Skip Navigation
Search CERIAS
Site Navigation
About
Public Relations Materials & Info
Travel Information
Frequently Asked Questions
Organizational Primer (PDF)
History
People
Faculty & Professional Staff
Students
PhD Graduates
Visitors
Staff
CERIAS People Gallery
Awards
Partners
Strategic Partners
Donors
Purdue Campus Partners
Seminars
News
Research
Education
Tools & Resources
Reports & Papers Archive
ReAssure
Training Products
FTP Archive
BSD and Linux OS Mirrors
Cassandra Vulnerability Tracking System
NTP Time Server
Weblogs
Annual Symposium
Home
»
About CERIAS
» Frequently Asked Questions (FAQ)
Assured Identity and Privacy
About CERIAS
Alumni/Other
Assured Identity and Privacy
Blogging
Call For Papers
Category 1
CERIAS Media Citings
Cloud Security
Donors
Education
Education
End System Security
Feature
General
General
Grad Students Seeking Permanent Positions
hardware
Human Centric Security
Infosec Education
Kudos, Opinions and Rants
Network Security
News
News
Partners
Personal
Personal/Home Information Security
Policies & Law
Policy, Law and Management
Prevention, Detection and Response
R&D
Reviews
SCADA
Secure IT Practices
Software
Sponsors
Static Page
Student Employment/Internships
Students Seeking Internships
Undergrad Students Seeking Permanent Positions
Questions:
Protecting and Securing Supply Chain Data throughout its Lifecycle
The Cloud’s DNA
Biometric Information Lifecycle Framework
Assessment of Indiana Dept. of Corrections Image Capture Process
A Novel Approach to Robust, Secured, and Cancellable Biometrics
Secure, Composable, & Scalable Framework for Trusted Collaborative Computing
Trusted Medical Information System and Health Informatics
Secure Video Stream Framework for Dynamic and Anonymous Subscriber Groups
Human Factors in Online Security and Privacy
Role Mining in Enterprise Access Control Systems
Operating System Access Control
Data Anonymization
Standoff Inverse Analysis and Manipulation of Electronic Systems
Privacy in Text and Search
Adversarial Classification: Data Mining, Statistical Learning, and Data Visualization for Complex Da
Secure and Efficient Access to Outsourced Data
VeryIDX - A Digital Identity Management System
Detecting Anomalous Access Patterns in Relational Databases
Undetectable Covert Communication
Privacy-Constrained Searching
Creation of a Usability Engineering Lab to Analyze the Impact of IT-Induced Errors in Healthcare
Techniques for Secure and Reliable Computational Outsourcing
Systematic Control and Management of Data Integrity, Quality and Provenance for Command and Control
Secure Semantic Information Grid for NCES and Border Security Applications
Fusion and Analysis of Multi-source Relational Data
Preserving Privacy in Social Network Data
A Framework for Managing the Assured Information Sharing Lifecycle
An Integrated and Utility-Centric Framework for Federated Text Search
Intelligent Privacy Manager
The StreamShield Project
Systematic Control and Management of Data Integrity, Quality and Provenance for Command and Control
Access Control Policy Verification Through Security Analysis And Insider Threat Assessment
Text Extraction and Data Visualization for Pet Health Surveillance
Secure Supply-Chain Protocols
A Comprehensive Policy-Driven Framework for Online Privacy Protection: Integrating IT, Human, Legal
The Design and Use of Digital Identities
Privacy-Preserving Data Integration and Sharing
Automated Trust Negotiation in Open Systems
Content-Based, Context-Aware Role Based Access Control for Secure Distributed XML
Security Services For Healthcare Applications
Assessable Identity and Privacy Protection
Systematic Control and Management of Data Integrity, Quality and Provenance for Command and Control
The Use of HDTV for In Vehicle Cameras
A Multi-site Study of How Medical Surgical Medical Nurses Spend Their Time: a Baseline
Security of Large Scale Systems
Security Issues for Indiana GIS Data
Q:
Protecting and Securing Supply Chain Data throughout its Lifecycle
A:
Q:
The Cloud’s DNA
A:
Q:
Biometric Information Lifecycle Framework
A:
Q:
Assessment of Indiana Dept. of Corrections Image Capture Process
A:
Q:
A Novel Approach to Robust, Secured, and Cancellable Biometrics
A:
Q:
Secure, Composable, & Scalable Framework for Trusted Collaborative Computing
A:
Q:
Trusted Medical Information System and Health Informatics
A:
Q:
Secure Video Stream Framework for Dynamic and Anonymous Subscriber Groups
A:
Q:
Human Factors in Online Security and Privacy
A:
Q:
Role Mining in Enterprise Access Control Systems
A:
Q:
Operating System Access Control
A:
Q:
Data Anonymization
A:
Q:
Standoff Inverse Analysis and Manipulation of Electronic Systems
A:
Q:
Privacy in Text and Search
A:
Q:
Adversarial Classification: Data Mining, Statistical Learning, and Data Visualization for Complex Da
A:
Q:
Secure and Efficient Access to Outsourced Data
A:
Q:
VeryIDX - A Digital Identity Management System
A:
Q:
Detecting Anomalous Access Patterns in Relational Databases
A:
Q:
Undetectable Covert Communication
A:
Q:
Privacy-Constrained Searching
A:
Q:
Creation of a Usability Engineering Lab to Analyze the Impact of IT-Induced Errors in Healthcare
A:
Q:
Techniques for Secure and Reliable Computational Outsourcing
A:
Q:
Systematic Control and Management of Data Integrity, Quality and Provenance for Command and Control
A:
Q:
Secure Semantic Information Grid for NCES and Border Security Applications
A:
Q:
Fusion and Analysis of Multi-source Relational Data
A:
Q:
Preserving Privacy in Social Network Data
A:
Q:
A Framework for Managing the Assured Information Sharing Lifecycle
A:
Q:
An Integrated and Utility-Centric Framework for Federated Text Search
A:
Q:
Intelligent Privacy Manager
A:
Q:
The StreamShield Project
A:
Q:
Systematic Control and Management of Data Integrity, Quality and Provenance for Command and Control
A:
Q:
Access Control Policy Verification Through Security Analysis And Insider Threat Assessment
A:
Q:
Text Extraction and Data Visualization for Pet Health Surveillance
A:
Q:
Secure Supply-Chain Protocols
A:
Q:
A Comprehensive Policy-Driven Framework for Online Privacy Protection: Integrating IT, Human, Legal
A:
Q:
The Design and Use of Digital Identities
A:
Q:
Privacy-Preserving Data Integration and Sharing
A:
Q:
Automated Trust Negotiation in Open Systems
A:
Q:
Content-Based, Context-Aware Role Based Access Control for Secure Distributed XML
A:
Q:
Security Services For Healthcare Applications
A:
Q:
Assessable Identity and Privacy Protection
A:
Q:
Systematic Control and Management of Data Integrity, Quality and Provenance for Command and Control
A:
Q:
The Use of HDTV for In Vehicle Cameras
A:
Q:
A Multi-site Study of How Medical Surgical Medical Nurses Spend Their Time: a Baseline
A:
Q:
Security of Large Scale Systems
A:
Q:
Security Issues for Indiana GIS Data
A:
Current News
CERIAS Annual Information Security Symposium - April 3rd - 4th 2013
CERIAS Distinguished Lecture April 10th, 2013
More News »
CERIAS Weblogs
Some thoughts on “cybersecurity” professionalization and education
On Student Projects, Phoenix, and Improving Your IT Operations
More Posts »
Upcoming Events
2013-04-10 Norm Augustine
2013-04-17 Roxana Geambasu, Columbia
Events