Data and Applications Security (DAS) Research at UTD Dr. Bhavani Thuraisingham 20 June 2006.

Slides:



Advertisements
Similar presentations
DELOS Highlights COSTANTINO THANOS ITALIAN NATIONAL RESEARCH COUNCIL.
Advertisements

Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Secure Knowledge Management: and.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Review for Final Exam November 19, 2010.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course January.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #1 Introduction to Data.
1 Confidentiality and Trust Management in a Coalition Environment Lecture #11 Dr. Bhavani Thuraisingham February 13, 2008 Data and Applications Security.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #3 Information Management and Data Mining August 29, 2005.
Evaluation and Testbed Development Bhavani Thuraisingham The University of Texas at Dallas Jim Massaro and Ravi Sandhu.
Introduction to Data, Information and Knowledge Management Dr. Bhavani Thuraisingham The University of Texas at Dallas Data, Information and Knowledge.
Data Management Information Management Knowledge Management Data and Applications Security Challenges Bhavani Thuraisingham October 2006.
Information Operation across Infospheres: Assured Information Sharing Prof. Bhavani Thuraisingham Prof. Latifur Khan Prof. Murat Kantarcioglu Prof. Kevin.
Data and Applications Security Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #1 Introduction to Data and Applications Security August.
Assured Information Sharing. Prof. Bhavani Thuraisingham and Prof. Latifur Khan The University of Texas at Dallas Prof. Ravi Sandhu George Mason University.
Secure Sensor Data/Information Management and Mining Bhavani Thuraisingham The University of Texas at Dallas October 2005.
Dr. Bhavani Thuraisingham August 2006 Building Trustworthy Semantic Webs Unit #1: Introduction to The Semantic Web.
University of Texas at Dallas Cyber Security Research at the University of Texas at Dallas Dr. Bhavani Thuraisingham The University of Texas at Dallas.
National Center for Supercomputing Applications Barbara S. Minsker, Ph.D. Associate Professor National Center for Supercomputing Applications and Department.
NGA Demo Participant Collaboration Dr. Brand Niemann Director and Senior Enterprise Architect – Data Scientist Semantic Community
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #22 Secure Web Information.
Sample of Data Security and Knowledge Discovery Research at the University of Texas at Dallas Dr. Bhavani Thuraisingham Dr. Latifur Khan Dr. Murat Kantarcioglu.
Cyber Security Research at the University of Texas at Dallas Sample Projects Prof. Bhavani Thuraisingham, PhD, CISSP Prof. Latifur Khan, PhD Prof. Murat.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course January.
Data and Applications Security Research at the University of Texas at Dallas Dr. Bhavani Thuraisingham The University of Texas at Dallas April 25, 2006.
Data and Applications Security (DAS) Research at UTD Dr. Bhavani Thuraisingham The University of Texas at Dallas 19 June 2006.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Inference Problem - I September.
Building Trustworthy Semantic Webs Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #2 Supporting Technologies August 27, 2008.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #1 Biometrics and Other Emerging Technologies in Applications.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #3 Access Control in Data.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #1 Introduction to Data and Applications Security and Digital Forensics.
Dr. Bhavani Thuraisingham January 14, 2011 Building Trustworthy Semantic Webs Lecture #1: Introduction to Trustworthy Semantic Web.
Geospatial Semantic Web Interim (2.5 months) Progress Review for Phase 1 Dr. Bhavani Thuraisingham (Computer Science) Dr. Latifur Khan (Computer Science)
Secure Geospatial and Sensor Semantic Webs for Crime Analysis and Border Security Prof. Bhavani Thuraisingham, PhD Prof. Latifur Khan, PhD Mr. Alam Ashraful.
The DEER Distributed European Electronic Resource Dr Suzanne Keene Francesca Monti University College London.
Erik Jonsson School of Engineering and Computer Science The University of Texas at Dallas Cyber Security Research on Engineering Solutions Dr. Bhavani.
Trustworthy Semantic Webs Building Geospatial Semantic Webs Dr. Bhavani Thuraisingham The University of Texas at Dallas October 2006 Presented at OGC Meeting,
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #3 Supporting Technologies:
Horizon 2020 Secure Societies European Info Day and Brokerage Event
Data and Applications Security
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security
Information and Security Analytics
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Access Control in Data Management Systems
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security
Data and Applications Security
Presentation transcript:

Data and Applications Security (DAS) Research at UTD Dr. Bhavani Thuraisingham 20 June 2006

1-2 9/23/ :39 Memorandum 0 This presentation reflects our team's intentions for Data and Applications (DAS) research at UTD and will continue to evolve and could change to meet conditions and uncertainties that could be prevalent in the future. 0 It is the intent of the DAS team to make UTD the premier research university in DAS for government and industry. 0 DAS research areas and funding projections are based on current trends and are not intended to be the final version. Values and numbers given are only estimates and they involve assumptions. 0 Statements made in this presentation are forward-looking statements. Such statements are not guarantees of future performance.

