University of Hawaii - Research Center for Information AssuranceResearch Center for Information Assurance
Today the need for reliable and secure digital communication is critical. The RCIA consists of a team of faculty members with a history of research funding in IA applications. These faculty members are primarily from the departments of Information and Computer Sciences (ICS) in the College of Natural Sciences and Electrical Engineering (EE) in the College of Engineering. Participating members of the ICS faculty are David N. Chin, Martha E. Crosby, Curtis S. Ikehara, Nancy E. Reed and Philip Johnson. Participating EE faculty include Yingfei Dong, Aleksandar Kavčić, Anthony Kuh and Todd Reed. In the last five years this group has received sixteen IA related grants valued at $3,264,543 from NSF, DARPA, ONR, USAF as well as several private companies. In addition, RCIA faculty have been awarded three IA related patents and have filed claims for two others.
RCIA serves as a learning laboratory and test bed for investigations and applications related to the generation, organization, access, preservation, and secure use of digital information. A research focus of the RCIA faculty is on areas that contribute to reliable and secure Internet services. These areas are: information security, service availability and quality, and intrusion detection. In particular, the results of this research will contribute to dampening the damage of malicious attacks and the fast spread of viruses, stopping unauthorized accesses by enforcing multiple levels of security schemes supporting flexible policies, detecting and preventing intrusion using data mining, continuous authentication, secure coding and other state-of-the-art techniques. In addition to studying theoretical topics such as cryptography, members of the RCIA faculty focus on exploiting the characteristics of practical applications, such as video/audio, existing data sharing techniques over wired, wireless, broadband, and optical connections.
Areas of Expertise
- Continuous Identity Authentication
- Information Security
- Intrusion Detection
- Network Security
- Secure Coding