Purdue: CyberTrust Largest Contributor - Department of Computer Science - Purdue University Skip to main content

Purdue: CyberTrust Largest Contributor

10-12-2005

The 2005 NSF CyberTrust Principal Investigators Meeting was held September 25-27 in Newport Beach, California at the Fairmont Newport Beach near UC Irvine. The meeting was hosted by the National Science Foundation and University of California, Irvine's California Institute for Telecommunications and Information Technology (Calit2). CyberTrust 2005 was a forum for NSF-supported network researchers and developers to present and discuss their research with their colleagues, and interact with NSF staff, program officers and directors.

Purdue CS presented more posters at the conference than any other institution. We were well represented by Mike Atallah, Elisa Bertino, Bharat Bhargava, Melissa Dark, Edward Delp, Sonia Fahmy, Arif Ghafoor, Ninghui Li, Cristina Nita-Rotaru, Sunil Prakbahar, and Ness Schroff. For a complete listing of posters presented, see below.

The goals of the 2005 NSF Cyber Trust Principal Investigators Meeting are:

  1. To encourage interaction among PIs to foster new collaborations;
  2. To introduce government representatives to ongoing research that might shape future research funding or be adapted for use in national systems;
  3. To introduce industry representatives to work in progress that might be adapted to protect their businesses or to improve their product lines;
  4. To encourage education and workforce development for supporting future cyber security systems.

Purdue Posters

Purpose Based Access Control for Privacy Protection  
Jin-Won Byun, Elise Bertino , Ninghui Li

Content-Based, Context-Aware Role Based Access Control for Secure Distributed XML Applications
Rafae Bhatti, Elisa Bertino, Arif Ghafoor

Automated Trust Negotiation
Ninghui Li, John Mitchell, Kent Seamons, Clifford Neuman, William Winsborough, Marianne Winslett

Examining the usability of Web Privacy Policies
Robert Proctor, M. Athar Ali, Kim-Phuong Vu

The Jeddak Project
Dominic Duggan, Jan Vitek

Experiment Automation and Topology Generation for the DETER Testbed
Sonia Fahmy, Ness B. Shroff, Eugene Spafford

Emulation vs. Simulation: A Case Study with DoS Attacks
Sonia Fahmy, Ness B. Shroff, Eugene Spafford

Secure Supply Chain Protocols
Mikhail Atallah, Cinayak Deshpande, Leroy Schwarz

A Scheme for Privacy-preserving Data Dissemination
Bharat Bhargava

Survivable Messaging Systems
PI: Yair Amir, Cristina Nita-Rotaru
Students: Claudiu Danilov, Michael Kaplan, Raluca Musaloiu, Nilo Rivera, Kevin Bauer, Aaron Walters

Survivable Information Access
PI: Yair Amir and Cristina Nita-Rotaru
Students: Claudiu Danilov, Jonathan Kirsch, John Lane, Chi-Bun Chan, Josh Olsen, David Zage

Distributed Data Mining to Protect Information Privacy
Wenliang Du , Christopher Clifton, Mikhail Atallah

ITR: Printer Characterization and Signature Embedding for Security and Forensic Application
Jan Allebach, Edward Delp, George Chiu

Last Updated: Feb 6, 2024 4:08 PM

Department of Computer Science, 305 N. University Street, West Lafayette, IN 47907

Phone: (765) 494-6010 • Fax: (765) 494-0739

Copyright © 2024 Purdue University | An equal access/equal opportunity university | Copyright Complaints

Trouble with this page? Disability-related accessibility issue? Please contact the College of Science.