LERSAIS is host to a Seminar Series that brings researchers and practitioners to Pittsburgh to share emerging developments and research in the area of Information Assurance. The field of Cyber Security faces new challenges and demands on a daily basis and these seminars serve to keep students, faculty, and business leaders abreast of issues in both the laboratory and industry.

Professionals and investigators who would like more information on this series, or have an idea for a topic, are invited to contact Prof. James Joshi.

The seminars are open to all. Check out our upcoming presentations.

Fall 2019

Upcoming LERSAIS Cybersecurity Seminar

(organized by SCI, LERSAIS and Pitt Cyber)

 
Date
Speaker
Title
Dr. Shamik Sural
Optimal User Assignment in Constrained Role Based Access Control Systems
Dr. Indrajit Ray
That’s My DNA: Digital Signatures to Ensure Authenticity and Integrity of Synthetic DNA Molecules
Shamik Sural

Dr. Shamik Sural

The Joint LERSAIS and PittCyber Distinguished Cybersecurity Seminar

November 18

Optimal User Assignment in Constrained Role Based Access Control Systems



Dr. Shamik Sural

Professor, Indian Institute of Technology (IIT) Kharagpur and fulbright scholar at Rutgers University

Time/Location

11:00 AM - 12:00 PM
November 18
Information Sciences Building, 3rd floor theatre
135 North Bellefield Ave

Abstract:

One of the critical requirements towards success of any business organization is efficient management of its human capital. In a typically resource constrained organizational environment, maximizing the utilization of its available workforce is imperative. However, tasks cannot simply be assigned to arbitrary employees since they need to have the necessary capabilities for executing the same. Furthermore, security constraints forbid any ad hoc assignments and also enforce major dependencies on other employees who have access to the same tasks. Owing to the increasing size and scale of organizations, both in terms of the number of employees as well as resources to be managed, it is imperative that efficient computational solutions be developed to automate the process of employee to task assignment.

Since role-based access control (RBAC) is still the most commonly used access control model for commercial information systems, we consider organizational policies and constraints to be modeled with RBAC. In the first part of the talk, we will look into the problem of determining a minimal set of users and their role assignments in an RBAC system with a set of Separation of Duty and Cardinality constraints. We model it as a hypergraph coloring problem and provide efficient heuristics for its solution. We next consider a related though different situation in which the goal is to achieve optimal user deployment for a given set of users, roles and constraints. Here optimality is in the sense of maximizing the number of assignments of users to roles. Our experimental results show the efficiency of the proposed approaches while generating close to optimal solutions.

Biography:

Shamik Sural is a full professor in the Department of Computer Science and Engineering, Indian Institute of Technology (IIT) Kharagpur and is currently heading its Computer and Informatics Center. He received the Ph.D. degree from Jadavpur University, Kolkata, India in the year 2000. Before joining IIT in 2002, Shamik spent more than a decade in the Information Technology industry working in India as well as in Michigan, USA.

Shamik is a recipient of the Alexander von Humboldt Fellowship for Experienced Researchers, which enabled him to carry out collaborative research at TU Munich, Germany in 2009-10. He is spending the Fall 2019 semester at Rutgers University as a Fulbright scholar engaged in both teaching and research. Shamik is a senior member of IEEE and has previously served as the Chairman of the IEEE Kharagpur section. He is currently serving on the editorial boards of IEEE Transactions on Dependable & Secure Computing and IEEE Transactions on Services Computing. He has published more than two hundred research papers in reputed international journals and conferences. His research interests include computer security, data mining and multimedia systems.

