Presentations
Distinguished Lecture by John Thompson
Morning Keynote Address by Ron Ritchey
Fireside Chat: Ron Ritchey, Eugene Spafford, John Thompson
Panels
Security in the Cloud
Standards
Unsecured Economies
Project Posters
- A Design for Securing Data Delivery in Mesh-Based Peer-to-Peer Streaming
- Analyzing Protection Quality of Security-Enhanced Operating Systems
- BioAPI Java Project
- Biometrics and Identity Management in Healthcare Applications
- Centralized Monitoring in Poly^2
- Compliance Auditing in Data Stream Management Systems
- Defeating Cross-Site Request Forgery Attacks with Browser-Enforced Authenticity Protection
- Evading Client Honeypots
- Filter Selection Schema for Improved Face Recognition
- Impact of Training on Biometric System and User Performance
- Improving Fingerprint Sensor Interoperability using Sensor Agnostic Image Transformation
- Indiana DOC Legacy Image Quality and Performance Assessment
- Integration of COBIT, Balanced Scorecard & SSE-CMM as a strategic Information Security Management (ISM) framework
- Integrity of Graphs Without Leaking
- Investors’ Perceptions of Information Security Incidents and Short-term Profitable Investment Opportunities
- Mandatory Access Control for Experiments with Malware
- Modeling and Integrating Background Knowledge in Data Anonymization
- Polymorphing Software by Randomizing Data Structure Layout
- Procedure Based Classification of Environments
- Provenance-Based Confidence Policy Management in Data Streams
- Removing the Blinders: Utilizing Data-Plane Information to Mitigate Adversaries in Unstructured Multicast Networks
- The Efficacy of Cross-Discipline Representations for ill-defined IAS Concepts
- The Influence of Force on Fingerprint Recognition Using Automated Data Capture
- The Poly^2 Project
- VeryIDX- A Privacy Preserving Digital Identity Management System for Mobile Devices
- Wireless Security Analysis

