The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Reports and Papers Archive


Browse All Papers »       Submit A Paper »

The Kinetics of Computer Virus Replication

Peter S. Tippett
Added 2002-07-26

TIS/PEM Installation Guide

Trusted Information Systems, Incorporated
Added 2002-07-26

TIS/PEM User\'s Guide

Trusted Information Systems, Incorporated
Added 2002-07-26

A Summary of the ACM/IEEE-CS Joint Curriculum Task Force Report

Allen B. Tucker, Bruce E. Barnes, Robert M. Aiken, Keith Barker, Kim B. Bruce, J. Thomas Cain, Susan E. Conry, Gerald L. Engel, Richard G. Epstein, Doris K. Lidtke, Michael C. Mulder, Jean B. Rogers, Eugene H. Spafford, A. Joe Turner
Added 2002-07-26


Usenix Association Bylaws

Usenix Association
Added 2002-07-26

Covert Distributed Processing with Computer viruses

Steve R. White
Added 2002-07-26

Doing Intrusion Detection Using Embedded Sensors

Diego Zamboni
Added 2002-07-26

Security Assessment of IP-based Networks: A Holistic Approach

CERIAS TR 1999-02
Mahesh V. Tripunitara,Eugene H. Spafford
Download: PDF
Added 2002-07-26

Security Policy Communication in a Distributed Network Element

CERIAS TR 99-01
Mahesh V. Tripunitara, Eugene H. Spafford
Download: PDF

This paper discusses the distributed network element concept as it pertains to the communication of security policies.  In the context of this paper, a security policy specifies access control rules on network traffic.  We introduce the problem and give a software architecture to solve it.  The solution has four components that form the distributed network element: the controler, adaptor, driver and network element.  We also discuss the application of the solution to two cases: one in which the network element is an ATM switch and the other in which the network element is an IP switch.

Added 2002-07-26

Issues in the Incorporation of Security Services into a Protocol Reference Model

COAST TR 98-03
Mahesh V. Tripunitara, E. H. Spafford
Download: PDF
Added 2002-07-26

The Compression Functions of SHA, MD2, MD4 and MD5 are not Affine

COAST TR 98-01
Mahesh V. Tripunitara, Samuel Wagstaff
Download: PDF
Added 2002-07-26

21st Century InfoSec Management and Beyond

Phil Venables

The world has changes and continues to change at an exponential rate. THis is having a major impact on the effective means to implement information security.  We have to look at some basic often highly regarded principles used successsfully and unsuccessfully in excuting or profession - and be prepared to throw them away.  Ranging from organisation, risk analysis, policy, technology through to the wider issues effecting security, this paper looks at a likely future and presents some of the key changes we need to undertake to ensure security functions at the heart of our businesses and affliliations.  THe conclusion is that is we don\‘t adapt we, as a profession, will be displaced by the correct action from our businesses

Added 2002-07-26


Software Forensics: Can We Track Code to its Authors?

E. H. Spafford, S. A. Weeber
Download: PDF
Added 2002-07-26