Archive

2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

01/14/2004

Privacy Preserving Data Mining on Vertically Partitioned Data


Jaideep Vaidya - Purdue University
01/21/2004

Enabling Effective Trust Judgments


Sean Smith - Dartmouth College
01/28/2004

Proactive Protection Against DDoS and Worm Attacks


Kihong Park - Computer Science, Purdue University
02/04/2004

Info Forthcoming


Prof. Steve Elliott - Purdue University
02/11/2004

TrustBuilder: Automated Trust Negotiation in Open Systems


Kent Seamons - Brigham Young University
02/18/2004

Signatures, Heuristics and Behavior Blocking


Sarah Merrion - Symantec
02/25/2004

Testing Computer Forensic Tools


James R. Lyle - National Institute of Standards and Technology
03/10/2004

Lessons from the EROS Experiment


Jonathan Shapiro - Johns Hopkins University
03/24/2004

Managing Policy for Coordinated Defense


Clifford Neuman - ISI/USC
03/31/2004

Securing Wireless Sensor Networks


Wenliang (Kevin) Du - Syracuse University
04/07/2004

Security in Outsourced Databases


Gene Tsudik - UC Irvine
04/14/2004

Secure Collaboration for Capacity Sharing in Logistics


Chris Clifton - Computer Science, Purdue University
04/21/2004

Improving audit sources by categorizing security monitoring systems


Benjamin Kuperman - PhD Candidate, Purdue University
08/25/2004

Application of Thermodynamics to Computer Network Defense


Dave Ford - Naval Postgraduate School
09/01/2004

Privacy Technologies


Latanya Sweeney - Carnegie Mellon University
09/08/2004

Administrative Scope and Role-Based Administration

Administrative Scope and Role-Based Administration


Jason Crampton - Royal Holloway, University of London
(199.9MB): Video Icon MP4 Video   Watch on Youtube
09/15/2004

Secure Information Sharing within a Collaborative Environment

Secure Information Sharing within a Collaborative Environment


Gail-Joon Ahn - University of North Carolina at Charlotte
(212.2MB): Video Icon MP4 Video   Watch on Youtube
09/22/2004

Samuel D. Conte Distinguished Lecture Series


John Mitchell - Stanford University
09/29/2004

Automatic Generation and Analysis of Attack Graphs


Jeannette Wing - Carnegie Mellon University
10/06/2004

How to Forge Signatures and Be Happy About It


Giuseppe Ateniese - Johns Hopkins University
10/13/2004

Information Flow Analysis in Security Enhanced Linux

Information Flow Analysis in Security Enhanced Linux


Dan Thomsen - Tresys Technology
(219.1MB): Video Icon MP4 Video   Watch on Youtube
10/20/2004

Effective and Efficient Intrusion Analysis


Peng Ning - NC State
10/27/2004

Robustness testing - black-box testing for software security

Robustness testing - black-box testing for software security


Ari Takanen - Codenomicon Ltd.
(219.7MB): Video Icon MP4 Video   Watch on Youtube
11/03/2004

Towards Mining Syslog Data

Towards Mining Syslog Data


Abe Singer - University of California at San Diego
(218.9MB): Video Icon MP4 Video   Watch on Youtube
11/10/2004

GTRBAC: A Generalized Temporal Role Based Access Control Model

GTRBAC: A Generalized Temporal Role Based Access Control Model


James Joshi - Pittsburgh University
(219.4MB): Video Icon MP4 Video   Watch on Youtube
11/17/2004

An Anonymous Fair-Exchange E-Commerce Protocol

An Anonymous Fair-Exchange E-Commerce Protocol


Indrakshi Ray - Colorado State University
(206.5MB): Video Icon MP4 Video   Watch on Youtube
12/01/2004

Attribute-Based Access Control

Attribute-Based Access Control


William Winsborough - George Mason University
(220.0MB): Video Icon MP4 Video   Watch on Youtube
12/08/2004

Using Statistical Analysis to Locate Spam Web Pages

Using Statistical Analysis to Locate Spam Web Pages


Dennis Fetterly - Microsoft
(215.6MB): Video Icon MP4 Video   Watch on Youtube

Coming Up!

Our annual security symposium will take place on April 7 & 8, 2020.
Purdue University, West Lafayette, IN

More Information