Back to top ↑


Indrajit Ray

Dr. Indrajit Ray

The Joint LERSAIS and PittCyber Distinguished Cybersecurity Seminar

December 6

That’s My DNA: Digital Signatures to Ensure Authenticity and Integrity of Synthetic DNA Molecules



Dr. Indrajit Ray

Professor, Computer Science, Colorado State University and Program Director, NSF

Time/Location

3:00 PM - 4:00 PM
December 6
Information Sciences Building, 3rd floor theatre
135 North Bellefield Ave

Abstract:

DNA synthesis has become increasingly common, and many synthetic DNA molecules are licensed as intellectual property (IP). DNA samples are shared between academic labs, ordered from DNA synthesis companies and manipulated for a variety of different purposes, mostly to study their properties and improve upon them. However, it is not uncommon for a sample to change hands many times with very little accompanying information and no proof of origin. This poses significant challenges to the original inventor of a DNA molecule, trying to protect her IP rights. More importantly, following the anthrax attacks of 2001, there is an increased urgency to employ microbial forensic technologies to trace and track agent inventories. However, attribution of physical samples is next to impossible with existing technologies. We try to bring in advances in the digital domain to solve this problem. In this talk, we discuss our efforts to physically embed digital signatures in DNA molecules synthesized in the laboratory. We encounter several challenges that we do not face in the digital world that makes this problem interesting. These challenges arise primarily from the fact that changes to a physical DNA molecule can affect its properties, random mutations can accumulate in DNA samples over time, DNA sequencers can sequence (read) DNA erroneously and DNA sequencing is still relatively expensive which means that laboratories would prefer not to read and re-read their DNA samples to get error-free sequences. Moreover, unlike in the digital world where an erroneously received message can be re-sent with little additional cost, it is expensive to re-send an erroneously received sample since the physical sample needs to be created once more. It makes more sense to determine if the erroneously received sequence can still be used.

Biography:

Dr. Indrajit Ray is a Professor of Computer Science at Colorado State University. He joined CSU in 2001 moving from the University of Michigan-Dearborn where he worked as an Assistant Professor from August 1997 – July 2001. Dr. Ray obtained his Ph.D. in Information Technology from George Mason University in August 1997. Indrajit’s primary research is in computer security and privacy. His major contributions have been in security risk modeling and security protocol design using applied cryptographic techniques. Other areas in which he has made valuable contributions are trust models for security and micro-data disclosure control. He has published more than 150 technical papers. His research has been well funded through various federal agencies. He has advised several Ph.D. students many of whom hold tenured positions in academia. He has also played leadership roles in the academic community by serving as program chairs in various conferences. In 2015 he served as General Chair of the 2015 ACM CCS conference which is the flagship conference of ACM SIGSAC, and in 2017 as the General Chair of the 2017 IEEE CNS conference. He was the founder of the IFIP TC 11, WG 11.9 on Digital Forensics and its first Chair. Recently, Indrajit has helped establish the CSU site of the NSF funded I/UCRC Center for Configuration Analytics and Automation, where he is Co-Director. This multi-university research center that includes fee-paying members from the industry and FFRDCs works with enterprises and government entities to improve service assurability, security and resiliency of enterprise IT systems, cloud/SDN data centers, and cyber-physical systems by applying innovative analytics and automation. Currently, he is serving as a Program Director at the National Science Foundation, where is responsible for the Secure and Trustworthy Cyberspace program.

