{"id":245918,"date":"1999-12-31T11:59:38","date_gmt":"1999-12-31T19:59:38","guid":{"rendered":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/?post_type=msr-group&#038;p=245918"},"modified":"2023-04-05T13:19:35","modified_gmt":"2023-04-05T20:19:35","slug":"constructive-security","status":"publish","type":"msr-group","link":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/group\/constructive-security\/","title":{"rendered":"Constructive Security"},"content":{"rendered":"<p style=\"text-align: left;\">The Constructive Security Group at Microsoft Research Cambridge seeks robust solutions to real-world large-scale security and privacy problems. Our research topics range from distributed access control, to traffic analysis, and to secure protocol engineering.<\/p>\n<h2 style=\"text-align: left;\"><\/h2>\n<h2 style=\"text-align: left;\">Visits and Seminars<\/h2>\n<ul style=\"text-align: left;\">\n<li>The Constructive Security group is actively engaged with security experts from both academia and industry.<\/li>\n<li>Please let us know if you are interested in a short or long term visit, e.g. as part of a business trip or a Sabbatical.<\/li>\n<li>We would be happy to host you and have you as a speaker in our security seminar.<\/li>\n<\/ul>\n\t<div data-wp-context='{\"items\":[]}' data-wp-interactive=\"msr\/accordion\">\n\t\t\t\t\t<div class=\"clearfix\">\n\t\t\t\t<div\n\t\t\t\t\tclass=\"btn-group align-items-center mb-g float-sm-right\"\n\t\t\t\t\tdata-bi-aN=\"accordion-collapse-controls\"\n\t\t\t\t>\n\t\t\t\t\t<button\n\t\t\t\t\t\tclass=\"btn btn-link m-0\"\n\t\t\t\t\t\tdata-bi-cN=\"Expand all\"\n\t\t\t\t\t\tdata-wp-bind--aria-controls=\"state.ariaControls\"\n\t\t\t\t\t\tdata-wp-bind--aria-expanded=\"state.ariaExpanded\"\n\t\t\t\t\t\tdata-wp-bind--disabled=\"state.isAllExpanded\"\n\t\t\t\t\t\tdata-wp-class--inactive=\"state.isAllExpanded\"\n\t\t\t\t\t\tdata-wp-on--click=\"actions.onExpandAll\"\n\t\t\t\t\t\ttype=\"button\"\n\t\t\t\t\t>\n\t\t\t\t\t\tExpand all\t\t\t\t\t<\/button>\n\t\t\t\t\t<span aria-hidden=\"true\"> | <\/span>\n\t\t\t\t\t<button\n\t\t\t\t\t\tclass=\"btn btn-link m-0\"\n\t\t\t\t\t\tdata-bi-cN=\"Collapse all\"\n\t\t\t\t\t\tdata-wp-bind--aria-controls=\"state.ariaControls\"\n\t\t\t\t\t\tdata-wp-bind--aria-expanded=\"state.ariaExpanded\"\n\t\t\t\t\t\tdata-wp-bind--disabled=\"state.isAllCollapsed\"\n\t\t\t\t\t\tdata-wp-class--inactive=\"state.isAllCollapsed\"\n\t\t\t\t\t\tdata-wp-on--click=\"actions.onCollapseAll\"\n\t\t\t\t\t\ttype=\"button\"\n\t\t\t\t\t>\n\t\t\t\t\t\tCollapse all\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t<ul class=\"msr-accordion\">\n\t\t\t\t\t\t\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-2\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-2\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-1\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tSeminars\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-1\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-2\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<p style=\"text-align: left;\">Unless otherwise specified, events are on Wednesday at 11am.<\/p>\n<ul>\n<li style=\"text-align: left;\">CSG Seminars (S) are conference style talks, often interrupted by discussions<\/li>\n<li style=\"text-align: left;\">CSG Lounges (L) are more informal, ranging from reading groups, travel reports to the occasional admin.While they are mostly internal, visitors are welcome.<\/li>\n<\/ul>\n<h2 style=\"text-align: left;\">Upcoming events<\/h2>\n<table style=\"width: 1200px; height: 99px;\" border=\"0\" cellspacing=\"5\" cellpadding=\"5\">\n<tbody>\n<tr>\n<td style=\"text-align: left;\"><strong>Date <\/strong><\/td>\n<td style=\"text-align: left;\"><strong>Room <\/strong><\/td>\n<td style=\"text-align: left;\"><strong>Speaker <\/strong><\/td>\n<td style=\"text-align: left;\"><strong>Title <\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 style=\"text-align: left;\"><\/h2>\n<h2 style=\"text-align: left;\">Past events<\/h2>\n<table style=\"width: 1200px; height: 849px;\" border=\"0\" cellspacing=\"5\" cellpadding=\"5\">\n<tbody>\n<tr>\n<td style=\"text-align: left;\"><strong>Date<\/strong><\/td>\n<td style=\"text-align: left;\"><strong>Room<\/strong><\/td>\n<td style=\"text-align: left;\"><strong>Speaker<\/strong><\/td>\n<td style=\"text-align: left;\"><strong>Title<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">7-Dec-2016<\/td>\n<td style=\"text-align: left;\">Violet<\/td>\n<td style=\"text-align: left;\">Nik Sultana,University Cambridge<\/td>\n<td style=\"text-align: left;\">Light at the Middle of the Tunnel: Middleboxes for Selective Disclosure of Network Monitoring to Distrusted Parties<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">23-Nov-2016<\/td>\n<td style=\"text-align: left;\">Violet<\/td>\n<td style=\"text-align: left;\">Mary Maller,PhD Scholar, UCL<\/td>\n<td style=\"text-align: left;\">Signatures of Knowledge and Minimal Simulation-Extractable SNARKs<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">22-June-2016<\/td>\n<td style=\"text-align: left;\">Violet<\/td>\n<td style=\"text-align: left;\">Ben Dowling,MSR Intern<\/td>\n<td style=\"text-align: left;\">End of internship talk: The miTLS crypto model<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">8-June-2016<\/td>\n<td style=\"text-align: left;\">Violet<\/td>\n<td style=\"text-align: left;\">Rupert Horlick,Cambridge Computer Lab<\/td>\n<td style=\"text-align: left;\">An Oblivious RAM implementation for Mirage OS<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">27-Apr.-2016<\/td>\n<td style=\"text-align: left;\">Violet<\/td>\n<td style=\"text-align: left;\">Sheharbano Khattak,Cambridge Computer Lab<\/td>\n<td style=\"text-align: left;\">Do You See What I See? Differential Treatment of Anonymous Users<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">14-Apr.-2016<\/td>\n<td style=\"text-align: left;\">Violet<\/td>\n<td style=\"text-align: left;\">Ben Dowling,Queensland University of Technology<\/td>\n<td style=\"text-align: left;\">Modern Key Exchange Security Models<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">2-Mar.-2016<\/td>\n<td style=\"text-align: left;\">Violet<\/td>\n<td style=\"text-align: left;\">Khilan Gudka, Robert N. M. Watson,Cambridge Computer Lab<\/td>\n<td style=\"text-align: left;\">Security-Oriented Analysis of Application Programs (SOAAP)<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">10-Jan.-2016<\/td>\n<td style=\"text-align: left;\">Violet<\/td>\n<td style=\"text-align: left;\">Cedric Fournet,CSG<\/td>\n<td style=\"text-align: left;\">Trip report from Real World Cryptography Workshop<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">9-Dec.-2015<\/td>\n<td style=\"text-align: left;\">Auditorium<\/td>\n<td style=\"text-align: left;\">Bjorn Tackmann,UC San Diego<\/td>\n<td style=\"text-align: left;\">A Constructive Approach to Secure-Channel Protocols<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">11-Nov.-2015<\/td>\n<td style=\"text-align: left;\">Violet<\/td>\n<td style=\"text-align: left;\">Andriana E. Gkaniatsou,University of Edinburgh<\/td>\n<td style=\"text-align: left;\">Breaking Card: Reverse-Engineering the Smart-Card Application Protocol Data Unit<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">7-Oct.-2015<\/td>\n<td style=\"text-align: left;\">Violet<\/td>\n<td style=\"text-align: left;\">Niklas Grimm,MSR Intern;Jean Karim Zinzindohou\u00e9,MSR Intern<\/td>\n<td>\n<p style=\"text-align: left;\">Embedding proofs of relational properties in F*<\/p>\n<p style=\"text-align: left;\">Low*: low-level F* programming without garbage-collection<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">9-Sep.