CERIAS Security Seminar Series
The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, ...
The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, information ethics, public policy for computing and security, the computing "underground," and other related topics.
Show all Visit Show Website http://www.cerias.purdue.edu/sec...Recently Aired
-
HD
Richard Power, "Starting Over After A Lost Decade, In Search of a Bold New Vision for Cyber Security"
Starting Over After A Lost Decade, In Search of a ...
Starting Over After A Lost Decade, In Search of a Bold New Vision for Cyber Security: It is not enough to develop a comprehensive cyber security program that exists in isolation from the world beyond the cloud and the cables. We have to understand the pol
-
HD
Rick Aldrich, "The Importance of Law in Cybersecurity, Recent Developments and Trends in Cyberlaw"
Information security professionals increasingly need to be familiar with developments ...
Information security professionals increasingly need to be familiar with developments in cyberlaw to ensure they comport their actions with the contours of the law. Unfortunately, with technology changing far faster than the statutes, judges are increasin
-
HD
Jerry Saulman, "From Security Architecture to Implementation"
From security architecture to implementation details... what matters when a ...
From security architecture to implementation details... what matters when a customer faces a project to implement a global J2EE application? This presentation will cover some of the more pertinent concepts and details involved from real world experiences
-
HD
Peter Mork, "Database Assurance: Anomaly Detection for Relational Databases"
Behind countless complex applications lurk trusty relational databases that are ...
Behind countless complex applications lurk trusty relational databases that are responsible for managing the data that fuel these applications. For example, relational databases are used to support electronic medical health record systems, timecard report
-
HD
Ragib Hasan, "Fake Picassos, Tampered History, and Digital Forgery: Protecting the Genealogy of Bits with Secure Provenance"
As increasing amounts of valuable information are produced and persist ...
As increasing amounts of valuable information are produced and persist digitally, the ability to determine the origin of data becomes important. In science, medicine, commerce, and government, data provenance tracking is essential for rights protection, r
-
HD
Ian Goldberg, "Sphinx: A Compact and Provably Secure Mix Format"
Mix networks, originally proposed in 1981, provide a way for ...
Mix networks, originally proposed in 1981, provide a way for Internet users to send messages--such as email, blog posts, or tweets--without automatically revealing their identities or their locations. In this talk, we will describe Sphinx, a cryptographic
-
HD
Joe Judge, "Software Assurance: Motivation, Background, and Acquisition Pursuits"
This Software Assurance (SwA) is a slightly different spin on ...
This Software Assurance (SwA) is a slightly different spin on the SwA presentation and discussion. The need for measurable SwA, for the purposes of presenting and assurance "case" and explained with a practitioner's point of view. Current pursuits and pra
-
HD
John D'Arcy, "USER AWARENESS OF SECURITY COUNTERMEASURES AND ITS IMPACT ON INFORMATION SYSTEMS MISUSE: A DETERRENCE APPROACH"
Intentional insider misuse of information systems resources (i.e., IS misuse) ...
Intentional insider misuse of information systems resources (i.e., IS misuse) represents a significant threat to organizations. For example, industry statistics suggest that between 50-75% of security incidents originate from within an organization. Becau
-
HD
Johann-Christoph Freytag, "Privacy � from accessing databases to location based services"
Over the last years it has become apparent that privacy ...
Over the last years it has become apparent that privacy issues become more and more important when accessing data sources either on the Web or by database management systems. That is, the user does not only want to hide the query, but also the result of t
-
HD
Melissa Dark, "An Analysis of Data Breach Disclosure"
In the past six years, 44 states in the United ...
In the past six years, 44 states in the United States have embraced a new form of privacy and identity theft regulation � mandatory disclosure of data breach information. Information disclosure regulation is a form of legislation considered effective for