Frequently Asked Questions - Assured Identity and Privacy
Questions:
- Protecting and Securing Supply Chain Data throughout its Lifecycle
- The Cloud’s DNA
- Biometric Information Lifecycle Framework
- Assessment of Indiana Dept. of Corrections Image Capture Process
- A Novel Approach to Robust, Secured, and Cancellable Biometrics
- Secure, Composable, & Scalable Framework for Trusted Collaborative Computing
- Trusted Medical Information System and Health Informatics
- Secure Video Stream Framework for Dynamic and Anonymous Subscriber Groups
- Human Factors in Online Security and Privacy
- Role Mining in Enterprise Access Control Systems
- Operating System Access Control
- Data Anonymization
- Standoff Inverse Analysis and Manipulation of Electronic Systems
- Privacy in Text and Search
- Adversarial Classification: Data Mining, Statistical Learning, and Data Visualization for Complex Da
- Secure and Efficient Access to Outsourced Data
- VeryIDX - A Digital Identity Management System
- Detecting Anomalous Access Patterns in Relational Databases
- Undetectable Covert Communication
- Privacy-Constrained Searching
- Creation of a Usability Engineering Lab to Analyze the Impact of IT-Induced Errors in Healthcare
- Techniques for Secure and Reliable Computational Outsourcing
- Systematic Control and Management of Data Integrity, Quality and Provenance for Command and Control
- Secure Semantic Information Grid for NCES and Border Security Applications
- Fusion and Analysis of Multi-source Relational Data
- Preserving Privacy in Social Network Data
- A Framework for Managing the Assured Information Sharing Lifecycle
- An Integrated and Utility-Centric Framework for Federated Text Search
- Intelligent Privacy Manager
- The StreamShield Project
- Systematic Control and Management of Data Integrity, Quality and Provenance for Command and Control
- Access Control Policy Verification Through Security Analysis And Insider Threat Assessment
- Text Extraction and Data Visualization for Pet Health Surveillance
- Secure Supply-Chain Protocols
- A Comprehensive Policy-Driven Framework for Online Privacy Protection: Integrating IT, Human, Legal
- The Design and Use of Digital Identities
- Privacy-Preserving Data Integration and Sharing
- Automated Trust Negotiation in Open Systems
- Content-Based, Context-Aware Role Based Access Control for Secure Distributed XML
- Security Services For Healthcare Applications
- Assessable Identity and Privacy Protection
- Systematic Control and Management of Data Integrity, Quality and Provenance for Command and Control
- The Use of HDTV for In Vehicle Cameras
- A Multi-site Study of How Medical Surgical Medical Nurses Spend Their Time: a Baseline
- Security of Large Scale Systems
- Security Issues for Indiana GIS Data
Q:
Protecting and Securing Supply Chain Data throughout its Lifecycle
A:
Q:
The Cloud’s DNA
A:
Q:
Biometric Information Lifecycle Framework
A:
Q:
Assessment of Indiana Dept. of Corrections Image Capture Process
A:
Q:
A Novel Approach to Robust, Secured, and Cancellable Biometrics
A:
Q:
Secure, Composable, & Scalable Framework for Trusted Collaborative Computing
A:
Q:
Trusted Medical Information System and Health Informatics
A:
Q:
Secure Video Stream Framework for Dynamic and Anonymous Subscriber Groups
A:
Q:
Human Factors in Online Security and Privacy
A:
Q:
Role Mining in Enterprise Access Control Systems
A:
Q:
Operating System Access Control
A:
Q:
Data Anonymization
A:
Q:
Standoff Inverse Analysis and Manipulation of Electronic Systems
A:
Q:
Privacy in Text and Search
A:
Q:
Adversarial Classification: Data Mining, Statistical Learning, and Data Visualization for Complex Da
A:
Q:
Secure and Efficient Access to Outsourced Data
A:
Q:
VeryIDX - A Digital Identity Management System
A:
Q:
Detecting Anomalous Access Patterns in Relational Databases
A:
Q:
Undetectable Covert Communication
A:
Q:
Privacy-Constrained Searching
A:
Q:
Creation of a Usability Engineering Lab to Analyze the Impact of IT-Induced Errors in Healthcare
A:
Q:
Techniques for Secure and Reliable Computational Outsourcing
A:
Q:
Systematic Control and Management of Data Integrity, Quality and Provenance for Command and Control
A:
Q:
Secure Semantic Information Grid for NCES and Border Security Applications
A:
Q:
Fusion and Analysis of Multi-source Relational Data
A:
Q:
Preserving Privacy in Social Network Data
A:
Q:
A Framework for Managing the Assured Information Sharing Lifecycle
A:
Q:
An Integrated and Utility-Centric Framework for Federated Text Search
A:
Q:
Intelligent Privacy Manager
A:
Q:
The StreamShield Project
A:
Q:
Systematic Control and Management of Data Integrity, Quality and Provenance for Command and Control
A:
Q:
Access Control Policy Verification Through Security Analysis And Insider Threat Assessment
A:
Q:
Text Extraction and Data Visualization for Pet Health Surveillance
A:
Q:
Secure Supply-Chain Protocols
A:
Q:
A Comprehensive Policy-Driven Framework for Online Privacy Protection: Integrating IT, Human, Legal
A:
Q:
The Design and Use of Digital Identities
A:
Q:
Privacy-Preserving Data Integration and Sharing
A:
Q:
Automated Trust Negotiation in Open Systems
A:
Q:
Content-Based, Context-Aware Role Based Access Control for Secure Distributed XML
A:
Q:
Security Services For Healthcare Applications
A:
Q:
Assessable Identity and Privacy Protection
A:
Q:
Systematic Control and Management of Data Integrity, Quality and Provenance for Command and Control
A:
Q:
The Use of HDTV for In Vehicle Cameras
A:
Q:
A Multi-site Study of How Medical Surgical Medical Nurses Spend Their Time: a Baseline
A:
Q:
Security of Large Scale Systems
A:
Q:
Security Issues for Indiana GIS Data
A: