<?xml version="1.0"?>
<News hasArchived="false" page="111" pageCount="206" pageSize="10" timestamp="Mon, 11 May 2026 19:45:36 -0400" url="https://dev.my.umbc.edu/groups/csee/posts.xml?mode=activity&amp;page=111">
  <NewsItem contentIssues="true" id="41982" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/41982">
  <Title>Professors Adali and Westlake receive grant to improve treatment for stroke victims</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <p><img alt="" src="http://www.csee.umbc.edu/wp-content/uploads/2014/03/Screen-Shot-2014-03-03-at-3.29.39-PM.png" width="700" height="308" style="max-width: 100%; height: auto;"></p>
    <p> </p>
    <p>CSEE Professor Tülay<a href="http://www.csee.umbc.edu/~adali/" rel="nofollow external" class="bo"> Adali</a> and Professor <a href="http://medschool.umaryland.edu/FACULTYRESEARCHPROFILE/viewprofile.aspx?id=24072" rel="nofollow external" class="bo">Kelly Westlake</a> from the University of Maryland School of Medicine <a href="http://umbcinsights.wordpress.com/2013/06/26/the-umb-umbc-research-and-innovation-partnership-seed-grant-program/" rel="nofollow external" class="bo">received</a> an award from the joint UMBC-UMB Research and Innovation Partnership Seed Grant Program for a project  that ultimately will improve the recovery of stroke victims. The new joint <a href="http://my.umbc.edu/news/22242" rel="nofollow external" class="bo">UMBC-UMB Seed Grant Program</a> pairs primary investigators from UMBC and the University of Maryland, Baltimore to conduct research as a team. Successful partners are offered research funding of up to $75,000 over twelve months to pursue their collaboration.</p>
    <p>Nearly 800,000 U.S. citizens have a stroke each year, making it the leading cause of long-term disability. Treatment for stroke victims is mainly targeted towards residual functional deficits, especially regaining hand functions. Their project (“Independent Vector Analysis to Investigate Cognitive Neural Networks after Stroke: A Comparison between Two Rehabilitation Interventions”) will have a direct impact on stroke rehabilitation through objective evaluation of the two main treatment paradigms currently in use: unimanual (involving one hand) and bimanual (involving both hands) training. The evaluation will use the new class of medical image analysis techniques, independent vector analysis (IVA) algorithms, developed by Dr. Adali and her research group. The new class of IVA algorithms successfully captures subject variability and perform significantly better than the approaches traditionally used for the problem.</p>
    <p>The initial results of the project demonstrate the advantages using IVA for the problem and will be presented this month at the 48th Annual <a href="http://ee-ciss.princeton.edu/" rel="nofollow external" class="bo">Conference on Information Sciences and Systems</a> in Princeton, NJ. The PIs are preparing two journal submissions, one based on the methods developed for the task and a second one emphasizing clinical significance of the results. These results will also provide the preliminary data for the proposal that Professors Adali and Westlake plan to submit to the NIH later this year.</p>
    </div>
]]>
  </Body>
  <Summary>    CSEE Professor Tülay Adali and Professor Kelly Westlake from the University of Maryland School of Medicine received an award from the joint UMBC-UMB Research and Innovation Partnership Seed...</Summary>
  <Website>http://www.csee.umbc.edu/2014/03/professors-adali-and-westlake-receive-grant-to-improve-treatment-for-stroke-victims/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/41982/guest@my.umbc.edu/d7a850947a7fbd58dd2708b3734ccfad/api/pixel</TrackingUrl>
  <Tag>faculty-and-staff</Tag>
  <Tag>news</Tag>
  <Tag>research</Tag>
  <Tag>research-awards</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Mon, 03 Mar 2014 12:56:02 -0500</PostedAt>
  <EditAt>Mon, 03 Mar 2014 12:56:02 -0500</EditAt>
</NewsItem>
  <NewsItem contentIssues="true" id="42619" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/42619">
  <Title>Professors Adali and Westlake receive grant to improve treatment for stroke victims</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <p><img alt="" src="http://www.csee.umbc.edu/wp-content/uploads/2014/03/Screen-Shot-2014-03-03-at-3.29.39-PM.png" width="700" height="308" style="max-width: 100%; height: auto;"></p>
    <p> </p>
