IUCRC New Site Planning Grant Purdue University Net-Centric Software and Systems Research Center Joining Existing NSFcenters at Univ. of North Texas, Arizona.

Slides:



Advertisements
Similar presentations
Electric Vehicles Industrial Cluster - NPO IKEM Corp. (Business entity of EVIC) Changing the Government Agenda of EU's poorest countries using the power.
Advertisements

EAC HIGHER EDUCATION POLICY
A platform of for knowledge and services sharing Fernando Ferri IRPPS-CNR.
The System Center Family Microsoft. Mobile Device Manager 2008.
Private Sector Perspectives on Federal Financial Systems Modernization and Shared Services.
International Research and Education in Engineering (IREE) − Ideas for the Next Phase − Win Aung Chair, NSF/ENG IREE Working Group Division of Engineering.
New Data Access Model – Briefing for Internal Audit Personnel 12/15/20081New Data Access Model Pat Burns, VP for IT Thom Hadley, Dir. of Fin. & Strategic.
Connecting People With Information DoD Net-Centric Services Strategy Frank Petroski October 31, 2006.
1 Exploring NSF Funding Opportunities in DUE Tim Fossum Division of Undergraduate Education Vermont EPSCoR NSF Research Day May 6, 2008.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
/16/2015 9:20:53 PM 9. Role-Based Access Control (RBAC) Role Classification Algorithm Prof. Bharat Bhargava Center for Education and Research in.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Join Our Research Efforts in CCAA to Improve Cybersecurity Robustness, Resiliency and Management in Enterprises Information Slides to Encourage Your Organization.
Center for Embedded Systems | An NSF Industry/University Cooperative Research Center CONFIDENTIAL CENTER FOR EMBEDDED SYSTEMS A NSF Industry University.
NSF-Sponsored Industry/University Cooperative Research Center for Advanced Knowledge Enablement (FAU Site) Status Report, May 2010.
An Intelligent Broker Architecture for Context-Aware Systems A PhD. Dissertation Proposal in Computer Science at the University of Maryland Baltimore County.
● Problem statement ● Proposed solution ● Proposed product ● Product Features ● Web Service ● Delegation ● Revocation ● Report Generation ● XACML 3.0.
A little history… CCCS Consortium Grants Colorado Lumina Initiative, Lumina Foundation A forerunner for the developmental education redesign.
Invent the Future Dynamic Web Based Methods and Tools for Multi-University I/UCRC Management, Data Integration and Decision Support Janis Terpenny January.
HCIMA Unit 3 The Internet Revolution and Electronic Tools Next slide.
Jeanne Corcoran, OTD, OTR/L October 6 th, The mission of Envision Center for Data Perceptualization is to serve, support, and collaborate with faculty,
Directorate for Engineering Engineering Education and Centers Engineering Education and Centers EPSCoR “Developing NSF Centers” Conference Lexington, KY.
Information Technology Lonnie Bentley, Professor and Head Department of Computer Technology (CPT) - and - H. E. (Buster) Dunsmore, Professor Department.
Science & Technology Centers Program Center for Science of Information National Science Foundation Science & Technology Centers Program Bryn Mawr Howard.
Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity for Critical Infrastructure Workshop Summary May 3, 2013 Support for.
CS480 Computer Science Seminar Introduction to Microsoft Solutions Framework (MSF)
Page 1 Informatics Pilot Project EDRN Knowledge System Working Group San Antonio, Texas January 21, 2001 Steve Hughes Thuy Tran Dan Crichton Jet Propulsion.
Microsoft Research Faculty Summit Division within Microsoft Research focused on partnerships between academia, industry and government to advance.
DOSAR Workshop, Sao Paulo, Brazil, September 16-17, 2005 LCG Tier 2 and DOSAR Pat Skubic OU.
DOE 2000, March 8, 1999 The IT 2 Initiative and NSF Stephen Elbert program director NSF/CISE/ACIR/PACI.
The roots of innovation Future and Emerging Technologies (FET) Future and Emerging Technologies (FET) The roots of innovation Proactive initiative on:
Chapter 1 Foundations of Information Systems in Business.