-2015<\/td>\n<td style=\"text-align: left;\">Small Lecture Theater<\/td>\n<td style=\"text-align: left;\">Siyao Guo,Chinese University of Hong Kong<\/td>\n<td style=\"text-align: left;\">The Power of Negations in Cryptography<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">20-Aug.-2015<\/td>\n<td style=\"text-align: left;\">Violet<\/td>\n<td style=\"text-align: left;\">Esha Ghosh,MSR Intern & Brown University<\/td>\n<td style=\"text-align: left;\">Verifying Computation and Integrity of the Data in Constant time<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">22-July-2015<\/td>\n<td style=\"text-align: left;\">Small Lecture Theater<\/td>\n<td style=\"text-align: left;\">Giorgia Azzurra Marson,Technische Universit\u00e4t Darmstadt<\/td>\n<td style=\"text-align: left;\">Data Is Stream: Security of Stream-based Channels<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">17-June-2015<\/td>\n<td style=\"text-align: left;\">Violet<\/td>\n<td style=\"text-align: left;\">Esha Ghosh,MSR Intern & Brown University<\/td>\n<td style=\"text-align: left;\">Zero-knowledge authenticated data structures (ZK-ADS)<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t\n<h2 style=\"text-align: left;\">Career<\/h2>\n<ul style=\"text-align: left;\">\n<li>The Constructive Security group is always looking for exceptional researchers, research engineers, post-docs, and interns.<\/li>\n<li>See the <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/careers\/\">Careers<\/a> page for details of the application procedure.<\/li>\n<li>Please let one of us know directly if you apply. <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/people\/fournet\/\" target=\"_self\" rel=\"noopener noreferrer\">C\u00e9dric Fournet<\/a> is Head of the Constructive Security Group, and leads recruiting activities.<\/li>\n<\/ul>\n<h2 style=\"text-align: left;\"><\/h2>\n","protected":false},"excerpt":{"rendered":"<p>The Constructive Security Group at Microsoft Research Cambridge seeks robust solutions to real-world large-scale security and privacy problems. <\/p>\n","protected":false},"featured_media":0,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","msr_group_start":"","footnotes":""},"research-area":[13558,13547],"msr-group-type":[243694],"msr-locale":[268875],"msr-impact-theme":[],"class_list":["post-245918","msr-group","type-msr-group","status-publish","hentry","msr-research-area-security-privacy-cryptography","msr-research-area-systems-and-networking","msr-group-type-group","msr-locale-en_us"],"msr_group_start":"","msr_detailed_description":"","msr_further_details":"","msr_hero_images":[],"msr_research_lab":[],"related-researchers":[{"type":"user_nicename","display_name":"Antoine Delignat-Lavaud","user_id":31056,"people_section":"Group 1","alias":"antdl"},{"type":"user_nicename","display_name":"C\u00e9dric Fournet","user_id":31819,"people_section":"Group 1","alias":"fournet"},{"type":"user_nicename","display_name":"Manuel Costa","user_id":32794,"people_section":"Group 1","alias":"manuelc"},{"type":"user_nicename","display_name":"Santiago Zanella-B\u00e9guelin","user_id":33518,"people_section":"Group 1","alias":"santiago"}],"related-publications":[],"related-downloads":[],"related-videos":[],"related-projects":[],"related-events":[],"related-opportunities":[],"related-posts":[],"tab-content":[{"id":0,"name":"People and Projects","content":"<h2>People and Projects<\/h2>\r\n[accordion]\r\n\r\n[panel header=\"Cedric Fournet\"]\r\n\r\nInterests: security, programming, and distributed systems.