    <p>CSEE Professor Tülay<a href="http://www.csee.umbc.edu/~adali/" rel="nofollow external" class="bo"> Adali</a> and Professor <a href="http://medschool.umaryland.edu/FACULTYRESEARCHPROFILE/viewprofile.aspx?id=24072" rel="nofollow external" class="bo">Kelly Westlake</a> from the University of Maryland School of Medicine <a href="http://umbcinsights.wordpress.com/2013/06/26/the-umb-umbc-research-and-innovation-partnership-seed-grant-program/" rel="nofollow external" class="bo">received</a> an award from the joint UMBC-UMB Research and Innovation Partnership Seed Grant Program for a project  that ultimately will improve the recovery of stroke victims. The new joint <a href="http://my.umbc.edu/news/22242" rel="nofollow external" class="bo">UMBC-UMB Seed Grant Program</a> pairs primary investigators from UMBC and the University of Maryland, Baltimore to conduct research as a team. Successful partners are offered research funding of up to $75,000 over twelve months to pursue their collaboration.</p>
    <p>Nearly 800,000 U.S. citizens have a stroke each year, making it the leading cause of long-term disability. Treatment for stroke victims is mainly targeted towards residual functional deficits, especially regaining hand functions. Their project (“Independent Vector Analysis to Investigate Cognitive Neural Networks after Stroke: A Comparison between Two Rehabilitation Interventions”) will have a direct impact on stroke rehabilitation through objective evaluation of the two main treatment paradigms currently in use: unimanual (involving one hand) and bimanual (involving both hands) training. The evaluation will use the new class of medical image analysis techniques, independent vector analysis (IVA) algorithms, developed by Dr. Adali and her research group. The new class of IVA algorithms successfully captures subject variability and perform significantly better than the approaches traditionally used for the problem.</p>
    <p>The initial results of the project demonstrate the advantages using IVA for the problem and will be presented this month at the 48th Annual <a href="http://ee-ciss.princeton.edu/" rel="nofollow external" class="bo">Conference on Information Sciences and Systems</a> in Princeton, NJ. The PIs are preparing two journal submissions, one based on the methods developed for the task and a second one emphasizing clinical significance of the results. These results will also provide the preliminary data for the proposal that Professors Adali and Westlake plan to submit to the NIH later this year.</p>
    </div>
]]>
  </Body>
  <Summary>    CSEE Professor Tülay Adali and Professor Kelly Westlake from the University of Maryland School of Medicine received an award from the joint UMBC-UMB Research and Innovation Partnership Seed...</Summary>
  <Website>http://www.csee.umbc.edu/2014/03/professors-adali-and-westlake-receive-grant-to-improve-treatment-for-stroke-victims/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=professors-adali-and-westlake-receive-grant-to-improve-treatment-for-stroke-victims</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/42619/guest@my.umbc.edu/14c837573ac6d2cec7960704cd65db6d/api/pixel</TrackingUrl>
  <Tag>faculty-and-staff</Tag>
  <Tag>news</Tag>
  <Tag>research</Tag>
  <Tag>research-awards</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Mon, 03 Mar 2014 12:56:02 -0500</PostedAt>
</NewsItem>
  <NewsItem contentIssues="true" id="41960" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/41960">
  <Title>talk: Predictive Analytics for Insider Threats, 4pm Wed 3/5</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <p><img alt="" src="http://www.csee.umbc.edu/~rforno/shariati-lecture.png" style="max-width: 100%; height: auto;"></p>
    <h1><strong>Predictive Analytics for Insider Threats</strong></h1>
    <h2><strong>Ben Shariati<br>
    Visiting Lecturer &amp; Interim Assistant CYBR GPD</strong></h2>
    <h3>4:00pm Wednesday, 5 March 2014, ITE325b</h3>
    <p>This talk will discuss how using operational cyber analytics for predictive security intelligence support a powerful defensive cybersecurity capability. Specifically, I will share elements of my commercial research on how organizations can predict malicious behavior (both user and digital) on their networks by incorporating tailored algorithms and artificial intelligence capabilities as part of an overall cybersecurity sensor architecture. Additionally, this talk will briefly discuss the impact that mobile devices have on the insider threat vulnerability within the government and private sector.</p>
    <p> </p>
