CERIAS Security Seminar Series
The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, ...
The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, information ethics, public policy for computing and security, the computing "underground," and other related topics.
Show all Visit Show Website http://www.cerias.purdue.edu/sec...Recently Aired
-
HD
Yvo Desmedt, "60 years of scientific research in cryptography: a reflection"
Shannon started the unclassified scientific research in cryptography with his ...
Shannon started the unclassified scientific research in cryptography with his October 1949 paper. First we briefly survey the scientific research in cryptography since then. We discuss the strengths and weaknesses of this research, attempting to present a
-
HD
David Bell, "Everything I Needed to Know about Security, I Learned in 1974"
The security field is an excellent illustration of the maxim ...
The security field is an excellent illustration of the maxim that ``the more things change, the more they stay the same.'' Thus while technical details change, underlying security principles remain remarkably constant. Dr. Bell's talk ``Everything I Neede
-
HD
David Zage, "A Platform for Creating Efficient, Robust, and Resilient Peer-to-Peer Systems"
The rapid growth of communication environments such as the Internet ...
The rapid growth of communication environments such as the Internet has spurred the development of a wide range of systems and applications based on peer-to-peer ideologies. As these applications continue to evolve, there is an increasing effort towards i
-
HD
Pascal Meunier, "Making of the CWE Top-25, 2010 Edition"
For the second time, MITRE's Common Weakness Enumeration project has ...
For the second time, MITRE's Common Weakness Enumeration project has released a Top-25 list. However, this year's is a much more sophisticated document, created using a systematic and more rigorous approach. It contains several sections and tables as well
-
HD
Wonjun Lee, "Detection and protection from denial of service attacks in grids by accountability agents"
By exploiting existing vulnerabilities, malicious parties can take advantage of ...
By exploiting existing vulnerabilities, malicious parties can take advantage of resources made available by grid systems to attack mission critical websites or the grid itself. In this paper, we present two approaches for protecting against attacks aiming
-
HD
Kevin Hoffman, "Ribbons, A Partially-Shared Memory Programming Model"
We present ribbons, a shared memory programming model that allows ...
We present ribbons, a shared memory programming model that allows for more implicit sharing of memory than processes but is more restrictive than threads. Ribbons structure the heap into protection domains. Privileges between these protection domains are
-
HD
Hyo-Sang Lim, "Provenance-based Data Trustworthiness Assessment in Data Streams"
This talk presents a systematic approach for estimating the trustworthiness ...
This talk presents a systematic approach for estimating the trustworthiness of data items in data stream environments (such as sensor networks). The approach uses the data item provenance as well as their values. To obtain trust scores, the approach explo
-
HD
Marcus Rogers, "Dissecting Digital Data: Context & Meaning through Analytics"
This talk will look at how analytics can be used ...
This talk will look at how analytics can be used to increase our understanding of what digital evidence actually means. The real value of evidence is often related to the context and meaning of the data ; not just on its mere existence. The talk will exam
-
HD
Greg Stephens, "Detecting Insider Theft of Trade Secrets"
Trusted insiders who misuse their privileges to gather and steal ...
Trusted insiders who misuse their privileges to gather and steal sensitive information represent a potent threat to businesses. Applying access controls to protect sensitive information can reduce the threat but has significant limitations. Even if access
-
HD
Stephen Elliott, "Applications of biometric technologies"
In today's society, biometric technologies are being used in a ...
In today's society, biometric technologies are being used in a number of different applications. This discussion will introduce the concept of biometric technologies, and outline various challenges and solutions that are being undertaken in the biometrics