CERIAS - Center for Education and Research in Information Assurance and Security

Skip Navigation
CERIAS Logo
Purdue University - Discovery Park
Center for Education and Research in Information Assurance and Security

Frequently Asked Questions - Assured Identity and Privacy

Questions:

Q: Protecting and Securing Supply Chain Data throughout its Lifecycle
A:

Q: The Cloud’s DNA
A:

Q: Biometric Information Lifecycle Framework
A:

Q: Assessment of Indiana Dept. of Corrections Image Capture Process
A:

Q: A Novel Approach to Robust, Secured, and Cancellable Biometrics
A:

Q: Secure, Composable, & Scalable Framework for Trusted Collaborative Computing
A:

Q: Trusted Medical Information System and Health Informatics
A:

Q: Secure Video Stream Framework for Dynamic and Anonymous Subscriber Groups
A:

Q: Human Factors in Online Security and Privacy
A:

Q: Role Mining in Enterprise Access Control Systems
A:

Q: Operating System Access Control
A:

Q: Data Anonymization
A:

Q: Standoff Inverse Analysis and Manipulation of Electronic Systems
A:

Q: Privacy in Text and Search
A:

Q: Adversarial Classification: Data Mining, Statistical Learning, and Data Visualization for Complex Da
A:

Q: Secure and Efficient Access to Outsourced Data
A:

Q: VeryIDX - A Digital Identity Management System
A:

Q: Detecting Anomalous Access Patterns in Relational Databases
A:

Q: Undetectable Covert Communication
A:

Q: Privacy-Constrained Searching
A:

Q: Creation of a Usability Engineering Lab to Analyze the Impact of IT-Induced Errors in Healthcare
A:

Q: Techniques for Secure and Reliable Computational Outsourcing
A:

Q: Systematic Control and Management of Data Integrity, Quality and Provenance for Command and Control
A:

Q: Secure Semantic Information Grid for NCES and Border Security Applications
A:

Q: Fusion and Analysis of Multi-source Relational Data
A:

Q: Preserving Privacy in Social Network Data
A:

Q: A Framework for Managing the Assured Information Sharing Lifecycle
A:

Q: An Integrated and Utility-Centric Framework for Federated Text Search
A:

Q: Intelligent Privacy Manager
A:

Q: The StreamShield Project
A:

Q: Systematic Control and Management of Data Integrity, Quality and Provenance for Command and Control
A:

Q: Access Control Policy Verification Through Security Analysis And Insider Threat Assessment
A:

Q: Text Extraction and Data Visualization for Pet Health Surveillance
A:

Q: Secure Supply-Chain Protocols
A:

Q: A Comprehensive Policy-Driven Framework for Online Privacy Protection: Integrating IT, Human, Legal
A:

Q: The Design and Use of Digital Identities
A:

Q: Privacy-Preserving Data Integration and Sharing
A:

Q: Automated Trust Negotiation in Open Systems
A:

Q: Content-Based, Context-Aware Role Based Access Control for Secure Distributed XML
A:

Q: Security Services For Healthcare Applications
A:

Q: Assessable Identity and Privacy Protection
A:

Q: Systematic Control and Management of Data Integrity, Quality and Provenance for Command and Control
A:

Q: The Use of HDTV for In Vehicle Cameras
A:

Q: A Multi-site Study of How Medical Surgical Medical Nurses Spend Their Time: a Baseline
A:

Q: Security of Large Scale Systems
A:

Q: Security Issues for Indiana GIS Data
A:

Get Your Degree with CERIAS