Institute for Cyber Security

advertisement
Institute for Cyber Security (ICS)
Prof. Ravi Sandhu
Executive Director and
Lutcher Brown Endowed Chair
ravi.sandhu@utsa.edu
210 458 6081
Ravi Sandhu










BTech, MTech: Electrical Engineering, IIT Bombay, Delhi
MS, PhD: Computer Science, Rutgers
Asst Prof: Computer Science, Ohio State U (6 yrs)
Assoc/Full Prof: Information Security, George Mason U (18 yrs)
Full Prof: Computer Science, UTSA (started June 2007)
ACM Fellow, IEEE Fellow
Founding EIC ACM TISSEC: world’s leading security journal
Past-Chairman ACM SIGSAC: world’s leading security society
Founder ACM CCS: world’s leading security conference
Co-Founder & Chief Scientist, TriCipher: Silicon Valley startup
I am here because of past accomplishments but what matters and
what excites me is the future opportunity at the bleeding edge
ICS Background




2000: UTSA and San Antonio Community identify strategic goal
of excellence in Cyber Security
2001: Center for Infrastructure Assurance and Security (CIAS)
established, garners success in service to DoD and DHS
2006: UTSA wins $3.5M State of Texas Emerging Technology
Fund grant to create a new Institute for Cyber Security
2007: Prof. Ravi Sandhu recruited to found and lead ICS with
additional $1M Endowed Chair and $1M UT STARS funding
CIAS becomes a component of ICS
ICS is an unique opportunity but true excellence
requires hard work, patience and sustained support
ICS Scope

Research
–
–

Education
–

–
The big challenge for UTSA and all research universities
Opportunity to be a national leader and role model
Service
–
–

Degree and non-degree programs
Commercialization
–

Tenure-track faculty and their graduate students
Research faculty and staff
Public sector: build on CIAS success and beyond
Private sector: another big challenge
Partnerships
–
Academia, Industry, Government, International
A comprehensive “big-tent” Institute but the core will
always remain research driven by tenure-track faculty
ICS Mission
To pursue world-class high-impact cybersecurity research, education,
commercialization and service in synergy
with relevant components of UTSA, and
with world-class partners.
Very ambitious but in our grasp
Change Drivers
Stand-alone mainframes
and mini-computers
Internet
Vandals
Criminals
Enterprise security
Mutually suspicious
security
Few and standard
services
Many and new
innovative services
Entering an era of applicationdriven security
Research Opportunities

What does it mean to be secure?
–
–
–

What are the appropriate tradeoffs in an application
business context?
Who decides?
Who pays?
How do we make it secure?
–
–
What do we need to invent to get there?
How do we use existing inventions to get there?
Collaboration with application experts,
especially where the applications
themselves are cutting edge
ICS Plans

Big investments
–
–

Tenure track faculty: seed money for new lines
Laboratory: renovate, refurbish, equipment, staff
Smaller investments
–
–
Seed money: work that will lead to funding down
the line
Bridge money: continue work between grants
Come talk to me
and conversely
Personal Research Agenda

Develop a framework for dealing with security
–


RBAC, UCON, PEI
Demonstrate utility of this framework in diverse
contexts, evolve the framework as needed
Engage with industry to understand their priorities
and place doctoral students in internships and jobs
Lots of scope for
collaboration
RBAC96
UCON 2004
Continuity of
Decisions
Rights
(R)
pre-decision
ongoing-decision
before-usage
ongoing-Usage
pre-update
ongoing-update
Mutability of
Attributes
Subjects
(S)
Objects
(O)
Usage
Decisions
Subject Attributes (SA)
Object Attributes (OA)
Authoriz
ations
(A)
Obliga
tions
(B)
Condi
tions
(C)
after-usage
post-update
PEI Models: Policy, Enforcement,
Implementation
Security and system goals
(requirements/objectives)
Policy models
Horizontal
view
Enforcement models
Looks at
Individual
layer
Implementation models
Vertical
View
Looks
Across
Layers
Target platform, e.g., Trusted
Computing technology
Download