CERIAS - Center for Education and Research in Information Assurance and Security

Skip Navigation
CERIAS Logo
Purdue University - Discovery Park
Center for Education and Research in Information Assurance and Security

CERIAS Security Seminar Archive

2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Showing: 401 to 425 of 686
02/09/2005

Architectural Considerations for Anomaly Detection

Architectural Considerations for Anomaly Detection


Wenke Lee - Georgia Tech
(122.7MB): Video Icon MP4 Video   Watch on Youtube
02/02/2005

Obfuscated Databases: Definitions and Constructions

Obfuscated Databases: Definitions and Constructions


Vitaly Shmatikov - University of Texas at Austin
(220.4MB): Video Icon MP4 Video   Watch on Youtube
01/26/2005

Self Healing Cyber Databases Under Malicious Attacks


Peng Liu - Pennsylvania State
01/19/2005

Hidden Access Control Policies with Hidden Credentials

Hidden Access Control Policies with Hidden Credentials


Keith Frikken - Purdue University
(204.5MB): Video Icon MP4 Video   Watch on Youtube
01/12/2005

Survivable routing in wireless ad hoc networks

Survivable routing in wireless ad hoc networks


Cristina Nita-Rotaru - Purdue University
(220.5MB): Video Icon MP4 Video   Watch on Youtube
12/08/2004

Using Statistical Analysis to Locate Spam Web Pages

Using Statistical Analysis to Locate Spam Web Pages


Dennis Fetterly - Microsoft
(215.6MB): Video Icon MP4 Video   Watch on Youtube
12/01/2004

Attribute-Based Access Control

Attribute-Based Access Control


William Winsborough - George Mason University
(220.0MB): Video Icon MP4 Video   Watch on Youtube
11/17/2004

An Anonymous Fair-Exchange E-Commerce Protocol

An Anonymous Fair-Exchange E-Commerce Protocol


Indrakshi Ray - Colorado State University
(206.5MB): Video Icon MP4 Video   Watch on Youtube
11/10/2004

GTRBAC: A Generalized Temporal Role Based Access Control Model

GTRBAC: A Generalized Temporal Role Based Access Control Model


James Joshi - Pittsburgh University
(219.4MB): Video Icon MP4 Video   Watch on Youtube
11/03/2004

Towards Mining Syslog Data

Towards Mining Syslog Data


Abe Singer - University of California at San Diego
(218.9MB): Video Icon MP4 Video   Watch on Youtube
10/27/2004

Robustness testing - black-box testing for software security

Robustness testing - black-box testing for software security


Ari Takanen - Codenomicon Ltd.
(219.7MB): Video Icon MP4 Video   Watch on Youtube
10/20/2004

Effective and Efficient Intrusion Analysis


Peng Ning - NC State
10/13/2004

Information Flow Analysis in Security Enhanced Linux

Information Flow Analysis in Security Enhanced Linux


Dan Thomsen - Tresys Technology
(219.1MB): Video Icon MP4 Video   Watch on Youtube
10/06/2004

How to Forge Signatures and Be Happy About It


Giuseppe Ateniese - Johns Hopkins University
09/29/2004

Automatic Generation and Analysis of Attack Graphs


Jeannette Wing - Carnegie Mellon University
09/22/2004

Samuel D. Conte Distinguished Lecture Series


John Mitchell - Stanford University
09/15/2004

Secure Information Sharing within a Collaborative Environment

Secure Information Sharing within a Collaborative Environment


Gail-Joon Ahn - University of North Carolina at Charlotte
(212.2MB): Video Icon MP4 Video   Watch on Youtube
09/08/2004

Administrative Scope and Role-Based Administration

Administrative Scope and Role-Based Administration


Jason Crampton - Royal Holloway, University of London
(199.9MB): Video Icon MP4 Video   Watch on Youtube
09/01/2004

Privacy Technologies


Latanya Sweeney - Carnegie Mellon University
08/25/2004

Application of Thermodynamics to Computer Network Defense


Dave Ford - Naval Postgraduate School
04/21/2004

Improving audit sources by categorizing security monitoring systems


Benjamin Kuperman - PhD Candidate, Purdue University
04/14/2004

Secure Collaboration for Capacity Sharing in Logistics


Chris Clifton - Computer Science, Purdue University
04/07/2004

Security in Outsourced Databases


Gene Tsudik - UC Irvine
03/31/2004

Securing Wireless Sensor Networks


Wenliang (Kevin) Du - Syracuse University

Disclaimer

The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.