The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Archive


2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Showing: 601 to 625 of 879

Affiliation shown is the affiliation at the time the talk was given.

11/17/2004
An Anonymous Fair-Exchange E-Commerce Protocol

An Anonymous Fair-Exchange E-Commerce Protocol

Indrakshi Ray - Colorado State University

11/10/2004
GTRBAC: A Generalized Temporal Role Based Access Control Model

GTRBAC: A Generalized Temporal Role Based Access Control Model

James Joshi - Pittsburgh University

11/03/2004
Towards Mining Syslog Data

Towards Mining Syslog Data

Abe Singer - University of California at San Diego

10/27/2004
Robustness testing - black-box testing for software security

Robustness testing - black-box testing for software security

Ari Takanen - Codenomicon Ltd.

10/20/2004

Effective and Efficient Intrusion Analysis

Peng Ning - NC State

10/13/2004
Information Flow Analysis in Security Enhanced Linux

Information Flow Analysis in Security Enhanced Linux

Dan Thomsen - Tresys Technology

10/06/2004

How to Forge Signatures and Be Happy About It

Giuseppe Ateniese - Johns Hopkins University

09/29/2004

Automatic Generation and Analysis of Attack Graphs

Jeannette Wing - Carnegie Mellon University

09/22/2004

Samuel D. Conte Distinguished Lecture Series

John Mitchell - Stanford University

09/15/2004
Secure Information Sharing within a Collaborative Environment

Secure Information Sharing within a Collaborative Environment

Gail-Joon Ahn - University of North Carolina at Charlotte

09/08/2004
Administrative Scope and Role-Based Administration

Administrative Scope and Role-Based Administration

Jason Crampton - Royal Holloway, University of London

09/01/2004

Privacy Technologies

Latanya Sweeney - Carnegie Mellon University

08/25/2004

Application of Thermodynamics to Computer Network Defense

Dave Ford - Naval Postgraduate School

04/21/2004

Improving audit sources by categorizing security monitoring systems

Benjamin Kuperman - PhD Candidate, Purdue University

04/14/2004

Secure Collaboration for Capacity Sharing in Logistics

Chris Clifton - Computer Science, Purdue University

04/07/2004

Security in Outsourced Databases

Gene Tsudik - UC Irvine

03/31/2004

Securing Wireless Sensor Networks

Wenliang (Kevin) Du - Syracuse University

03/24/2004

Managing Policy for Coordinated Defense

Clifford Neuman - ISI/USC

03/10/2004

Lessons from the EROS Experiment

Jonathan Shapiro - Johns Hopkins University

02/25/2004

Testing Computer Forensic Tools

James R. Lyle - National Institute of Standards and Technology

02/18/2004

Signatures, Heuristics and Behavior Blocking

Sarah Merrion - Symantec

02/11/2004

TrustBuilder: Automated Trust Negotiation in Open Systems

Kent Seamons - Brigham Young University

02/04/2004

Info Forthcoming

Prof. Steve Elliott - Purdue University

Ways to Watch

YouTube

Watch Now!

Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!