UT System Cyber and Cloud Security Initiative

Organization profile

Organization profile

About the UT System Cyber and Cloud Security Initiative

The University of Texas System, in support of its member institutions, is pursuing a strategic initiative focusing on the future needs of cybersecurity organizations and workforce. The initiative is a convergence of core competencies and capabilities across the UT System's member institutions to build an ecosystem integrating areas of education and training, industry outreach, research, applied technologies, and academic activities mapped to specific economic and educational needs of Texas (public and private sectors). This initiative will be a sustainable, competitive, and transformative force with national and global impact.


Cyber and Cloud Security at UT San Antonio

In spring 2014, UT San Antonio (UTSA) was named #1 nationally for Cyber Security Programs according to a national survey of certified information technology security professionals conducted for Hewlett-Packard. To further grow these research areas, UTSA has constructed a brand new, state-of-the-art facility that will dedicate nearly 28,000 square feet of space to merge research expertise, joint resources, and equipment in an effort to enhance this portfolio at UTSA, while increasing interdisciplinary collaborations. UTSA is home to the Institute for Cyber Security (ICS), whose researchers bring exceptional expertise in cyber security models, architectures, protocols and technologies, and world-class laboratories. The Center for Infrastructure Assurance and Security (CIAS), also located at UTSA, has developed the world’s foremost center for multidisciplinary education and development of operational capabilities in the areas of infrastructure assurance and security.


In complement to the ICS and CIAS, the Center for Education and Research in Information and Infrastructure Security (CERI²S) conducts high impact research in information assurance and security, as well as educates the cybersecurity workforce within the San Antonio area and beyond.

In partnership with industry leaders, UTSA has rapidly established the largest open cloud infrastructure in academia, having recently launched the Open Cloud Institute, an initiative to develop degree programs in cloud computing and big data and foster collaboration with industry, positioning UTSA and San Antonio as world leaders in open cloud technology. By first having built a solid foundation in cyber security and then in cloud computing, UTSA has the capability to handle and process large amounts of data in a secure fashion and is now poised to launch into big data analytics, which will be the final component of UTSA’s research strength in C3A. Research in data analytics will create paradigms to identify trends and best practices and can bring enormous value to fields such as healthcare, engineering, and finance.

Fingerprint The fingerprint is based on mining the text of the scientific documents related to the associated persons. Based on that an index of weighted terms is created, which defines the key subjects of research unit

Access control Engineering & Materials Science
Model Mathematics
Robots Engineering & Materials Science
Color Engineering & Materials Science
Mobile robots Engineering & Materials Science
Robotics Engineering & Materials Science
Biometrics Engineering & Materials Science
Industry Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 1992 2018

Introducing quaternion multi-valued neural networks with numerical examples

Greenblatt, A. B. & Agaian, S. S. Jan 1 2018 In : Information Sciences. 423, p. 326-342 17 p.

Research output: Research - peer-reviewArticle

Neural Networks
Numerical Examples
Neural networks
Structure Learning
3 Citations

3-D palmprint modeling for biometric verification

Rajeev, S., Shreyas, K. K. M., Panetta, K. & Agaian, S. Jun 7 2017 2017 IEEE International Symposium on Technologies for Homeland Security, HST 2017. Institute of Electrical and Electronics Engineers Inc., 7943450

Research output: ResearchConference contribution

Palmprint recognition

ABAC with group attributes and attribute hierarchies utilizing the policy machine

Bhatt, S., Patwa, F. & Sandhu, R. Mar 24 2017 ABAC 2017 - Proceedings of the 2nd ACM Workshop on Attribute-Based Access Control, co-located with CODASPY 2017. Association for Computing Machinery, Inc, p. 17-28 12 p.

Research output: ResearchConference contribution

Access control