CERIAS Security Seminar Series
The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, ...
The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, information ethics, public policy for computing and security, the computing "underground," and other related topics.
Show all Visit Show Website http://www.cerias.purdue.edu/sec...Recently Aired
-
HD
Eugene Spafford, ""Thinking Outside the Box""
-
HD
Kelly Caine, " Human Factors Approaches to Preserving Privacy"
Threats to privacy are not only due to traditional computer ...
Threats to privacy are not only due to traditional computer security issues; human factors issues such as unintentional disclosure of information also have an impact on privacy preservation. In this talk I will discuss two examinations of psychological as
-
HD
Andrew Scholnick, "Cyber Security Trends and Disruptors"
The Director of the VeriSign iDefense Applied Vulnerability Research Labs ...
The Director of the VeriSign iDefense Applied Vulnerability Research Labs discusses current cyber security trends identified in 2008 and manifested in 2009 from Cyber Crime, Cyber War, Cyber Espionage and Cyber Terrorism. He will then look over the horizo
-
HD
Gerome Miklau, "Safely Analyzing Sensitive Network Data"
Social and communication networks are formed by entities (such as ...
Social and communication networks are formed by entities (such as individuals or computer hosts) and their connections (which may be contacts, relationships, or flows of information). Such networks are analyzed to understand the influence of individuals i
-
HD
Leszek Lilien, "Some Thoughts on the Pervasive Trust Foundation for the Future Internet Architecture. A position presentation."
We start with presenting motivation and goals for the Future ...
We start with presenting motivation and goals for the Future Internet, and reviewing basics of trust in computing. The Pervasive Trust Foundation (PTF) for the Future Internet is proposed next. This includes presenting motivation for trust foundation for
-
HD
Zahid Pervaiz, "Multi-Policy Access Control for Healthcare using Policy Machine"
Access control policies in healthcare domain define permissions for users ...
Access control policies in healthcare domain define permissions for users to access different medical records. A Role Based Access Control (RBAC) mechanism allows management of privileges to medical records for users when they assume certain roles thus mi
-
HD
Andre Koenig, "Security in Infrastructureless and Decentralized Communication Networks - Possibilities, Results, and Evaluation Challenges"
Infrastructureless and decentralized communication substrates such as mobile ad hoc ...
Infrastructureless and decentralized communication substrates such as mobile ad hoc networks and peer-to-peer systems enable setting up communication services beyond borders of contemporary wired or cellular client/server systems. Yet, due to their specif
-
HD
Juhee Kwon, "Information Security Management and IT Executives in a Top Management Team"
As information assets have become a critical factor for enterprises ...
As information assets have become a critical factor for enterprises to stay competitive, there is an increasing awareness of information security management. However, they are easily overlooked by those who focus only on the IT side, failing to see that h
-
HD
Raquel Hill, "PlugNPlay Trust for Embedded Communication Systems"
Given the proliferation of malware, the integrity of embedded communication ...
Given the proliferation of malware, the integrity of embedded communication systems is becoming a growing concern. Recent compromises to systems such as ATMs and network switches and routers provide evidence of the potential security problems of embedded
-
HD
Gary McGraw, "The Building Security In Maturity Model (BSIMM)"
As a discipline, software security has made great progress over ...
As a discipline, software security has made great progress over the last decade. There are now at least 46 large scale software security initiatives underway in enterprises including global financial services firms, independent software vendors, defense