{"id":5,"date":"2015-02-20T10:18:58","date_gmt":"2015-02-20T15:18:58","guid":{"rendered":"https:\/\/www.bu.edu\/macs\/home\/"},"modified":"2017-05-15T10:41:16","modified_gmt":"2017-05-15T14:41:16","slug":"home","status":"publish","type":"page","link":"https:\/\/www.bu.edu\/macs\/","title":{"rendered":""},"content":{"rendered":"<p>The Modular Approach to Cloud Security (MACS) project is charged to address the grand challenges in building secure cloud services. MACS is funded\u00a0by a 5 year, $10 million Frontier grant from the National Science Foundation&#8217;s\u00a0<a href=\"http:\/\/www.nsf.gov\/funding\/pgm_summ.jsp?pims_id=504709\">Secure and Trustworthy Cyberspace<\/a> (SaTC) program.<\/p>\n<div class=\"bu-slideshow-container smaller-homepage-slideshow autoplay\" id=\"bu-slideshow-container-434\" data-slideshow-name=\"smaller-homepage-slideshow\" data-slideshow-delay=\"5000\" style=\"width: auto; \"><div class='slideshow-loader active'><div class='loader-animation'><\/div><p>loading slideshow...<\/p><\/div><div class=\"bu-slideshow-slides\"><ul class=\"bu-slideshow transition-fade\" id=\"bu-slideshow-434\"><li id=\"bu-slideshow-434_0\" class=\"slide \"><div class=\"bu-slide-container slide-caption-bottom-right\"><img src=\"\/macs\/files\/2015\/11\/small_slideshow_a.jpg\" alt=\"\" \/><\/div><\/li><li id=\"bu-slideshow-434_1\" class=\"slide \"><div class=\"bu-slide-container slide-caption-bottom-right\"><img src=\"\/macs\/files\/2015\/11\/small_slideshow_b.jpg\" alt=\"\" \/><\/div><\/li><li id=\"bu-slideshow-434_2\" class=\"slide \"><div class=\"bu-slide-container slide-caption-bottom-right\"><img src=\"\/macs\/files\/2015\/11\/small_slideshow_c.jpg\" alt=\"\" \/><\/div><\/li><li id=\"bu-slideshow-434_3\" class=\"slide \"><div class=\"bu-slide-container slide-caption-bottom-right\"><img src=\"\/macs\/files\/2015\/11\/small_slideshow_d.jpg\" alt=\"\" \/><\/div><\/li><li id=\"bu-slideshow-434_4\" class=\"slide \"><div class=\"bu-slide-container slide-caption-bottom-right\"><img src=\"\/macs\/files\/2015\/11\/small_slideshow_e.jpg\" alt=\"\" \/><\/div><\/li><li id=\"bu-slideshow-434_5\" class=\"slide \"><div class=\"bu-slide-container slide-caption-bottom-right\"><img src=\"\/macs\/files\/2015\/11\/small_slideshow_f.jpg\" alt=\"\" \/><\/div><\/li><li id=\"bu-slideshow-434_6\" class=\"slide \"><div class=\"bu-slide-container slide-caption-bottom-right\"><img src=\"\/macs\/files\/2015\/11\/small_slideshow_g.jpg\" alt=\"\" \/><\/div><\/li><li id=\"bu-slideshow-434_7\" class=\"slide \"><div class=\"bu-slide-container slide-caption-bottom-right\"><img src=\"\/macs\/files\/2015\/11\/small_slideshow_h.jpg\" alt=\"\" \/><\/div><\/li><li id=\"bu-slideshow-434_8\" class=\"slide \"><div class=\"bu-slide-container slide-caption-bottom-right\"><img src=\"\/macs\/files\/2015\/11\/small_slideshow_i.jpg\" alt=\"\" \/><\/div><\/li><li id=\"bu-slideshow-434_9\" class=\"slide \"><div class=\"bu-slide-container slide-caption-bottom-right\"><img src=\"\/macs\/files\/2015\/11\/small_slideshow_j.jpg\" alt=\"\" \/><\/div><\/li><\/ul><\/div><\/div>\n<p>The goal of the Modular Approach to Cloud Security\u00a0project is to develop techniques and tools\u00a0for building information systems with meaningful multi-layered security guarantees. Arguably, reasoning about all the security aspects of systems \u201cin one blow\u201d is not feasible. The approach we take is thus modular: We aim at systems that are built from smaller and separable functional components, where the security of each component is asserted individually, and where security of the system as a whole can be derived from the security of its components. Because this composition can be performed in multiple ways, we also aim to inform and empower users so they can personalize the security guarantees offered by the cloud to suit their objectives.<\/p>\n<p style=\"text-align: left;\">The team &#8212; made up of researchers from Boston University, Massachusetts Institute of Technology, the University of Connecticut and Northeastern University &#8212; comprises experts in all aspects of information security and cryptography.\u00a0 The research is highly collaborative and pools together key areas of expertise in order to provide overall security guarantees. A key component of the project is the <a href=\"http:\/\/info.massopencloud.org\/\">Massachusetts Open Cloud<\/a>, which provides the research team with a testbed for deploying and testing the developed mechanisms in a production cloud.<\/p>\n<p style=\"text-align: left;\">Visit the\u00a0<a href=\"https:\/\/www.bu.edu\/macs\/project-description\/\" title=\"Project Description\">MACS Project Description<\/a>\u00a0for more details.<\/p>\n<p style=\"text-align: left;\"><img loading=\"lazy\" src=\"\/macs\/files\/2015\/04\/logos_in_row1.jpg\" alt=\"logos_in_row\" class=\"max-width: 842px; aligncenter wp-image-185 size-full\" height=\"126\" width=\"842\" srcset=\"https:\/\/www.bu.edu\/macs\/files\/2015\/04\/logos_in_row1.jpg 842w, https:\/\/www.bu.edu\/macs\/files\/2015\/04\/logos_in_row1-636x95.jpg 636w\" sizes=\"(max-width: 842px) 100vw, 842px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Modular Approach to Cloud Security (MACS) project is charged to address the grand challenges in building secure cloud services. MACS is funded\u00a0by a 5 year, $10 million Frontier grant from the National Science Foundation&#8217;s\u00a0Secure and Trustworthy Cyberspace (SaTC) program. The goal of the Modular Approach to Cloud Security\u00a0project is to develop techniques and tools\u00a0for [&hellip;]<\/p>\n","protected":false},"author":7375,"featured_media":0,"parent":0,"menu_order":1,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/www.bu.edu\/macs\/wp-json\/wp\/v2\/pages\/5"}],"collection":[{"href":"https:\/\/www.bu.edu\/macs\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.bu.edu\/macs\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/macs\/wp-json\/wp\/v2\/users\/7375"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/macs\/wp-json\/wp\/v2\/comments?post=5"}],"version-history":[{"count":51,"href":"https:\/\/www.bu.edu\/macs\/wp-json\/wp\/v2\/pages\/5\/revisions"}],"predecessor-version":[{"id":711,"href":"https:\/\/www.bu.edu\/macs\/wp-json\/wp\/v2\/pages\/5\/revisions\/711"}],"wp:attachment":[{"href":"https:\/\/www.bu.edu\/macs\/wp-json\/wp\/v2\/media?parent=5"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}