

James B.D. Joshi
James B.D. Joshi's research delves into the intricate realms of distributed and multimedia systems security, with a particular focus on distributed systems security and privacy. As a Professor at the University of Pittsburgh's School of Computing and Information, he has dedicated his academic career to exploring advanced access control mechanisms and the nuances of secure information sharing. His scholarly work has been widely recognized, with numerous publications in esteemed journals and presentations at leading conferences. Dr. Joshi's expertise extends to the evolving challenges of cybersecurity, particularly in the context of IPv6 and mobile systems, as well as systems and network survivability. His research also addresses the critical issues of trust and privacy in artificial intelligence, ensuring that these technologies are developed and deployed with robust security measures. In addition to his academic pursuits, Dr. Joshi plays a pivotal role in shaping the future of cybersecurity research and policy. He serves as a Program Director at the National Science Foundation's Secure and Trustworthy Cyberspace program, where he oversees initiatives aimed at advancing the security and resilience of cyberspace. Furthermore, his contributions as an intermittent Expert at the NSF Directorate of Technology, Innovation, and Partnership highlight his commitment to fostering innovation and collaboration in the field. Dr. Joshi's work is characterized by a deep understanding of the complexities of access control and privacy, making significant strides in developing advanced access control models that address the dynamic needs of modern computing environments. His research not only contributes to the academic community but also has practical implications for enhancing the security and privacy of information systems worldwide. Through his dedication to research and his active involvement in national cybersecurity initiatives, James B.D. Joshi continues to be a leading figure in the field, driving forward the understanding and implementation of secure and trustworthy computing systems. His contributions are instrumental in ensuring that technological advancements are accompanied by robust security frameworks, safeguarding the integrity and privacy of digital information.
Publications
, 2011-02-21
, 2012-06-20
, 2004-06-02