Dr. Elisa Bertino Keynote Speaker at IRI conference
August 4, 2011
"Protecting Information Systems from Insider Threats - Concepts and Issues"
Past research on information security has focused on protecting valuable resources from attacks by outsiders. However, statistics show that a large amount of security and privacy breaches are due to insider attacks. Protection from insider threats is challenging because insiders may have access to many sensitive resources and high-privileged system accounts. Suitable approaches need to combine several security techniques, like fine-grained access control, stronger authentication protocols, integrated digital identity management, intrusion detection, with techniques from areas like information integration, machine learning, and risk assessment. In this talk, after an introduction to the problem of insider threats, we will present recent work addressing the problem of anomaly detection and response policies for database management systems and then discuss open research issues, by emphasizing the role of techniques from the area of information integration.
January 26, 2015
Research probing the complex science behind the formation of "dendrites" that cause lithium-ion batteries to fail could bring safer, longer-lasting batteries capable of being charged within minutes instead of hours.Read Full Story
January 20, 2015
Purdue University is part of a deep and diverse team selected by the U.S. Department of Energy to lead a $259 million initiative to develop the next generation of energy-efficient vehicles and wind energy and compressed-gas storage technologies.Read Full Story
January 20, 2015
Indiana farmers and ethanol producers are in limbo as they wait for the Environmental Protection Agency to decide how much of the biofuel should be blended into the nation’s gasoline.Read Full Story