\r\n\r\nProjects: <a href=\"http:\/\/www.msr-inria.fr\/projects\/secure-distributed-computations-and-their-proofs\/\">Secure Distributed Computations<\/a>, <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/project\/cvk-crypto-verification-kit\/\">CVK<\/a>, <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/project\/f7-refinement-types-for-f\/\">F7<\/a>, <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/project\/secpal\/\">SecPAL<\/a>\r\n\r\n[\/panel]\r\n\r\n[panel header=\"Andy Gordon\"]\r\n\r\nInterests: language-based security, security protocols, cryptographic software, Bayesian reasoning in security.\r\n\r\nProjects: <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/project\/cvk-crypto-verification-kit\/\">CVK<\/a>, <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/project\/f7-refinement-types-for-f\/\">F7<\/a>, <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/project\/csec-verifying-cryptographic-code-in-c\/\">Csec<\/a>, <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/project\/csec-verifying-cryptographic-code-in-c\/\">SecPAL<\/a>, <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/project\/infer-net-fun\/\">Infer.NET Fun<\/a>\r\n\r\n[\/panel]\r\n\r\n[panel header=\"Markulf Kohlweiss\"]\r\n\r\nInterests: cryptography, privacy enhancing protocols, zero-knowledge proofs, privacy-friendly smart metering, formal verification of cryptographic protocols.\r\n\r\nProjects: <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/project\/privacy-friendly-smart-metering\/\">Privacy-Friendly Smart Metering<\/a>, <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/project\/secpal\/\">SecPAL<\/a>, <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/project\/f7-refinement-types-for-f\/\">F7<\/a>\r\n\r\n[\/panel]\r\n\r\n[panel header=\"Santiago Zanella-B\u00e9guelin\"]\r\n\r\nInterests: cryptography, differential privacy, language-based security, formal verification of cryptographic systems, interactive and automated theorem proving.\r\n\r\nProjects: <a href=\"http:\/\/certicrypt.gforge.inria.fr\/\">EasyCrypt and CertiCrypt<\/a>\r\n\r\n[\/panel]\r\n\r\n[panel header=\"Miguel Castro\"]\r\n\r\nInterests: distributed systems, networking, and security.\r\n\r\n[\/panel]\r\n\r\n[panel header=\"Manuel Costa\"]\r\n\r\nInterests: I am interested in scalable and reliable systems and networks.\r\n\r\n[\/panel]\r\n\r\n[panel header=\"Olya Ohrimenko\"]\r\n\r\nInterests: I am interested in security and data privacy in cloud computing. I am currently working on privacy-preserving access to remote data storage, verification of outsourced computation and data integrity protocols.\r\n\r\nProjects: <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/project\/trusted-cloud\/\" target=\"_blank\" rel=\"noopener\">Trusted Cloud<\/a>\r\n\r\n[\/panel]\r\n\r\n[panel header=\"Antoine Delignat-Lavaud\"]\r\n\r\nInterests: I am interested in certificates, transport layer security, programming securely with cryptography.\r\n\r\n[\/panel]\r\n\r\n[panel header=\"Alumni\"]\r\n\r\n<b>Mo Becker<\/b>\r\n\r\n<img class=\"size-full wp-image-257205 alignleft\" src=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/1999\/12\/moritzb.png\" alt=\"moritzb\" width=\"72\" height=\"72\" \/>\r\n\r\n<em>Interests:<\/em> theory and applications of policy languages and rule-based systems.\r\n\r\n<em>Projects:<\/em> Policy Language Research, SecPAL\r\n\r\n<b>Michael Roe<\/b>\r\n\r\n<img class=\"alignnone size-full wp-image-257208 alignleft\" src=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/1999\/12\/mroe.png\" alt=\"mroe\" width=\"72\" height=\"72\" \/>\r\n\r\n<em>Interests:<\/em> designing secure Internet protocols.