MTBC Cloud Computing Initiative  Applications of cloud computing  Overview of the NSF Net-Centric Software and Systems (NCSS) I/UCRC  MTBC and NCSS.
Funding Strategies Session Alon Lavie, Jaime Carbonell, Eric Nyberg LTI Retreat August 9, 2005.
Computing Ontology Part II. So far, We have seen the history of the ACM computing classification system – What have you observed? – What topics from CS2013.
08/05/06 Slide # -1 CCI Workshop Snowmass, CO CCI Roadmap Discussion Jim Bottum and Patrick Dreher Building the Campus Cyberinfrastructure Roadmap Campus.
2006 ANNUAL MEETING Arlington, Virginia INDUSTRY / UNIVERSITY COOPERATIVE RESEARCH CENTERS PROGRAM Pre-Session: ROLE OF EVALUATOR 8:00 - 9:00 am Thursday,
Net - Centric Software and Systems Consortium (NCSC) NSF Industry- University Co-Operative Research Center (ICURC) (ICURC) NSF Industry- University Co-Operative.
Technological Innovation and Competitiveness at the NSF Franklin Carrero-Martínez, Ph.D. International Science and Engineering National Science Foundation.
OpenField Consolidates Stadium Data, Provides CRM and Analysis Functions for an Intelligent, End-to-End Solution COMPANY PROFILE : OPENFIELD Founded by.
1Mobile Computing Systems © 2001 Carnegie Mellon University Writing a Successful NSF Proposal November 4, 2003 Website: nsf.gov.
MidVision Enables Clients to Rent IBM WebSphere for Development, Test, and Peak Production Workloads in the Cloud on Microsoft Azure MICROSOFT AZURE ISV.
Data-Centric Security and User Access Controls for Hadoop on Microsoft Azure MICROSOFT AZURE APP BUILDER PROFILE: BLUETALON BlueTalon provides data-centric.
Semantic Web in Context Broker Architecture Presented by Harry Chen, Tim Finin, Anupan Joshi At PerCom ‘04 Summarized by Sungchan Park
Foundations of Information Systems in Business
An Update on Southwest Research Institute Contributions in FY 2014 Presented by Wesley C. Patrick November 19, 2014.
UK Interest & Input to the Factories of the Future Horizon 2020 Roadmap. © ActionPlant 2011.
RobuSTore: Performance Isolation for Distributed Storage and Parallel Disk Arrays Justin Burke, Huaxia Xia, and Andrew A. Chien Department of Computer.
Technology Plan SMITA PIMPLAPURE Final Project Technology and Educational Restructuring December 11, 2003.
Sustaining The Mature Cooperative Larry Hornak
Institute of modern technology Montenegro - IMTM
Strategies for NIS Development
DocFusion 365 Intelligent Template Designer and Document Generation Engine on Azure Enables Your Team to Increase Productivity MICROSOFT AZURE APP BUILDER.
Foundations of Information Systems in Business
Presentation about BILAT USA 4.0
Using Microsoft Azure, Crowdnetic Launches Innovative Lending Gateway Platform That Connects Borrowers to Alternative Lenders MICROSOFT AZURE SOLUTION.
Get Real Value and Insights from Your Data: Biin Solutions Provides Predictive Analytics, IoT, and Business Intelligence with Microsoft Azure Power MICROSOFT.
Institute for Cyber Security (ICS) & Center for Security and Privacy Enhanced Cloud Computing (C-SPECC) Ravi Sandhu Executive Director Professor of.
UTSA's New Center Center for Security and Privacy Enhanced Cloud Computing (C-SPECC) Ravi Sandhu Executive Director of ICS and C-SPECC Professor.
Institute for Cyber Security: Research Vision
Attribute-Based Access Control: Insights and Challenges
Model-Driven Engineering for Mission-Critical IoT Systems
Institute for Cyber Security: Research Vision
Autonomous Aggregate Data Analytics in Untrusted Cloud
Protect Your Microsoft Azure Cloud Assets Against Inside and Outside Threats With Balabit’s Shell Control Box Privileged User Monitoring Solution Partner.
Media365 Portal by Ctrl365 is Powered by Azure and Enables Easy and Seamless Dissemination of Video for Enhanced B2C and B2B Communication MICROSOFT AZURE.
Attribute-Based Access Control: Insights and Challenges
Institute for Cyber Security Overview
Dr. Kathleen Liang Kellogg Distinguished Professor of Sustainable Agriculture Director of Center for Environmental Farming Systems North Carolina A&T State.
Peter E, Ayemholan1, Garba, Suleiman2 and Osaigbovo Timothy3
Presentation transcript:

IUCRC New Site Planning Grant Purdue University Net-Centric Software and Systems Research Center Joining Existing NSFcenters at Univ. of North Texas, Arizona State, and Missouri Institute of Science and Technology

Industry and Purdue and NSF BharatBhargava Ananth GramaDistributed Suresh JagannathanDistributed Yung-Hsiang LuEmbedded and Mobile Systems Xiangyu

Projects Attribution in Cyberspace through calling context encoding (Zhang) Data-centric programming beyond data parallelism (Grama and Jagannathan) Data sharing and dissemination security (Bhargava) Energy management for mobile systems (Lu) Reliable distributed storage (Grama and Jagannathan) Secure mobile and cloud computing (Bhargava and Lu) Security auditing in service oriented architecture (Bhargava and Zhang)

Need Industry support Planning grant funded by NSF ( $14,000) Allows us to visit and organize a workshop with industry. We seek your support to obtain total of $150K from industry combined to allow us to submit full proposal to NSF. NSF will match $60K per year Research Projects will be selected by You Will Organize a workshop one day before corporate partner’s meeting in Fall 2013 to present projects in detail ( NSF and directors of affiliated centers and you will be invited to attend).

About the Industry/University Cooperative Research (I/UCRC) Program From NSF web site About the I/UCRC Program - partnerships, structure, how the program works. Each center is established to conduct research that is of interest to both the industry and the university with which it is involved, with the provision that the industry must provide major support to the center at all times. The centers rely primarily on the involvement of graduate students in their research projects, thus developing students who are knowledgeable in industrially relevant research.About the I/UCRC Program Position Statement To industry, government, and other organizations with research needs; the NSF I/UCRC program provides the means to leverage research and development (R&D) investments with multi-university centers renown for their innovative research capabilities. To colleges and universities with research capabilities; the NSF I/UCRC program provides opportunities to partner with other leading institutions to conduct industrially relevant research, receive seed funding and recognition as a National Science Foundation (NSF) research center with access to professional resources and guidance aimed towards enhancing global competitiveness.

1. Secure Information Sharing and Access Control in Supply-Chain

2. An End-to-End Security Auditing Approach for Service Oriented Architectures

SOA End to End Security

3. Active Bundle for Protecting Sensitive Data Controlled and Selective Dissemination: Control the dissemination and selectively share the Quantifiable and Contextual Data Dissemination: Track the amount of data disclosed to a particular host and decide to further disclose or deny data requests Dynamic Metadata Adjustment: Update the policies based on a context, host, history of interactions, trust... Do not require hosts to have a policy enforcement engine or a trusted component No trusted destination host assumption – works on unknown hosts Decentralized Distributed Asynchronous communication

4. Mobile Intelligence using Cloud Computing 1. mobile systems acquire information 2. send to server 3. analyze data make intelligent decisions 5. send results 6. user feedback to continuous improvement of computation results 4. retrieve additional information + perform massive computation using cloud servers

Software Architecture (A General Approach for Mobile Intelligence) Why is this approach different? It is general to any type of mobile intelligence that requires heavy computation Mobile System User Interface and Feedback Information Clusters Offloader Profiler ProgramNetworkData... Run-Time System Server Information Clusters Analysis Algorithms Mobile InterfaceCloud Interface Graphics Processor Multicore Processor

5. Secure and Adaptable Mobile-Cloud Cloud computing outsources services. What cloud services can be trusted? What information would be exchanged? How to detect malicious servers? What is the cost of protection? Trusted Parties Internet (untrusted communication) Trusted server Untrusted Parties Untrusted server