1-3 9/23/ :39 Outline 0 What is Data and Applications Security (DAS)? 0 How does DAS fit in within Cyber Security? 0 Strength of UTD in DAS 0 What are UTD’s major areas in DAS? -Will elaborate on some of the areas 0 Who are our major collaborators? 0 What is our current funding? 0 What investments do we need and potential sources of support? 0 Who are our “Other Sources”? 0 What Technical/Professional Accomplishments do we want to achieve in the next 3-5 years?

1-4 9/23/ :39 What is DAS? Integrates Information Security and Data Management Access Control Policies Privacy Trust Discretionary and Multilevel security Secure relational, distributed and OO systems, Query, transactions Secure warehouses, Mining systems, Privacy preserving data mining Secure digital Libraries, sensors Semantic webs Components of Securing data, information and knowledge systems and applications Vulnerability analysis: Applications of data mining in Worm, Intrusion detection Secure applications: Biometrics Digital forensics Electronic voting machines Details in my book #7

1-5 9/23/ :39 How does DAS fit in within Cyber Security Data and Applications Security (DAS) Network Security (Securing networks including secure protocols and communications) Operating systems (securing resources such as files, interposes communication) Components of Cyber Security Also called Information Security Secure Middleware: Secure object request brokers J2EE security Cross cutting themes: Security and economics Secure sensors Access control Vulnerabilities Details in my book #7

1-6 9/23/ :39 Strength of UTD in DAS 0 UTD is one of the top three leaders in DAS (others Purdue and GMU) 0 Bhavani Thuraisingham is considered a leading expert in DAS -Early contributor; worked in the field for 21 years -Comprehensive book in DAS -Invited to over 30 keynote addresses over the past 12 years -Advisor to govt sponsors while at MITRE -Strong in related technologies including data mining, information management and overall cyber security 0 UTD also has a strong primary and supporting team in this area -Key players: Latifur and Murat in data mining and DAS -Others: Kevin Hamlen, I-Ling, Prabhakaran, Kang, Weili =Theory, Web services, Motion data, Visualization, Geospatial

1-7 9/23/ :39 What are UTD’s Major Areas in DAS? 0 Assured Information Sharing (Very Strong) 0 Security for semantic web (Very Strong) 0 Secure Geospatial Information Management (Very Strong) 0 Data Mining for Cyber Security Applications (Strong - Latifur) 0 Data Mining for National Security Applications (Strong) 0 Privacy Preserving Data Mining (Strong - Murat) 0 Secure Data Grid (Strong – I-Ling) 0 Data Integrity and Provenance (Strong – Murat) 0 Secure sensor information management (Strong) 0 Foundations (Strong - Kevin) 0 Other areas: Biometrics, Dependability (Medium) -Biometrics, Very strong = Pioneer, Strong = Leader, Medium = One of many Next 3 charts will elaborate on the areas we are very strong; where are we? Where do we want to go?

1-8 9/23/ :39 Assured Information Sharing: Where are we? Where do we want to go? ( Bhavani, Latifur, Murat) Publish Data/Policy Component Data/Policy for Agency A Data/Policy for Coalition/ Extract patterns Publish Data/Policy Component Data/Policy for Agency C Component Data/Policy for Agency B Publish Data/Policy Where are we? We are examining 3 cases: Friendly partners; Semi- honest partners; Untrustworthy partners Techniques: data mining and policy enforcement, game theory, worm detection Where do we want to go? Build a testbed/lab for AIS so that organizations share text, relations, images, video, geospatial data, carry out analysis and enforce policies for all 3 cases

1-9 9/23/ :39 Our Research in Secure Geospatial Data Management: Where are we? Where do we want to go? (Latifur, Bhavani) Data Source A Data Source B Data Source C SECURITY/ QUALITY Semantic Metadata Extraction Decision Centric Fusion Geospatial data interoperability through web services Geospatial data mining Geospatial semantic web Tools for Analysts Where are we? Building the pieces in the blue box and developing geospatial semantic web technologies Where do we want to go/ Use the testbed developed for AIS to test out algorithms for geospatial data interoperab9lity and security