    <p>Ben Shariati is a Ph.D. candidate in Information Assurance/Cybersecurity at the George Washington University, where his dissertation work examines the analysis and management of cybersecurity concerns of critical infrastructures. His research and professional interests include mobile device security, emerging technology evaluation, risk analysis, audit, and compliance. For AY13-14, Mr. Shariati is a visiting lecturer and Interim Assistant Director of the Graduate Cybersecurity Program overseeing program activities at The Universities at Shady Grove. In addition to teaching several courses at UMBC, Mr. Shariati has taught graduate cybersecurity courses at George Washington University and undergraduate technical certification classes Hagerstown Community College.</p>
    <p>Mr. Shariati is a technology and business executive with over 20 years of experience specializing in strategic and operational cybersecurity program activities and development for international organizations. His career highlights include serving as a lead enterprise security architect at the Federal Reserve Bank in Richmond, VA, a cybersecurity advisor at Cell Trust Corporation, and Technology Advisor/Cybersecurity Architect for the United Nations Pan American Health Organization.</p>
    </div>
]]>
  </Body>
  <Summary>Predictive Analytics for Insider Threats   Ben Shariati  Visiting Lecturer &amp; Interim Assistant CYBR GPD   4:00pm Wednesday, 5 March 2014, ITE325b   This talk will discuss how using operational...</Summary>
  <Website>http://www.csee.umbc.edu/2014/03/talk-predictive-analytics-for-insider-threats/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/41960/guest@my.umbc.edu/bbd49e0ac74987523077d3af39379525/api/pixel</TrackingUrl>
  <Tag>csee</Tag>
  <Tag>cybersecurity</Tag>
  <Tag>news</Tag>
  <Tag>talks</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Sun, 02 Mar 2014 19:46:31 -0500</PostedAt>
  <EditAt>Sun, 02 Mar 2014 19:46:31 -0500</EditAt>
</NewsItem>
  <NewsItem contentIssues="true" id="42620" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/42620">
  <Title>talk: Predictive Analytics for Insider Threats, 4pm Wed 3/5</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <p><img alt="" src="http://www.csee.umbc.edu/~rforno/shariati-lecture.png" style="max-width: 100%; height: auto;"></p>
    <h1><strong>Predictive Analytics for Insider Threats</strong></h1>
    <h2><strong>Ben Shariati<br>
    Visiting Lecturer &amp; Interim Assistant CYBR GPD</strong></h2>
    <h3>4:00pm Wednesday, 5 March 2014, ITE325b</h3>
    <p>This talk will discuss how using operational cyber analytics for predictive security intelligence support a powerful defensive cybersecurity capability. Specifically, I will share elements of my commercial research on how organizations can predict malicious behavior (both user and digital) on their networks by incorporating tailored algorithms and artificial intelligence capabilities as part of an overall cybersecurity sensor architecture. Additionally, this talk will briefly discuss the impact that mobile devices have on the insider threat vulnerability within the government and private sector.</p>
    <p> </p>
    <p>Ben Shariati is a Ph.D. candidate in Information Assurance/Cybersecurity at the George Washington University, where his dissertation work examines the analysis and management of cybersecurity concerns of critical infrastructures. His research and professional interests include mobile device security, emerging technology evaluation, risk analysis, audit, and compliance. For AY13-14, Mr. Shariati is a visiting lecturer and Interim Assistant Director of the Graduate Cybersecurity Program overseeing program activities at The Universities at Shady Grove. In addition to teaching several courses at UMBC, Mr. Shariati has taught graduate cybersecurity courses at George Washington University and undergraduate technical certification classes Hagerstown Community College.</p>
    <p>Mr. Shariati is a technology and business executive with over 20 years of experience specializing in strategic and operational cybersecurity program activities and development for international organizations. His career highlights include serving as a lead enterprise security architect at the Federal Reserve Bank in Richmond, VA, a cybersecurity advisor at Cell Trust Corporation, and Technology Advisor/Cybersecurity Architect for the United Nations Pan American Health Organization.</p>
    </div>
]]>
  </Body>
  <Summary>Predictive Analytics for Insider Threats   Ben Shariati  Visiting Lecturer &amp; Interim Assistant CYBR GPD   4:00pm Wednesday, 5 March 2014, ITE325b   This talk will discuss how using operational...</Summary>
