Subrata Acharya

Name

Contact Information

PHONE
OFFICE
YR-425

Education

Ph.D., Computer Science (2008), University of Pittsburgh, Pittsburgh, PA

M.S., Computer Engineering (2004), Texas A&M University, College Station, TX

Areas of Expertise

Healthcare Information Security and Privacy, Cyber Physical Systems, Medical Analytics, System Security, Trusted Computing, Information Security Management, Secure Health Informatics, Secure Mobile Systems, Ethical & Privacy Issues in Computing Systems

Biography

Courses Taught

  • COSC 745 (graduate) Advanced Topics in Computer Security - Healthcare Information Security and Privacy
  • HLTH 570 / ITEC470 (graduate/undergraduate) Healthcare Systems Design and Implementation
  • COSC 336 (undergraduate) Data Structures and Algorithm Analysis

Research Interests:

Healthcare Information Security and Privacy, Cyber Physical Systems, Medical Analytics, System Security, Trusted Computing, Information Security Management, Secure Health Informatics, Secure   Mobile Systems, Ethical & Privacy Issues in Computing Systems

Grants & Sponsored Research (External Only):

S. Acharya (PI), Design and Evaluation of HealthCare Information Security System (External); Funded by: University of Pittsburgh Medical Center (UPMC-Altoona), 2011-2017; Funding Amount: $402,000; Period: March 2011 – December 2017

M. O’Leary (PI), S. Acharya (co-PI), L. Ray (co-PI), W. Yu (co-PI), S. Kaza (co-PI), Basic Recruitment and Capacity Building (External); Funded by: Department of Defense (DoD), Information Assurance Scholarship Program (IASP), 2010; Funding Amount: $95,716; Period: September 2010 – August 2011

M. O’Leary (PI), S. Acharya (co-PI), Yeong-Tae Song (co-PI), S. Kaza (co-PI), S. Chakraborty (co-PI), J. Dehlinger (co-PI), Expanding an Applied Information Technology Master’s Program (External); Funded by: Base Realignment and Closure-Maryland Higher Education Investment Fund Grant, 2009; Funding Amount: $90,990; Period: January 2009 – January 2010

Memberships / Affiliations:

IEEE, ACM, WIMHE, CRA-W

Service Interests:

Security Education, Women in Computing, STEM Education (K-12)

Selected Patent/Journals/Book Chapters:

S. Acharya, J. Wang, Z. Ge and A. Greenberg, “Methods and Apparatus for Optimizing a Firewall”, US patent, Docket No. 2005-0520, June, 2011, uspto.gov, http://www.google.com/patents/US20080005795

S. Acharya, “HTTPV: Verifiable HTTP across an Untrusted Channel”, book chapter in Network Security Technologies: Design and Applications, Publisher: IGI Global USA, March, 2014, http://www.igi-global.com/publish/call-for-papers/call-details/213

S. Acharya, “Accelerating Firewalls: Tools, Techniques and Metrics for Optimizing Distributed Firewalls”, book chapter in the Handbook of Optimization – From Classical to Modern Approach, Intelligent System Reference Library, Volume 38, Pages: 529-551, Publisher: Springer, 2013, XII, 1100 p. 460 illus., http://link.springer.com/chapter/10.1007/978-3-642-30504-7_21

S. Acharya, “GCD: A Global Collaborative Defense approach to Thwart Internet Attacks”, book chapter in the Situational Awareness in Computer Network Defense: Principles, Methods and Applications, Publisher: IGI Global, USA, January, 2012, http://www.igi-global.com/chapter/gcd-global-collaborative-defense-approach/62382

S. Acharya, “PITWALL: Tools, Techniques and Metrics for the Optimization of Enterprise Network Defense Systems” book chapter in Situational Awareness in Computer Network Defense: Principles, Methods and Applications, Publisher: IGI Global, USA, January, 2012, http://www.igi-global.com/chapter/pitwall-tools-techniques-metrics-optimization/62389

S. Acharya, S. Khatiwada***, K. Elkins, “CSI-Pi: A novel automated secure solution to interpret on-site colorimetric tests”, Colonial Academic Alliance Undergraduate Research Journal (CAAURJ), Volume 5, Fall, 2015

J. Cohen*, S. Acharya, “Towards a Trusted HDFS Storage Platform: Mitigating Threats to Hadoop Infrastructures Using Hardware-Accelerated Encryption with TPM-Rooted Key Protection”, Elsevier Journal of Information Security and Applications Special Issue, July, 2014, http://www.sciencedirect.com/science/article/pii/S2214212614000155

B. Coats*, S. Acharya, “Leveraging the Cloud for Electronic Health Record Access”, American Health Information Management (AHIMA) Research Journal of Perspectives in Health Information Management, January, 2014, http://perspectives.ahima.org/leveraging-the-cloud-for-electronic-health-record-access/#.UyZIGoW2_QM

S. Acharya, S. Gorman*** (Undergraduate Student), “Reclaiming Information Privacy Online”, Colonial Academic Alliance Undergraduate Research Journal, December, 2013, http://scholarworks.gsu.edu/caaurj/vol4/iss1/4

S. Acharya, Michael Terry** (Graduate Student), and Ogbeide Derrick Oigiagbe (Undergraduate Student), “A Comprehensive Security Assessment Toolkit for HealthCare Systems"”, Colonial Academic Alliance Undergraduate Research Journal, December, 2013 http://scholarworks.gsu.edu/caaurj/vol4/iss1/6/

S. Acharya, B. Namovicz***, J. Wiseman***, “A Hybrid Root-kit for Linux Operating System”, Colonial Academic Alliance Undergraduate Research Journal, Volume 1, Issue 1, October 2010

S. Acharya, G. Joshi**, “Improved Anti-Virus Defense Via Efficient Clustering Techniques”, International Journal of Computer Science and Network Security, Vol. 10, No. 6, June 2010

S. Acharya, R. N. Mahapatra, “A Dynamic Slack Management Technique for Real-Time Distributed Embedded System”, IEEE Transactions on Computers, Vol. 57(2), 2008