu Executive Director and Lutcher Brown Endowed Chair
1 Speculations on the Future of Cyber Security in 2025 Prof. Ravi Sandhu Executive Director and Chief Scientist Institute for Cyber Security University.
1 Speculations on the Future of Cyber Security in 2025 Prof. Ravi Sandhu Executive Director January 2010
INSTITUTE FOR CYBER SECURITY 1 The PEI + UCON Framework for Application Security Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber.
Cyber-Identity and Authorization in an Uncertain World Ravi Sandhu Laboratory for Information Security Technology Department of Information.
1 The Challenge of Data and Application Security and Privacy (DASPY): Are We Up to It? Ravi Sandhu Executive Director and Endowed Professor February 21,
Institute for Cyber Security ASCAA Principles for Next- Generation Role-Based Access Control Ravi Sandhu Executive Director & Endowed Professor Institute.
INSTITUTE FOR CYBER SECURITY 1 The PEI Framework for Application-Centric Security Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for.
INFS 767 Fall 2003 The RBAC96 Model Prof. Ravi Sandhu George Mason University.
Institute for Cyber Security
© 2006 Ravi Sandhu Secure Information Sharing Enabled by Trusted Computing and PEI * Models Ravi Sandhu (George Mason University and TriCipher)
Institute for Cyber Security ASCAA Principles for Next-Generation Role-Based Access Control Ravi Sandhu Executive Director and Endowed Chair Institute.
ENGINEERING AUTHORITY AND TRUST IN CYBERSPACE: A ROLE-BASED APPROACH Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University.
1 New Trends and Challenges in Computer Network Security Ravi Sandhu Executive Director and Endowed Professor September 2010
© 2006 Ravi Sandhu Cyber-Identity, Authority and Trust Systems Prof. Ravi Sandhu Professor of Information Security and Assurance Director,
© 2005 Ravi Sandhu Role Usage and Activation Hierarchies (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security.
Engineering Authority and Trust in Cyberspace: The OM-AM and RBAC Way Prof. Ravi Sandhu George Mason University
1 Cyber Security Research: A Personal Perspective Prof. Ravi Sandhu Executive Director and Endowed Chair January 18, 2013
1 Cloud Computing Prof. Ravi Sandhu Executive Director and Endowed Chair April 12, © Ravi Sandhu World-Leading.
1 The Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair.
Attribute-Based Access Control Models and Beyond
INSTITUTE FOR CYBER SECURITY 1 Cyber Security: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security.
1 Grand Challenges in Authorization Systems Prof. Ravi Sandhu Executive Director and Endowed Chair November 14, 2011
1 The Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair.
INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security.
Application-Centric Security Models
1 Cyber Security A Personal Perspective Prof. Ravi Sandhu Executive Director and Endowed Chair January 15, 2016
Big Data Analytics Are we at risk? Dr. Csilla Farkas Director Center for Information Assurance Engineering (CIAE) Department of Computer Science and Engineering.
1 Item 3 - Research and Development of High Security Remote Authentication Technology Item 3 - Research and Development of High Security Remote Authentication.
INSTITUTE FOR CYBER SECURITY 1 Purpose-Centric Secure Information Sharing Ravi Sandhu Executive Director and Endowed Professor Institute for Cyber Security.
Institute for Cyber Security
Institute for Cyber Security
Past, Present and Future
Institute for Cyber Security (ICS) & Center for Security and Privacy Enhanced Cloud Computing (C-SPECC) Ravi Sandhu Executive Director Professor of.
UTSA's New Center Center for Security and Privacy Enhanced Cloud Computing (C-SPECC) Ravi Sandhu Executive Director of ICS and C-SPECC Professor.
Introduction to Cyber Security
Introduction and Basic Concepts
Institute for Cyber Security: Research Vision
Attribute-Based Access Control: Insights and Challenges
Cyber Security Research: Applied and Basic Combined*
Institute for Cyber Security
Attribute-Based Access Control (ABAC)
Cyber Security Research: Applied and Basic Combined*
Institute for Cyber Security: Research Vision
Security and Privacy in the Age of the Internet of Things:
UTSA Cyber Security Ecosystem
Attribute-Based Access Control: Insights and Challenges
Big Data and Privacy Panel Prof. Ravi Sandhu
Cyber Security Trends and Challenges
World-Leading Research with Real-World Impact!
Institute for Cyber Security Overview
ASCAA Principles for Next-Generation Role-Based Access Control
Assured Information Sharing
Institute for Cyber Security
Cyber Security Research: A Personal Perspective
Cyber Security Research: Applied and Basic Combined*
Attribute-Based Access Control (ABAC)
Access Control Evolution and Prospects
Cyber Security R&D: A Personal Perspective
Access Control Evolution and Prospects
Presentation transcript:

INSTITUTE FOR CYBER SECURITY 11 Research Opportunities at the Institute for Cyber Security (ICS) Ravi Sandhu Executive Director and Endowed Professor

INSTITUTE FOR CYBER SECURITY 2 About ICS 2 ICS ICS Labs World-class sponsored research on all aspects of cyber security in collaboration with leading academic, industry and government partners ICS Incubator Develops innovative security products and companies by bringing in novel and commercially viable ideas and prototypes, incubating and developing these and spinning out companies ICS CIAS Conducts dark screen exercises and training at the city and county level to improve our nations capability to withstand coordinated cyber attacks We are a startup Founded June 2007 by multi-million start- up funding from State of Texas, conditional on recruiting Prof. Ravi Sandhu to lead ICS We are different World-class research with commercialization ICS Labs is off to a great start $1.7M (UTSA portion) in new funding won in 2008 in partnership with Purdue, UIUC, UMBC, UNCC, Michigan, UTD, Penn St., ASU, Georgia Tech

