The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Archive


2026 | 2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Affiliation shown is the affiliation at the time the talk was given.

Episode #248
01/14/2004

Privacy Preserving Data Mining on Vertically Partitioned Data

Jaideep Vaidya - Purdue University

Episode #249
01/21/2004

Enabling Effective Trust Judgments

Sean Smith - Dartmouth College

Episode #250
01/28/2004

Proactive Protection Against DDoS and Worm Attacks

Kihong Park - Computer Science, Purdue University

Episode #251
02/04/2004

Info Forthcoming

Prof. Steve Elliott - Purdue University

Episode #252
02/11/2004

TrustBuilder: Automated Trust Negotiation in Open Systems

Kent Seamons - Brigham Young University

Episode #253
02/18/2004

Signatures, Heuristics and Behavior Blocking

Sarah Merrion - Symantec

Episode #254
02/25/2004

Testing Computer Forensic Tools

James R. Lyle - National Institute of Standards and Technology

Episode #255
03/03/2004

Capabilities and Trends in Security Information Management Systems

Carson Zimmerman - MITRE

Episode #256
03/10/2004

Lessons from the EROS Experiment

Jonathan Shapiro - Johns Hopkins University

Episode #257
03/24/2004

Managing Policy for Coordinated Defense

Clifford Neuman - ISI/USC

Episode #258
03/31/2004

Securing Wireless Sensor Networks

Wenliang (Kevin) Du - Syracuse University

Episode #259
04/07/2004

Security in Outsourced Databases

Gene Tsudik - UC Irvine

Episode #260
04/14/2004

Secure Collaboration for Capacity Sharing in Logistics

Chris Clifton - Computer Science, Purdue University

Episode #261
04/21/2004

Improving audit sources by categorizing security monitoring systems

Benjamin Kuperman - PhD Candidate, Purdue University

Episode #262
04/28/2004

Retrofitting Security to Internet Infrastructure Protocols

Russ Mundy - Sparta

Episode #263
08/25/2004
Application of Thermodynamics to Computer Network Defense

Application of Thermodynamics to Computer Network Defense

Dave Ford - Naval Postgraduate School

Episode #264
09/01/2004

Privacy Technologies

Latanya Sweeney - Carnegie Mellon University

Episode #265
09/08/2004
Administrative Scope and Role-Based Administration

Administrative Scope and Role-Based Administration

Jason Crampton - Royal Holloway, University of London

Episode #266
09/15/2004
Secure Information Sharing within a Collaborative Environment

Secure Information Sharing within a Collaborative Environment

Gail-Joon Ahn - University of North Carolina at Charlotte

Episode #267
09/22/2004

Samuel D. Conte Distinguished Lecture Series

John Mitchell - Stanford University

Episode #268
09/29/2004

Automatic Generation and Analysis of Attack Graphs

Jeannette Wing - Carnegie Mellon University

Episode #269
10/06/2004

How to Forge Signatures and Be Happy About It

Giuseppe Ateniese - Johns Hopkins University

Episode #270
10/13/2004
Information Flow Analysis in Security Enhanced Linux

Information Flow Analysis in Security Enhanced Linux

Dan Thomsen - Tresys Technology

Episode #271
10/20/2004

Effective and Efficient Intrusion Analysis

Peng Ning - NC State

Episode #272
10/27/2004
Robustness testing - black-box testing for software security

Robustness testing - black-box testing for software security

Ari Takanen - Codenomicon Ltd.

Episode #273
11/03/2004
Towards Mining Syslog Data

Towards Mining Syslog Data

Abe Singer - University of California at San Diego

Episode #274
11/10/2004
GTRBAC: A Generalized Temporal Role Based Access Control Model

GTRBAC: A Generalized Temporal Role Based Access Control Model

James Joshi - Pittsburgh University

Episode #275
11/17/2004
An Anonymous Fair-Exchange E-Commerce Protocol

An Anonymous Fair-Exchange E-Commerce Protocol

Indrakshi Ray - Colorado State University

Episode #276
12/01/2004
Attribute-Based Access Control

Attribute-Based Access Control

William Winsborough - George Mason University

Episode #277
12/08/2004
Using Statistical Analysis to Locate Spam Web Pages

Using Statistical Analysis to Locate Spam Web Pages

Dennis Fetterly - Microsoft

Ways to Watch

YouTube

Watch Now!

Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!