1-10 9/23/ :39 Secure Semantic Web: Where are we? Where do we want to go? ( Bhavani, Latifur ) 0 Where do we want to go 0 Need to develop an integrated secure system / Testbed XML, XML Schemas Rules/Query Logic, Proof and Trust TRUSTTRUST CONFIDENTILAITYCONFIDENTILAITY RDF, Ontologies URI, UNICODE PRIVACYPRIVACY 0 Machine Understandable Web Pages 0 What are we doing: CPT Policy enforcement (Confidentiality, Privacy, Trust)

1-11 9/23/ :39 Who are our major collaborators? AIS Geospatial Semantic web Data mining For cyber sec. Data mining for national sec. Privacy Provenance and Integrity Secure Grid Sensor info Other UCDUMBCUGALSUUTA UVA UIUCPurdueGMU X X x X X X X X X X X X X X X X We are also writing some papers with UCI, UCF, WVU, PSU, UNC-Charlotte Foreign collaborators: U. of Nottingham, Kings College, UK

1-12 9/23/ :39 Where is our funding coming from (since October 2004; jointly with Latifur, Murat) AIS Geospatial Semantic web Data mining For cyber sec. Data mining for national sec. Privacy Provenance and Integrity Secure Grid Sensor info Other RaytheonNSFCongressAFOSRAFRL 300K 120K DTO 100K300K 500K 200K Black: Current External, Red: Verbal confirmation with sponsor, Purple: Hoping to get funding 2006; Green: Cost share, Internal, Startup (Bhavani only) Some funding of others (e.g., Murat’s startup) are not included 100K Int./St.up 150K 90K 70K 60K 50K 30K 40K 120K 20K

1-13 9/23/ :39 What investments do we need and potential sources of support? AIS Geospatial Semantic web Data mining For cyber sec. Data mining for national sec. Privacy Provenance and Integrity Secure Grid Sensor info Other NSFMURI Total Infrastructure $4m $500K Other sources are agencies and consortium; e.g. with OGC proposals to NGA Privacy is mainly Murat’s area with some support from Bhavani Currently 2m is a line item in the budget for secure grid; 500K/yr to UTD Other sourcesUTD $3m $1m $700K $500K 400K $1m $500K$1m$500K $2 m $1m $1.5m $500K $350K $400K CongressTBD 250K150K 300K100K TBD

1-14 9/23/ :39 “Other Sources” : Agencies and Consortia 0 Agencies: -We are establishing very good connections with AF (AFOSR and AFRL); also well connected for a MURI for AF. Next step is to follow up on contacts with Army and Navy -Also establishing contacts with DHS, DTO, CIA, NSA; we are identifying areas of mutual interest 0 Consortia -One consortium we are forming is with NGA, Oracle, Raytheon; we are working on proposal to NGA on interoperability -A goal is to establish a UTD-consortium with industry and get them to join the consortium for a fee. This is one my main objectives for FY07 0 Congressional Funds -Once we get started on this, we would like to go after center scale projects

1-15 9/23/ :39 What other resources do we need? 0 Three more faculty in DAS, Digital Forensics, Data Mining either assistant or associate professor level from top schools – -Stanford, CMU, Berkeley for data mining -Include UIUC, Purdue and GATech for DAS and Digital Forensics 0 Laboratory space to build an open test bed / laboratory so that we become a showcase for the government in AIS and related areas -Demonstrate Assured Information Sharing with data (text, images, etc.) coming from different sources and demonstrate through semantic web technologies (sort of a war room) -Will use SAIAL resources as needed 0 Secretary for managing our papers, open source, patents, projects

1-16 9/23/ :39 What Technical/Professional Accomplishments do we want to achieve in the next 3-5 years? Publications in top journals and conferences IEEE/ACM Keynotes Senior member of IEEE, IEEE/ACM Fellows, International awards Conference chairs Develop open source Software, Patents Technology transfer to companies Government Test beds Components of We hope UTD Research in DAS will result in the following Consortia/ Standards: e.g., OGC, Oracle, Raytheon consortia; DETER community Books based on PhD thesis e.g., Contract signed For book #1 on data mining applications Awad, Khan and Thuraisingham UTD DAS Team will work together to establish A government Southwest Research Center in this area For the govt.