  <Website>http://www.csee.umbc.edu/2014/03/talk-predictive-analytics-for-insider-threats/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=talk-predictive-analytics-for-insider-threats</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/42620/guest@my.umbc.edu/04b3dcbde13cb738b1decfe32bc76ab4/api/pixel</TrackingUrl>
  <Tag>csee</Tag>
  <Tag>cybersecurity</Tag>
  <Tag>news</Tag>
  <Tag>talks</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Sun, 02 Mar 2014 19:46:31 -0500</PostedAt>
</NewsItem>
  <NewsItem contentIssues="false" id="41956" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/41956">
    <Title>Samuel Lomonaco: Strange World of Quantum Computing, NASA Mon. 3/10</Title>
    <Body>
      <![CDATA[
          <div class="html-content">
          <p><img alt="http://www.flickr.com/photos/jurvetson/3648247047/" src="http://www.csee.umbc.edu/wp-content/uploads/2014/03/3648247047_ae87841e83_o.jpg" width="700" height="308" style="max-width: 100%; height: auto;"></p>
          <p>CSEE Professor <a href="http://www.csee.umbc.edu/~lomonaco/" rel="nofollow external" class="bo">Samuel Lomonaco</a> will give an invited talk on “The Strange World of Quantum Computing” as art of the <a href="http://ecolloq.gsfc.nasa.gov/" rel="nofollow external" class="bo">NASA Goddard Engineering Colloquium Series</a> at 3:00pm Monday, March 10 in the Building 3 Auditorium.</p>
          <p>Abstract: Quantum computers have the potential to greatly increase computational power beyond the capabilities of conventional computers by exploiting the bizarre quantum properties of the subatomic world. This talk will give an introductory overview of quantum computing in an intuitive and conceptual fashion. No prior knowledge of quantum mechanics will be assumed.</p>
          </div>
      ]]>
    </Body>
    <Summary>CSEE Professor Samuel Lomonaco will give an invited talk on “The Strange World of Quantum Computing” as art of the NASA Goddard Engineering Colloquium Series at 3:00pm Monday, March 10 in the...</Summary>
    <Website>http://www.csee.umbc.edu/2014/03/samuel-lomonaco-strange-world-of-quantum-computing-nasa-mon-310/</Website>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/41956/guest@my.umbc.edu/f07bef95672ee9cc8bad65bd43a229db/api/pixel</TrackingUrl>
    <Tag>computer-science</Tag>
    <Tag>news</Tag>
    <Tag>research</Tag>
    <Tag>talks</Tag>
    <Group token="csee">Computer Science and Electrical Engineering</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
    <Sponsor>Computer Science and Electrical Engineering</Sponsor>
    <PawCount>1</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Sun, 02 Mar 2014 14:11:12 -0500</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="42621" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/42621">
    <Title>Samuel Lomonaco: Strange World of Quantum Computing, NASA Mon. 3/10</Title>
    <Body>
      <![CDATA[
          <div class="html-content">
          <p><img alt="http://www.flickr.com/photos/jurvetson/3648247047/" src="http://www.csee.umbc.edu/wp-content/uploads/2014/03/3648247047_ae87841e83_o.jpg" width="700" height="308" style="max-width: 100%; height: auto;"></p>
          <p>CSEE Professor <a href="http://www.csee.umbc.edu/~lomonaco/" rel="nofollow external" class="bo">Samuel Lomonaco</a> will give an invited talk on “The Strange World of Quantum Computing” as art of the <a href="http://ecolloq.gsfc.nasa.gov/" rel="nofollow external" class="bo">NASA Goddard Engineering Colloquium Series</a> at 3:00pm Monday, March 10 in the Building 3 Auditorium.</p>
          <p>Abstract: Quantum computers have the potential to greatly increase computational power beyond the capabilities of conventional computers by exploiting the bizarre quantum properties of the subatomic world. This talk will give an introductory overview of quantum computing in an intuitive and conceptual fashion. No prior knowledge of quantum mechanics will be assumed.</p>
          </div>
      ]]>
    </Body>
    <Summary>CSEE Professor Samuel Lomonaco will give an invited talk on “The Strange World of Quantum Computing” as art of the NASA Goddard Engineering Colloquium Series at 3:00pm Monday, March 10 in the...</Summary>
    <Website>http://www.csee.umbc.edu/2014/03/samuel-lomonaco-strange-world-of-quantum-computing-nasa-mon-310/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=samuel-lomonaco-strange-world-of-quantum-computing-nasa-mon-310</Website>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/42621/guest@my.umbc.edu/6d22b810d556da44e5834b9e1209c580/api/pixel</TrackingUrl>
    <Tag>computer-science</Tag>
    <Tag>news</Tag>
    <Tag>research</Tag>
    <Tag>talks</Tag>
    <Group token="csee">Computer Science and Electrical Engineering</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
