Institute for Cyber Security (ICS) & Center for Security and Privacy Enhanced Cloud Computing (C-SPECC) Ravi Sandhu Executive Director Professor of.

Slides:



Advertisements
Similar presentations
INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber.
Advertisements

1 PANEL Solving the Access Control Puzzle: Finding the Pieces and Putting Them Together Ravi Sandhu Executive Director Endowed Professor June 2010
Institute for Cyber Security (ICS) Prof. Ravi Sandhu Executive Director and Lutcher Brown Endowed Chair
Institute for Cyber Security
1 New Trends and Challenges in Computer Network Security Ravi Sandhu Executive Director and Endowed Professor September 2010
1 The Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair.
Future of Access Control: Attributes, Automation, Adaptation
1 A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC Prof. Ravi Sandhu Executive Director and Endowed Chair DBSEC July 11, 2012.
1 Security and Trust Convergence: Attributes, Relations and Provenance Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown.
Attribute-Based Access Control Models and Beyond
1 Plenary Panel on Cloud Security and Privacy: What is new and What needs to be done? Ravi Sandhu Executive Director and Endowed Professor December 2010.
1 Attribute-Based Access Control Models and Beyond Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber.
1 Institute for Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Chair February 4, 2015
1 The Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair.
1 Challenges of Cyber Security Education at the Graduate Level Ravi Sandhu Executive Director and Endowed Professor Nov. 9, 2012
1 Big Data Applications in Cloud and Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Professor UTSA COB Symposium on Big Data, Big Challenges.
1 Grand Challenges in Authorization Systems Prof. Ravi Sandhu Executive Director and Endowed Chair November 14, 2011
1 The Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair.
1 Cloud Computing and Security Prof. Ravi Sandhu Executive Director and Endowed Chair April 19, © Ravi Sandhu.
1 Group-Centric Models for Secure Information Sharing Prof. Ravi Sandhu Executive Director and Endowed Chair March 30, 2012
1 Attribute-Based Access Control Models and Beyond Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber.
1 Panel on Data Usage Management: Technology or Regulation? Prof. Ravi Sandhu Executive Director and Endowed Chair DUMA 2013 May 23, 2013
1 Security and Privacy in Human-Centric Computing and Big Data Management Prof. Ravi Sandhu Executive Director and Endowed Chair CODASPY 2013 February.
1 Open Discussion PSOSM 2012 Prof. Ravi Sandhu Executive Director and Endowed Chair © Ravi Sandhu.
1 Challenges of Cyber Security Education at the Graduate Level Ravi Sandhu Executive Director and Endowed Professor July 27, 2011
1 Role-Based Access Control (RBAC) Prof. Ravi Sandhu Executive Director and Endowed Chair January 29, © Ravi.
1 Secure Cloud Computing: A Research Perspective Prof. Ravi Sandhu Executive Director and Endowed Chair Texas Fresh Air Big Data and Data Analytics Conference.
INSTITUTE FOR CYBER SECURITY 1 Purpose-Centric Secure Information Sharing Ravi Sandhu Executive Director and Endowed Professor Institute for Cyber Security.
Institute for Cyber Security
Institute for Cyber Security
World-Leading Research with Real-World Impact!
Security and Privacy in the Networked World
An Access Control Perspective on the Science of Security
UTSA's New Center Center for Security and Privacy Enhanced Cloud Computing (C-SPECC) Ravi Sandhu Executive Director of ICS and C-SPECC Professor.
Institute for Cyber Security: Research Vision
Attribute-Based Access Control: Insights and Challenges
Role-Based Access Control (RBAC)
Identity and Access Control in the
Executive Director and Endowed Chair
Cyber Security Research: Applied and Basic Combined*
On the Value of Access Control Models
Institute for Cyber Security
Institute for Cyber Security
ABAC Panel Prof. Ravi Sandhu Executive Director and Endowed Chair
Institute for Cyber Security
Attribute-Based Access Control (ABAC)
Cyber Security Research: Applied and Basic Combined*
Institute for Cyber Security: Research Vision
Security and Privacy in the Age of the Internet of Things:
Intersection of Data, Policy and Privacy
Authentication and Authorization Federation
UTSA Cyber Security Ecosystem
Attribute-Based Access Control: Insights and Challenges
Cyber Security and Privacy: An Optimist’s Perspective
Identity and Access Control in the
Executive Director and Endowed Chair
Cyber Security Trends and Challenges
World-Leading Research with Real-World Impact!
Institute for Cyber Security Overview
ASCAA Principles for Next-Generation Role-Based Access Control
Assured Information Sharing
Institute for Cyber Security
Cyber Security Research: A Personal Perspective
Cyber Security Research: Applied and Basic Combined*
World-Leading Research with Real-World Impact!
Attribute-Based Access Control (ABAC)
Access Control Evolution and Prospects
Cyber Security R&D: A Personal Perspective
World-Leading Research with Real-World Impact!
Access Control Evolution and Prospects
Presentation transcript:

Institute for Cyber Security (ICS) & Center for Security and Privacy Enhanced Cloud Computing (C-SPECC) Ravi Sandhu Executive Director Professor of Computer Science Lutcher Brown Chair in Cyber Security UTSA-NSA Briefing, UTSA Campus September 28, 2017 ravi.sandhu@utsa.edu www.ics.utsa.edu www.profsandhu.com World-Leading Research with Real-World Impact!

ICS Mission and History Sustained excellence in graduate-level sponsored research 2012-2017 Graduated to a self-sustaining operation 2007-2012 Founded by start-up funding from State of Texas 2017-2022 Major expansion by winning NSF C-SPECC grant In collaboration with: College of Science College of Engineering College of Business College of Education and Human Development Open Cloud Institute Cyber Center for Security & Analytics © Ravi Sandhu World-Leading Research with Real-World Impact!

World-Leading Research with Real-World Impact! Natural Science The Elephant Problem © Ravi Sandhu World-Leading Research with Real-World Impact!

The Cyber-Elephant Problem Cyber Science The Cyber-Elephant Problem © Ravi Sandhu World-Leading Research with Real-World Impact!

ICS Research Philosophy Applied and Basic Research Combined (ABC) Software: Waterfall -> Agile and DevOps Security: Waterfall -> ??? Tech transfer: Technology Readiness Levels (TRLs) -> ??? * The New ABCs of Research by Ben Schneiderman, 2016 © Ravi Sandhu World-Leading Research with Real-World Impact!

World-Leading Research with Real-World Impact! Major Research Areas TECHNOLOGIES Access Control Policy Malware Security Dynamics APPLICATION DOMAINS Cloud Computing Internet of Things (IoT) Social Networks Enterprise © Ravi Sandhu World-Leading Research with Real-World Impact!

Access Control Evolution Discretionary Access Control (DAC), 1970 Mandatory Access Control (MAC), 1970 Role Based Access Control (RBAC), 1995 Attribute Based Access Control (ABAC), ???? Born 1990s © Ravi Sandhu World-Leading Research with Real-World Impact!

Access Control Evolution Discretionary Access Control (DAC), 1970 Mandatory Access Control (MAC), 1970 Relationship Based Access Control (ReBAC) ???? Role Based Access Control (RBAC), 1995 Provenance Based Access Control (PBAC) ???? Born mid 2000s Born late 2000s Attribute Based Access Control (ABAC), ???? Born 1990s © Ravi Sandhu World-Leading Research with Real-World Impact!

ABAC Research Landscape 7. ABAC Design, Engineering and Applications 3. Administrative ABAC Models 4. Extended ABAC Models 5. ABAC Policy Architectures and Languages 6. ABAC Enforcement Architectures 2. Core ABAC Models 1. Foundational Principles and Theory © Ravi Sandhu World-Leading Research with Real-World Impact!

ICS and UTSA can dig a lot DEEPER and BROADER Major Research Areas TECHNOLOGIES Access Control Policy Malware Security Dynamics APPLICATION DOMAINS Cloud Computing Internet of Things (IoT) Social Networks Enterprise ICS and UTSA can dig a lot DEEPER and BROADER © Ravi Sandhu World-Leading Research with Real-World Impact!