The PSU/CS Center for Information Assurance promotes collaboration between Portland State University, Department of Computer Science faculty, PSU undergraduate and graduate students, and other local groups including Oregon RAINS and Hillsboro Police Reserve Specialists. We are committed to research, education and training in the general areas of information assurance, and specific areas including computer security, network security, and digital forensics.
Our university originally qualified for recognition from 2003-2006 as one of 50 National Security Agency (NSA) Centers of Academic Excellence in Information Assurance Education. (Or also see this NSA web page). We have recently requalified as an NSA CAE for the period 2006-2009.
As part of the CAE designation, the National INFOSEC Education and Training Program (NIETP), an office of the National Security Agency, has certified PSU's Computer Security curriculum under its Information Assurance Courseware Evaluation program , as specified in NSTISSC Training Standard 4011. Our MS degree in Computer Science with a Computer Security concentration is recognized by the Committee on National Security Systems (CNSS).Defense Dollars Available: The Information Assurance Scholarship Program (IASP).
The Department of Computer Science allows students to specialize in computer security in several ways. We have a new security certificate program, and we also have a M.S. security concentration.The Security Certificate program:
S. Mocas and T. Schubert, ``Formal Analysis of IP Layer Security'', Proceedings of the DIMACS Special Year on Networks, DIMACS Workshop on Design and Formal Verification of Security Protocols, September, 1997. Available on CD.
Jim Binkley and John Richardson (Intel), "Security Considerations for Mobility and Firewalls", November 1998. Submitted as IETF draft in informational category.
Jim Binkley and William Trost, "Authenticated Ad Hoc Routing at the Link Layer for Mobile Systems," Wireless Networks 7, 139-145, 2001. Kluwer Academic Publishers.
S. Mocas, G. Heuston, W. Harrison, M. Morrissey and J. Richardson, ``High Tech Forensics: Serving as a Police Reserve Specialist'', submitted to Communications of the ACM , August, 2002.
W. Harrison, D. Aucsmith, G. Heuston, S. Mocas, M. Morrissey and S. Russelle, ``A Lessons Learned Repository for Computer Forensics'', International Journal of Digital Evidence (IJDE) , Volume 1, Issue 3, Fall, 2002.
John Black, Phillip Rogaway, and Thomas Shrimpton, "Encryption-Scheme Security in the Presence of Key-Dependent Messages", Appeared at Selected Areas in Cryptography -- SAC '02, St. John's, Newfoundland, Canada, 2002.
John Black, Phillip Rogaway, and Thomas Shrimpton, Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV Appeared at Advances in Cryptology -- CRYPTO '02, Santa Barbara, CA, USA, 2002.
Philip MacKenzie, Thomas Shrimpton, and Markus Jakobsson, Threshold Password-Authenticated Key Exchange Appears in the Journal of Cryptology. (An extended abstract appeared at Advances in Cryptology -- CRYPTO '02, Santa Barbara, CA, USA, 2002.)
Ashvin Goel, Wu-chang Feng, David Maier, Wu-chi Feng, Jonathan Walpole, "Forensix: A Robust, High-Performance Reconstruction System" , in International Conference on Distributed Computing Systems Security Workshop (SDCS-2005) June 2005.
Wu-chang Feng, Ed Kaiser, Wu-chi Feng, Antoine Luu "The Design and Implementation of Network Puzzles" , in IEEE INFOCOM 2005, March 2005.
James R. Binkley and Suresh Singh, "An Algorithm for Anomaly-based Botnet Detection," Computer Science, PSU, USENIX SRUTI: '06 2nd Workshop on Steps to Reducing Unwanted Traffic on the Internet", July 7 2006.
James R. Binkley, "Anomaly-based Botnet Server Detection," Computer Science, PSU, FLOCON CERT/SEI, Vancouver WA, October 2006.