    <Sponsor>Computer Science and Electrical Engineering</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Sun, 02 Mar 2014 14:11:12 -0500</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="true" id="42110" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/42110">
  <Title>talk: Probabilistic Information for Spectrum Sensing and Utilization, 11:45 3/7, UMBC</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <p><img alt="" src="http://www.csee.umbc.edu/wp-content/uploads/2014/02/spectrum700.png" width="700" height="308" style="max-width: 100%; height: auto;"></p>
    <h2>Exploiting Probabilistic Information for Spectrum Sensing<br>
    and Utilization: towards Efficient Wireless Coexistence</h2>
    <h3>Prof. Xiangwei Zhou<br>
    University of Illinois, Carbondale</h3>
    <h3>11:45am Friday, 7 March 2014, ITE 325b, UMBC</h3>
    <p>With the rapid growth of wireless devices and applications, the electromagnetic radio spectrum is considered to be in short supply. To overcome spectrum scarcity and satisfy emerging user demands, cognitive radio, which can sense and adapt to the surrounding spectral environment, has been introduced to enhance the utilization of the spectrum. However, it is a challenging task to design a robust and cost-effective system involving identification and reuse of spectrum opportunities changing over time, frequency, and space. In this talk, I will focus on efficient spectrum sensing and utilization techniques for dynamic spectrum access. In particular, I will emphasize the importance of exploiting probabilistic information unique to such a system. I will present novel techniques from the perspectives of both a single user and a multi-user network. In the end, I will discuss further extension of the work to enable the coexistence of heterogeneous wireless networks.</p>
    <p>Xiangwei Zhou received his Ph.D. degree in Electrical and Computer Engineering from Georgia Institute of Technology, Atlanta, Georgia, in 2011. He received his M.S. degree in Information and Communication Engineering from Zhejiang University, Hangzhou, China and his B.S. degree in Communication Engineering from Nanjing University of Science and Technology, Nanjing, China, in 2007 and 2005, respectively. Since 2013, Dr. Zhou has been with the Department of Electrical and Computer Engineering at Southern Illinois University Carbondale as an Assistant Professor. Prior to that, he was a Senior Systems Engineer with Marvell Semiconductor, Santa Clara, California, from 2011 to 2013. Dr. Zhou’s general research interests include wireless communications and statistical signal processing, with current emphasis on cognitive radio and heterogeneous coexistence, cyber-physical systems, and cross-layer optimization. He is now serving as an Editor for IEEE Transactions on Wireless Communications.</p>
    <p>Host: Mohamed Younis, Sorry, you need javascript to view this email address. </p>
    </div>
]]>
  </Body>
  <Summary>Exploiting Probabilistic Information for Spectrum Sensing  and Utilization: towards Efficient Wireless Coexistence   Prof. Xiangwei Zhou  University of Illinois, Carbondale   11:45am Friday, 7...</Summary>
  <Website>http://www.csee.umbc.edu/2014/02/talk-probabilistic-information-for-spectrum-sensing-and-utilization-1145-37-umbc/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/42110/guest@my.umbc.edu/daf7c43a442c49da2458c178029c9dfa/api/pixel</TrackingUrl>
  <Tag>computer-engineering</Tag>
  <Tag>electrical-engineering</Tag>
  <Tag>news</Tag>
  <Tag>research</Tag>
  <Tag>talks</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Fri, 28 Feb 2014 23:39:44 -0500</PostedAt>
  <EditAt>Fri, 28 Feb 2014 23:39:44 -0500</EditAt>
</NewsItem>
  <NewsItem contentIssues="true" id="42622" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/42622">
  <Title>talk: Probabilistic Information for Spectrum Sensing and Utilization, 11:45 3/7, UMBC</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <p><img alt="" src="http://www.csee.umbc.edu/wp-content/uploads/2014/02/spectrum700.png" width="700" height="308" style="max-width: 100%; height: auto;"></p>
    <h2>Exploiting Probabilistic Information for Spectrum Sensing<br>
    and Utilization: towards Efficient Wireless Coexistence</h2>
    <h3>Prof. Xiangwei Zhou<br>
    University of Illinois, Carbondale</h3>
    <h3>11:45am Friday, 7 March 2014, ITE 325b, UMBC</h3>
