Carnegie Mellon unit looks to advance IT security, reliability
CyLab exec says more-resilient systems are a goal
Computerworld - Three years ago, Carnegie Mellon University and a group of 18 IT vendors and users, including FedEx Corp., Microsoft Corp., NASA, Oracle Corp. and Pfizer Inc., formed the Sustainable Computing Consortium in an effort to improve software quality and reliability . In 2003, the consortium became part of Carnegie Mellon's CyLab initiative, which was formally launched late that year.
CyLab now involves more than 200 faculty members, students and researchers at the Pittsburgh-based university. In addition to sustainable computing, CyLab is working on IT issues such as device security, data privacy and the development of self-healing systems and networks. Pradeep Khosla, co-director of CyLab and dean of the Carnegie Institute of Technology, discussed the organization's research efforts in an interview with Computerworld this month.
What happened to the Sustainable Computing Consortium? We were the bigger umbrella that absorbed it. The type of work that we were doing subsumed all the work that the Sustainable Computing Consortium was doing. We have an initiative in software assurance.
But do you have more of an IT security focus than the SCC did? Actually, that's what people think, but the real focus is next-generation IT. It means systems that are measurable, available, secure, sustainable and trustworthy.
What are your goals for project deliverables? All of our research is divided into "thrusts." There is a thrust on resilient and self-healing systems. Is that about security? No. But it is highly related to security, because if you build a system that is resilient or self-healing, some of these security issues and ramifications go away. We have a thrust on user authentication and access control; we have thrusts on [topics such as] data and information privacy, threat prediction modeling and business economics.
Pradeep Khosla, co-director at Carnegie Mellon Cylab
How far are you from proving a concept? We have a demonstration system working for secure storage. We are now expanding that to what we call self-security, self-healing, self-analyzing. For example, if you look at the current router and switch technology, there is no way to trace a packet back to the source. If you start an attack, and even if I trace it back to your computer -- first of all, there is no way, but let's assume there is a way -- you can say, "It was not me working on it, it was somebody
- Simplifying Product Design In A Complex World Product design engineering has moved far beyond the confines of ever-more powerful workstations. Companies can't afford to restrict projects to using only local...
- CIOs Deliver Productivity Breakthroughs with Intelligent Digital Signage Retailers have long recognized the influence that digital signage provides over a shopper's point-of-purchase decision making process.
- 2014 Gartner Magic Quadrant Report For the 7th year in a row, Riverbed is in the "Leaders" Quadrant of the 2014 Magic Quadrant for WAN Optimization Controllers. In...
- Improving Business Value of WAN Optimization Want to achieve faster ROI with WAN optimization? Read the latest IDC report and discover how you can cut IT costs without compromising...
- Transform Your IT Service Management Watch this webinar, to learn how EasyVista can increase IT productivity & efficiency and deliver streamlined & integrated IT Service & Asset Mgmt.
- Top 4 Digital Signage Fails Join RMG Networks for a look at four of the most common reasons digital signage fails in corporate businesses. Learn about strategies to... All Applications White Papers | Webcasts