INSTITUTE FOR CYBER SECURITY 3 About Ravi Sandhu BTech, MTech: Electrical Engineering, IIT Bombay, IIT Delhi MS, PhD: Computer Science, Rutgers Univ., New Jersey Assistant Prof of Computer Science, Ohio State U (6 yrs) Associate/Full Prof of Information Security, George Mason U (18 yrs) Full Prof & Endowed Chair of Cyber Security, UTSA (2007 onwards) Founding EIC ACM TISSEC: worlds leading security journal Founder ACM CCS: worlds leading security conference Founder ACM SACMAT: another leading security conference Major author of NIST/ANSI Standard on Role-Based Access Control Creator & architect of MS and PhD programs in Cyber Security at GMU Co-Founder & Chief Scientist, TriCipher: Silicon Valley startup One of the worlds most cited authors in cyber security research 10,000+ Google Scholar hits, with two superhits (3200+ and hits) 175 papers with 50+ co-authors, 14 PhD graduates ACM Fellow, IEEE Fellow, 12 Security Technology patents Awards from ACM, IEEE, NIST, NSA

INSTITUTE FOR CYBER SECURITY The Computer Science Research Triangle 4 Theory e.g., P =? NP, Automata Implementation e.g., Virtualization, Peer-to-peer Models e.g., 7-layer OSI nw stack, OO Programming A good PhD dissertation should involve all 3 elements but contributions will typically emphasize one of these ICS Forte

INSTITUTE FOR CYBER SECURITY Cyber Security Goals 5 5 INTEGRITY modification AVAILABILITY access CONFIDENTIALITY disclosure USAGE purpose USAGE

INSTITUTE FOR CYBER SECURITY 6 ICS Forte: Security Models and Analysis Models RBAC: Role-Based Access Control,1992- UCON: Usage Control, PEI: Policy-Enforcement- Implementation, … Applications Enterprise security Identity management Information sharing Stream-processing Social networking … IT Technologies Web 2.0 Virtualization Software as a Service (SaaS) Web services Trusted computing Semantic web … Attack Technologies Botnets Phishing Buffer overflow Cross scripting Sniffers …

INSTITUTE FOR CYBER SECURITY RBAC96 Model (1992-) 7 ROLES USER-ROLE ASSIGNMENT PERMISSIONS-ROLE ASSIGNMENT USERSPERMISSIONS... SESSIONS ROLE HIERARCHIES CONSTRAINTS The most successful authorization model so far

INSTITUTE FOR CYBER SECURITY 8 Usage Control UCON Model (2002-) unified model integrating authorization obligation conditions and incorporating continuity of decisions mutability of attributes New kid on the block Receiving good traction

INSTITUTE FOR CYBER SECURITY 9 PEI Models (2004-) No competing framework so far

INSTITUTE FOR CYBER SECURITY Current Funded Projects Managing the Assured Information Sharing Life Cycle (AISL) Sponsor: Air Force Office of Scientific Research, MURI, Partners: UMBC, Michigan, UIUC, Purdue, UTD 9/11 caused us to move from a "need to know" mindset to a "need to share" posture. What does this really mean? What are the implications? How can we share safely? How do we share but protect? Securing Dynamic Online Social Networks Sponsor: National Science Foundation, Partners: Penn. State Univ., ASU, UNC-Charlotte Content, often including private sensitive data, is flowing into social networks at a very high rate. How do we enable privacy and security without impacting the velocity of data transfer and convenience? A Framework for Combating Stealthy Botnets Sponsor: Air Force Office of Scientific Research, MURI, Partners: Georgia Tech. Botnets are the most dangerous, widespread and insidious attack vehicles on the Internet. Future botnets are anticipated to use stealth techniques such as encryption and aggregation to avoid exposure, easily defeating current detection techniques. What do we do to contain this threat? Secure Knowledge Management: Models and Mechanisms Sponsor: National Science Foundation, How do we combine cryptographic techniques and access control techniques to effectively protect information and knowledge? 10

INSTITUTE FOR CYBER SECURITY Current Un-Funded Projects Write your own ticket 11

INSTITUTE FOR CYBER SECURITY 12 Group-Based Information Sharing Information Sharing Metaphors: Secure virtual room in cyberspace Subscription service Idealized policy: Formalized using temporal logic Pragmatic policy: Approximation to ideal, formalized using temporal logic Detailed protocols Working system

INSTITUTE FOR CYBER SECURITY Conclusion The need for cyber security will only grow Unless humans suddenly transform into angels Unless cyber innovations stop delivering productivity gains The best we can offer is to stay ahead of the attackers Attackers are often more innovative and more incented than defenders Every cyber technology innovation creates a new attack-defend cycle No final solution UTSA has a world class research operation in cyber security Take security courses Join our team Come talk to me: drop me an and I will make time We have multiple openings Come join us on Nov 18 th to celebrate our Founders Day 4:00-5:30pm: Distinguished lecture by Prof. Eugene Spafford of Purdue 5:30-7:00pm: Wine and cheese reception See 13