CERIAS - Center for Education and Research in Information Assurance and Security

Skip Navigation
CERIAS Logo
Purdue University - Discovery Park
Center for Education and Research in Information Assurance and Security

CERIAS Security Seminar Archive

2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

01/14/2004

Privacy Preserving Data Mining on Vertically Partitioned Data


Jaideep Vaidya - Purdue University
01/21/2004

Enabling Effective Trust Judgments


Sean Smith - Dartmouth College
01/28/2004

Proactive Protection Against DDoS and Worm Attacks


Kihong Park - Computer Science, Purdue University
02/04/2004

Info Forthcoming


Prof. Steve Elliott - Purdue University
02/11/2004

TrustBuilder: Automated Trust Negotiation in Open Systems


Kent Seamons - Brigham Young University
02/18/2004

Signatures, Heuristics and Behavior Blocking


Sarah Merrion - Symantec
02/25/2004

Testing Computer Forensic Tools


James R. Lyle - National Institute of Standards and Technology
03/10/2004

Lessons from the EROS Experiment


Jonathan Shapiro - Johns Hopkins University
03/24/2004

Managing Policy for Coordinated Defense


Clifford Neuman - ISI/USC
03/31/2004

Securing Wireless Sensor Networks


Wenliang (Kevin) Du - Syracuse University
04/07/2004

Security in Outsourced Databases


Gene Tsudik - UC Irvine
04/14/2004

Secure Collaboration for Capacity Sharing in Logistics


Chris Clifton - Computer Science, Purdue University
04/21/2004

Improving audit sources by categorizing security monitoring systems


Benjamin Kuperman - PhD Candidate, Purdue University
08/25/2004

Application of Thermodynamics to Computer Network Defense


Dave Ford - Naval Postgraduate School
09/01/2004

Privacy Technologies


Latanya Sweeney - Carnegie Mellon University
09/08/2004

Administrative Scope and Role-Based Administration

Administrative Scope and Role-Based Administration


Jason Crampton - Royal Holloway, University of London
(199.9MB): Video Icon MP4 Video   Watch on Youtube
09/15/2004

Secure Information Sharing within a Collaborative Environment

Secure Information Sharing within a Collaborative Environment


Gail-Joon Ahn - University of North Carolina at Charlotte
(212.2MB): Video Icon MP4 Video   Watch on Youtube
09/22/2004

Samuel D. Conte Distinguished Lecture Series


John Mitchell - Stanford University
09/29/2004

Automatic Generation and Analysis of Attack Graphs


Jeannette Wing - Carnegie Mellon University
10/06/2004

How to Forge Signatures and Be Happy About It


Giuseppe Ateniese - Johns Hopkins University
10/13/2004

Information Flow Analysis in Security Enhanced Linux

Information Flow Analysis in Security Enhanced Linux


Dan Thomsen - Tresys Technology
(219.1MB): Video Icon MP4 Video   Watch on Youtube
10/20/2004

Effective and Efficient Intrusion Analysis


Peng Ning - NC State
10/27/2004

Robustness testing - black-box testing for software security

Robustness testing - black-box testing for software security


Ari Takanen - Codenomicon Ltd.
(219.7MB): Video Icon MP4 Video   Watch on Youtube
11/03/2004

Towards Mining Syslog Data

Towards Mining Syslog Data


Abe Singer - University of California at San Diego
(218.9MB): Video Icon MP4 Video   Watch on Youtube
11/10/2004

GTRBAC: A Generalized Temporal Role Based Access Control Model

GTRBAC: A Generalized Temporal Role Based Access Control Model


James Joshi - Pittsburgh University
(219.4MB): Video Icon MP4 Video   Watch on Youtube
11/17/2004

An Anonymous Fair-Exchange E-Commerce Protocol

An Anonymous Fair-Exchange E-Commerce Protocol


Indrakshi Ray - Colorado State University
(206.5MB): Video Icon MP4 Video   Watch on Youtube
12/01/2004

Attribute-Based Access Control

Attribute-Based Access Control


William Winsborough - George Mason University
(220.0MB): Video Icon MP4 Video   Watch on Youtube
12/08/2004

Using Statistical Analysis to Locate Spam Web Pages

Using Statistical Analysis to Locate Spam Web Pages


Dennis Fetterly - Microsoft
(215.6MB): Video Icon MP4 Video   Watch on Youtube

Disclaimer

The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.