Back to top ↑


Archived LERSAIS Cybersecurity Seminar

Seminar Archives


Index of Speakers

  • Adam, Nabil R. (CIMIC, Rutgers)
  • Ahmed, Tanvir (Principal Member of Technical Staff, Database Security Group, Oracle)
  • Anton, Ana (Annie) I. (Associate Professor, North Carolina State University)
  • Anwar, Mohd (Visiting Scholar, University of Pittsburgh)
  • Baurer, Lujo (Research Scientist, Carnegie Mellon University)
  • Brustolony, José Carlos (Assistant Professor, University of Pittsburgh)
  • Cao, Feng (CISCO Systems)
  • Claycomb, Bill (Senior Member of Technical Staff, SEI; Research Scientist, CERT)
  • Clemm, Alexander (Principal Engineer, Cisco)
  • Cohen, Fred (CEO, Fred Cohen & Associates; Research Professor, University of New Haven; Adjunct Professor, University of San Francisco)
  • Cranor, Lorrie (Associate Research Professor, Carnegie Mellon University)
  • Cukier, Michel (Assistant Professor, University of Maryland)
  • Cybenko, George (Professor, Dartmouth College)
  • Du, Wenliang [Kevin] (Assistant Professor, Syracuse University)
  • Eltoweissy, Mohamed (2010, 2006) (Chief Scientist of Secure Cyber Systems, Pacific Northwest National Laboratory)
  • Farkas, Csilla (University of South Carolina)
  • Ferraiolo, David (Computer Scientist, National Institute of Standards and Technology)
  • Ghinita, Gabriel (Assistant Professor, University of Massachusetts)
  • Heim, Patrick (Vice President Enterprise Security, McKesson Corporation)
  • Hoffman, Lance J. (Professor, George Washington University)
  • Hong, Jason (Asst. Professor, Carnegie Mellon University)
  • Kantarcioglu, Murat (Assistant Professor, University of Texas, Dallas)
  • Kim, Gene (Co-founder, Chief Technology Officer, Tripwire Inc.)
  • Keener, Dave (Chief Security Officer, Vigilant Minds Inc.)
  • Koski, Susan M. (Vice President, Corporate Information Security Manager of Network and Perimeter Defense, Mellon Financial Corporation)
  • Landau, Susan (Distinguished Engineer, Sun Microsystems)
  • Lee, Adam (Assistant Professor, University of Pittsburgh)
  • Lee, Wenke (Associate Professor, Georgia Institute of Technology)
  • Lindstrom, Pete (Research Director, Spire Security, LLC)
  • Liu, Ling (Associate Professor, Georgia Institute of Technology)
  • Liu, Peng (Assistant Professor, Penn State University)
  • Ludwig, Heiko (Research Staff Member and Manager, IBM Research)
  • Mironov, Ilya (Research Scientist at Google)
  • McDaniel, Patrick (Professor of Computer Science and Engineering, Pennsylvania State University)
  • Machanavajjhala, Ashwin (Assistant Professor, Duke University)
  • Maino, Fabio (Distinguished Engineer, Cisco)
  • Maxion, Roy (Research Professor in Computer Science and Machine Learning)
  • Myers, Andrew (Associate Professor, Cornell University)
  • Nepal, Surya (Principal Research Scientist, CSIRO ICT Centre, Australia)
  • Ning, Peng (Assistant professor, NC State University)
  • Pu, Calton (Professor, John P. Imlay, Jr. Chair in Software, Georgia Institute of Technology)
  • Roque, Antonio (Professor and Vice Chancellor for Research, University of California, Davis)
  • Ray, Indrakshi (Assistant Professor, Colorado State University)
  • Sailer, Reiner (IBM Thomas J. Watson Research Center)
  • Scherer, Steve (Principal Staff Software Engineer, Motorola, Inc.)
  • Shrestha, Rasu (Chief Innovation Officer, UPMC Executive Vice President, UPMC Enterprises)
  • Smith, Sean V. (Assistant Professor, Dartmouth College)
  • Squicciarini, Anna (Assistant Professor, Penn State University)
  • Scurlock, Antonio "T" (Chief, Cybersecurity Plans & Coordination (CPC) Office of the Assistant Secretary (OAS), Cybersecurity & Communications (CS&C), Department of Homeland Security (DHS))
  • Srinivasan, Kannan (Research Officer, National Research Council of Canada)
  • Srivastava, Mudhakar (Research Scientist, IBM Thomas J. Watson Research Center)
  • Shmatikov, Vitaly (Professor, Cornel Tech)
  • Vaidya, Jaideep (Assistant Professor, Rutgers University)
  • Wing, Jeannette M. (President's Professor and Head of Computer Science Department, Carnegie Mellon University)
  • Wu, Felix (Professor, UC Davis)
  • Yan, Guanhua (Technical Staff Member, Los Alamos National Laboratory)
  • Yavuz, Atilla (Research Scientist, Bosch Research and Technology Center)
  • Zhang, Tao (Chief Scientist, Cisco Systems)
  • Zhang, Youtao (Assistant Professor, University of Pittsburgh)
  • Zhao, Ben Y. (Associate Professor, UC Santa Barbara)
  • Zic, John (2010, 2008)(Visiting Associate Professor, University of New South Wales)

Index of Represented Schools and Businesses

Index of Talks