Purdue: CyberTrust Largest Contributor
10-12-2005
The 2005 NSF CyberTrust Principal Investigators Meeting was held September 25-27 in Newport Beach, California at the Fairmont Newport Beach near UC Irvine. The meeting was hosted by the National Science Foundation and University of California, Irvine's California Institute for Telecommunications and Information Technology (Calit2). CyberTrust 2005 was a forum for NSF-supported network researchers and developers to present and discuss their research with their colleagues, and interact with NSF staff, program officers and directors.
Purdue CS presented more posters at the conference than any other institution. We were well represented by Mike Atallah, Elisa Bertino, Bharat Bhargava, Melissa Dark, Edward Delp, Sonia Fahmy, Arif Ghafoor, Ninghui Li, Cristina Nita-Rotaru, Sunil Prakbahar, and Ness Schroff. For a complete listing of posters presented, see below.
The goals of the 2005 NSF Cyber Trust Principal Investigators Meeting are:
- To encourage interaction among PIs to foster new collaborations;
- To introduce government representatives to ongoing research that might shape future research funding or be adapted for use in national systems;
- To introduce industry representatives to work in progress that might be adapted to protect their businesses or to improve their product lines;
- To encourage education and workforce development for supporting future cyber security systems.
Purdue Posters
Purpose Based Access Control for Privacy Protection
Jin-Won Byun, Elise Bertino , Ninghui Li
Content-Based, Context-Aware Role Based Access Control for Secure Distributed XML Applications
Rafae Bhatti, Elisa Bertino, Arif Ghafoor
Automated Trust Negotiation
Ninghui Li, John Mitchell, Kent Seamons, Clifford Neuman, William Winsborough, Marianne Winslett
Examining the usability of Web Privacy Policies
Robert Proctor, M. Athar Ali, Kim-Phuong Vu
The Jeddak Project
Dominic Duggan, Jan Vitek
Experiment Automation and Topology Generation for the DETER Testbed
Sonia Fahmy, Ness B. Shroff, Eugene Spafford
Emulation vs. Simulation: A Case Study with DoS Attacks
Sonia Fahmy, Ness B. Shroff, Eugene Spafford
Secure Supply Chain Protocols
Mikhail Atallah, Cinayak Deshpande, Leroy Schwarz
A Scheme for Privacy-preserving Data Dissemination
Bharat Bhargava
Survivable Messaging Systems
PI: Yair Amir, Cristina Nita-Rotaru
Students: Claudiu Danilov, Michael Kaplan, Raluca Musaloiu, Nilo Rivera, Kevin Bauer, Aaron Walters
Survivable Information Access
PI: Yair Amir and Cristina Nita-Rotaru
Students: Claudiu Danilov, Jonathan Kirsch, John Lane, Chi-Bun Chan, Josh Olsen, David Zage
Distributed Data Mining to Protect Information Privacy
Wenliang Du , Christopher Clifton, Mikhail Atallah
ITR: Printer Characterization and Signature Embedding for Security and Forensic Application
Jan Allebach, Edward Delp, George Chiu