    <p>With the rapid growth of wireless devices and applications, the electromagnetic radio spectrum is considered to be in short supply. To overcome spectrum scarcity and satisfy emerging user demands, cognitive radio, which can sense and adapt to the surrounding spectral environment, has been introduced to enhance the utilization of the spectrum. However, it is a challenging task to design a robust and cost-effective system involving identification and reuse of spectrum opportunities changing over time, frequency, and space. In this talk, I will focus on efficient spectrum sensing and utilization techniques for dynamic spectrum access. In particular, I will emphasize the importance of exploiting probabilistic information unique to such a system. I will present novel techniques from the perspectives of both a single user and a multi-user network. In the end, I will discuss further extension of the work to enable the coexistence of heterogeneous wireless networks.</p>
    <p>Xiangwei Zhou received his Ph.D. degree in Electrical and Computer Engineering from Georgia Institute of Technology, Atlanta, Georgia, in 2011. He received his M.S. degree in Information and Communication Engineering from Zhejiang University, Hangzhou, China and his B.S. degree in Communication Engineering from Nanjing University of Science and Technology, Nanjing, China, in 2007 and 2005, respectively. Since 2013, Dr. Zhou has been with the Department of Electrical and Computer Engineering at Southern Illinois University Carbondale as an Assistant Professor. Prior to that, he was a Senior Systems Engineer with Marvell Semiconductor, Santa Clara, California, from 2011 to 2013. Dr. Zhou’s general research interests include wireless communications and statistical signal processing, with current emphasis on cognitive radio and heterogeneous coexistence, cyber-physical systems, and cross-layer optimization. He is now serving as an Editor for IEEE Transactions on Wireless Communications.</p>
    <p>Host: Mohamed Younis, Sorry, you need javascript to view this email address. </p>
    </div>
]]>
  </Body>
  <Summary>Exploiting Probabilistic Information for Spectrum Sensing  and Utilization: towards Efficient Wireless Coexistence   Prof. Xiangwei Zhou  University of Illinois, Carbondale   11:45am Friday, 7...</Summary>
  <Website>http://www.csee.umbc.edu/2014/02/talk-probabilistic-information-for-spectrum-sensing-and-utilization-1145-37-umbc/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=talk-probabilistic-information-for-spectrum-sensing-and-utilization-1145-37-umbc</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/42622/guest@my.umbc.edu/e83b8f01c5b7aaffbaf5b611d7878c62/api/pixel</TrackingUrl>
  <Tag>computer-engineering</Tag>
  <Tag>electrical-engineering</Tag>
  <Tag>news</Tag>
  <Tag>research</Tag>
  <Tag>talks</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Fri, 28 Feb 2014 23:39:44 -0500</PostedAt>
  <EditAt>Fri, 28 Feb 2014 23:39:44 -0500</EditAt>
</NewsItem>
  <NewsItem contentIssues="false" id="41912" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/41912">
  <Title>talk: Strong, usable access control for personal data, 1pm Thr 3/6, UMBC</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <p><img alt="source=http://www.flickr.com/photos/opensourceway/4638981545/sizes/o/in/photostream/" src="http://www.csee.umbc.edu/wp-content/uploads/2014/02/pricacy700.jpg" width="700" height="308" style="max-width: 100%; height: auto;"></p>
    <h2>Toward strong, usable access control for personal data</h2>
    <h3>Michelle Mazurek<br>
    Carnegie Mellon University</h3>
    <h3>1:00pm Thursday, 6 March 2014, ITE 325b, UMBC</h3>
    <p>Users create, store and access a lot of personal data, both on their devices and in the cloud. Although this provides tremendous benefits, it also creates risks to security and privacy, ranging from the inconvenient (private photos posted around the office) to the serious (loss of a job; withdrawal of college admission). Simply refusing to share personal data is not feasible or desirable, but sharing indiscriminately is equally problematic. Instead, users should be able to efficiently accomplish their primary goals without unnecessarily compromising their privacy. In this talk, I describe my work toward developing usable access-control mechanisms for personal data. I review the results of three user studies that provided insight into users’ policy needs and preferences. I then discuss the design and implementation of Penumbra, a distributed file system with built-in access control designed to support those needs. Penumbra has two key building blocks: semantic-tag-based policy specification and logic-based policy enforcement. Our results show that Penumbra can enforce users’ preferred policies securely with low overhead.</p>
