Division of Computer and Network Systems (CNS)

group_project

Visible to the public CAREER: anon.next: Privacy-Enabled Routing in the Next-Generation Internet

Overlay anonymity systems like Tor are effective against many kinds of attacks on privacy, but they have significantly slower network performance than regular Internet traffic. The purpose of this project is to explore the design of anon.next, an anonymity system for the next-generation Internet. In anon.next, we embed anonymizing proxies into new Internet architectures, so that the network itself can provide efficient and effective privacy protection in a way that overlay designs cannot. This project seeks to make major advances in two areas key to the design of anon.next.

group_project

Visible to the public CAREER: Control of Information Security Risk Using Economic Incentives

Security risks associated with software that communicates over networks have become an increasingly costly problem for consumers, firms, and governments. A key characteristic of any interconnected system (e.g., network software such as Apache HTTP server, the smart grid, and airline baggage operations) is that choices made in the design, deployment, and usage of these systems can have significant implications for security risk.

group_project

Visible to the public TC:Medium:Collaborative Research:Foundations, Architectures, and Methodologies for Secure and Private Cyber-Physical Vehicles

Modern automobiles are no longer mere mechanical devices; they are pervasively monitored and controlled by dozens of digital computers coordinated via internal vehicular networks and bridged to external networks as well. While this transformation has driven major advancements in efficiency, safety and convenience, it has also introduced a broad range of new potential risks.

group_project

Visible to the public TC: Medium: Collaborative Research: Towards Formal, Risk-Aware Authorization

Traditional security authorization decisions are black and white: a user either satisfies a particular access policy or does not. This rigidity is a handicap in our complex and unpredictable world. As a result, even security-conscious organizations typically grossly overprovision principals with access rights and/or underconstrain access policies to ensure that principals can always carry out the organization's mission effectively and respond to unexpected opportunities and challenges.

group_project

Visible to the public CT: Collaborative Research: Experience-Based Access Management (EBAM) for Hospital Information Technology

Insufficient attention has been given to enterprise Identity and Access Management (IAM) as a process that needs to be carried out on a continuing basis in the presence of change and evolution. In particular, there is little formal support for how IAM can exploit experience the enterprise collects over time.

group_project

Visible to the public TC: Medium: Collaborative Research: Experience-Based Access Management (EBAM) for Hospital Information Technology

Insufficient attention has been given to enterprise Identity and Access Management (IAM) as a process that needs to be carried out on a continuing basis in the presence of change and evolution. In particular, there is little formal support for how IAM can exploit experience the enterprise collects over time.

group_project

Visible to the public TC: Medium: Dissemination and Analysis of Private Network Data

The goal of this research project is to enable statistical analysis and knowledge discovery on networks without violating the privacy of participating entities. Network data sets record the structure of computer, communication, social, or organizational networks, but they often contain highly sensitive information about individuals. The availability of network data is crucial for analyzing, modeling, and predicting the behavior of networks.

group_project

Visible to the public TC: Medium: Collaborative Research: Pay-as-you-Go Security and Privacy for Integrated Transportation Payment Systems

Pay-as-you-Go investigates security and privacy for Integrated Transportation Payment Systems (ITPS). The research addresses integrated payments for trains, subways, buses, ferries, and recharging of electric cars, as well as toll collection for roads, bridges, and tunnels. Multi-disciplinary aspects include novel cryptographic protocols and lightweight implementations of privacy-preserving payment systems. Challenges include providing security and privacy in a low-cost, usable, and reliable manner.

group_project

Visible to the public TC: Medium: Collaborative Research: Towards Formal, Risk-Aware Authorization

Traditional security authorization decisions are black and white: a user either satisfies a particular access policy or does not. This rigidity is a handicap in our complex and unpredictable world. As a result, even security-conscious organizations typically grossly overprovision principals with access rights and/or underconstrain access policies to ensure that principals can always carry out the organization's mission effectively and respond to unexpected opportunities and challenges.

group_project

Visible to the public TC: Medium: Collaborative Research: Pay-as-you-Go: Security and Privacy for Integrated Transportation Payment Systems

Pay-as-you-Go investigates security and privacy for Integrated Transportation Payment Systems (ITPS). The research addresses integrated payments for trains, subways, buses, ferries, and recharging of electric cars, as well as toll collection for roads, bridges, and tunnels. Multi-disciplinary aspects include novel cryptographic protocols and lightweight implementations of privacy-preserving payment systems. Challenges include providing security and privacy in a low-cost, usable, and reliable manner.