\r\n\r\n<em>Projects:<\/em> Secure Internet protocols\r\n\r\n<b>S\u00f6ren Preibusch<\/b>\r\n\r\n<img class=\"size-full wp-image-257211 alignleft\" src=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/1999\/12\/spr.png\" alt=\"spr\" width=\"72\" height=\"72\" \/>\r\n\r\n<em>Interests:<\/em> Security, privacy and economics \/ social networking.\r\n\r\n<em>Website:<\/em> <a href=\"http:\/\/preibusch.de\/\">http:\/\/preibusch.de\/<\/a>\r\n\r\n<b>George Danezis<\/b>\r\n\r\n<img class=\"size-full wp-image-257202 alignleft\" src=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/1999\/12\/gdane.png\" alt=\"gdane\" width=\"72\" height=\"72\" \/>\r\n\r\n<em>Interests:<\/em> computer security, privacy, and in particular anonymous communications, traffic analysis, peer-to-peer security, advanced inference for security.\r\n\r\n<em>Projects:<\/em> Privacy and Anonymity, Privacy-Friendly Smart Metering\r\n\r\n<b>Christina Brzuska<\/b>\r\n\r\n<img class=\"size-full wp-image-257199 alignleft\" src=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/1999\/12\/chbrzusk.png\" alt=\"chbrzusk\" width=\"72\" height=\"72\" \/>\r\n\r\n<em>Interests:<\/em> My research interests are theoretical and practical cryptography.\r\n\r\n..\r\n\r\n&nbsp;\r\n\r\n[\/panel]\r\n\r\n[\/accordion]"},{"id":1,"name":"Security at MSR","content":"<h2>Security at MSR<\/h2>\r\nSome related groups include:\r\n<ul>\r\n \t<li>MSR India <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/group\/cryptography-security-and-applied-mathematics\/\">Cryptography, Security, and Applied Mathematics<\/a><\/li>\r\n \t<li>MSR Redmond <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/group\/cryptography-research\/\">Cryptography<\/a><\/li>\r\n \t<li>MSR Redmond <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/group\/security-and-privacy-research\/\">Security and Privacy<\/a><\/li>\r\n \t<li>MSR Redmond <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/group\/security-and-cryptography\/\">Security and Cryptography<\/a><\/li>\r\n<\/ul>\r\n<h2>Security at Microsoft<\/h2>\r\n<ul>\r\n \t<li>For information on trustworthy computing, see this <a href=\"http:\/\/newed.any0.dpdns.org\/about\/twc\/en\/us\/default.aspx\">Overview<\/a>.<\/li>\r\n \t<li>For product security and updates, see the <a href=\"http:\/\/newed.any0.dpdns.org\/security\/\">Safety &amp; Security Centre<\/a>.<\/li>\r\n \t<li>To report a product vulnerability, visit the <a href=\"http:\/\/newed.any0.dpdns.org\/security\/msrc\/\">Microsoft Security Response Center<\/a>.<\/li>\r\n<\/ul>\r\n<h2>Security in Cambridge Area<\/h2>\r\n<ul>\r\n \t<li>Cambridge Computer Lab Friday <a href=\"http:\/\/www.cl.cam.ac.uk\/research\/security\/meetings\/\">meetings<\/a> and Tuesday <a href=\"http:\/\/www.cl.cam.ac.uk\/research\/security\/seminars\/\" target=\"_self\">seminars<\/a><\/li>\r\n \t<li>UCL security <a href=\"http:\/\/sec.cs.ucl.ac.uk\/ace_csr\/ace_seminars\/\" target=\"_self\">seminars<\/a> in London<\/li>\r\n<\/ul>"}],"msr_impact_theme":[],"_links":{"self":[{"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-group\/245918","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-group"}],"about":[{"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-group"}],"version-history":[{"count":4,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-group\/245918\/revisions"}],"predecessor-version":[{"id":575685,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-group\/245918\/revisions\/575685"}],"wp:attachment":[{"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/media?parent=245918"}],"wp:term":[{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=245918"},{"taxonomy":"msr-group-type","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-group-type?post=245918"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=245918"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=245918"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}