    <p><a href="http://tintin.pdl.cmu.edu/" rel="nofollow external" class="bo">Michelle Mazurek</a> is a Ph.D. candidate in Electrical and Computer Engineering at Carnegie Mellon University, co-advised by Lujo Bauer and Greg Ganger. Her research interests span security, systems, and HCI, with particular emphasis on designing systems from the ground up for usable security. She has worked on projects related to usable access control, distributed systems, and passwords.</p>
    <p>Host: Penny Rheingans, Sorry, you need javascript to view this email address. </p>
    </div>
]]>
  </Body>
  <Summary>Toward strong, usable access control for personal data   Michelle Mazurek  Carnegie Mellon University   1:00pm Thursday, 6 March 2014, ITE 325b, UMBC   Users create, store and access a lot of...</Summary>
  <Website>http://www.csee.umbc.edu/2014/02/talk-strong-usable-access-control-for-personal-data-1pm-thr-36-umbc/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/41912/guest@my.umbc.edu/e111db9b4680253b1ffeefdea34b02c7/api/pixel</TrackingUrl>
  <Tag>computer-science</Tag>
  <Tag>cybersecurity</Tag>
  <Tag>news</Tag>
  <Tag>research</Tag>
  <Tag>talks</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Fri, 28 Feb 2014 09:41:22 -0500</PostedAt>
  <EditAt>Fri, 28 Feb 2014 09:41:22 -0500</EditAt>
</NewsItem>
  <NewsItem contentIssues="false" id="42623" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/42623">
  <Title>talk: Strong, usable access control for personal data, 1pm Thr 3/6, UMBC</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <p><img alt="source=http://www.flickr.com/photos/opensourceway/4638981545/sizes/o/in/photostream/" src="http://www.csee.umbc.edu/wp-content/uploads/2014/02/pricacy700.jpg" width="700" height="308" style="max-width: 100%; height: auto;"></p>
    <h2>Toward strong, usable access control for personal data</h2>
    <h3>Michelle Mazurek<br>
    Carnegie Mellon University</h3>
    <h3>1:00pm Thursday, 6 March 2014, ITE 325b, UMBC</h3>
    <p>Users create, store and access a lot of personal data, both on their devices and in the cloud. Although this provides tremendous benefits, it also creates risks to security and privacy, ranging from the inconvenient (private photos posted around the office) to the serious (loss of a job; withdrawal of college admission). Simply refusing to share personal data is not feasible or desirable, but sharing indiscriminately is equally problematic. Instead, users should be able to efficiently accomplish their primary goals without unnecessarily compromising their privacy. In this talk, I describe my work toward developing usable access-control mechanisms for personal data. I review the results of three user studies that provided insight into users’ policy needs and preferences. I then discuss the design and implementation of Penumbra, a distributed file system with built-in access control designed to support those needs. Penumbra has two key building blocks: semantic-tag-based policy specification and logic-based policy enforcement. Our results show that Penumbra can enforce users’ preferred policies securely with low overhead.</p>
    <p><a href="http://tintin.pdl.cmu.edu/" rel="nofollow external" class="bo">Michelle Mazurek</a> is a Ph.D. candidate in Electrical and Computer Engineering at Carnegie Mellon University, co-advised by Lujo Bauer and Greg Ganger. Her research interests span security, systems, and HCI, with particular emphasis on designing systems from the ground up for usable security. She has worked on projects related to usable access control, distributed systems, and passwords.</p>
    <p>Host: Penny Rheingans, Sorry, you need javascript to view this email address. </p>
    </div>
]]>
  </Body>
  <Summary>Toward strong, usable access control for personal data   Michelle Mazurek  Carnegie Mellon University   1:00pm Thursday, 6 March 2014, ITE 325b, UMBC   Users create, store and access a lot of...</Summary>
  <Website>http://www.csee.umbc.edu/2014/02/talk-strong-usable-access-control-for-personal-data-1pm-thr-36-umbc/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=talk-strong-usable-access-control-for-personal-data-1pm-thr-36-umbc</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/42623/guest@my.umbc.edu/84dd29259e2a0fa081962e30129027ae/api/pixel</TrackingUrl>
  <Tag>computer-science</Tag>
  <Tag>cybersecurity</Tag>
  <Tag>news</Tag>
  <Tag>research</Tag>
  <Tag>talks</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Fri, 28 Feb 2014 09:41:22 -0500</PostedAt>
  <EditAt>Fri, 28 Feb 2014 09:41:22 -0500</EditAt>
</NewsItem>
</News>
