Display Shows:

My Language:

CERIAS Security Seminar Series

The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, ...

The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, information ethics, public policy for computing and security, the computing "underground," and other related topics.

Show all Visit Show Website http://www.cerias.purdue.edu/sec...

Recently Aired


  • HD

    David Carroll, "Identity Management Strategies and Integration Perspectives"

    For large government agencies and corporations there can be significant ...

    For large government agencies and corporations there can be significant value in the use of identity, access, and rights management infrastructures or IDM. The organizations investment in directory services, authorization services, rights management, and

    Apr 12, 2006 Read more
  • HD

    Dave Ford, "Chaos,Complexity, Cybernetics and Therminator:"

    In the days after Presidential Decision Directive 63 "Therminator: was ...

    In the days after Presidential Decision Directive 63 "Therminator: was born at NSA. This talk gives an overview of the applications of strategies from non-linear dynamics, complexity theory and elements from cybernetics in the context of reducing high-dim

    Apr 5, 2006 Read more
  • HD

    Minaxi Gupta, "Spoofing-resistant Packet Routing for the Internet""

    The forgery of source IP addresses, called IP spoofing, is ...

    The forgery of source IP addresses, called IP spoofing, is commonly exploited to launch damaging denial-of-service (DoS) attacks in the Internet. Currently proposed spoofing prevention approaches either focus on protecting only the target of such attacks

    Mar 29, 2006 Read more
  • HD

    Julie Earp, "Privacy Policies in Web-based Healthcare"

    The Health Insurance Portability and Accountability Act of 1996 (HIPAA) ...

    The Health Insurance Portability and Accountability Act of 1996 (HIPAA) has resulted in the presence of very descriptive privacy policies on healthcare websites. These policies are intended to notify users about the organization's privacy practices; howev

    Mar 22, 2006 Read more
  • HD

    Marina Blanton, "Dynamic and Efficient Key Management for Access Hierarchies"

    Hierarchies arise in the context of access control whenever the ...

    Hierarchies arise in the context of access control whenever the set of users can be modeled as a set of partially ordered classes (i.e., represented as a directed graph). In such systems, a user that belongs to a particular class inherits privileges of al

    Mar 8, 2006 Read more
  • HD

    Rafae Bhatti, "A Policy Engineering Framework for Federated Access Management"

    Federated systems are an emerging paradigm for information sharing and ...

    Federated systems are an emerging paradigm for information sharing and integration. Such systems require access management policies that not only protect user privacy and resource security but also allow scalable and seamless interoperation. Current solut

    Mar 1, 2006 Read more
  • HD

    Mike Burmester, "Provable security in mobile ad hoc networks"

    Mobile ad hoc networks (MANETs) are collections of wireless mobile ...

    Mobile ad hoc networks (MANETs) are collections of wireless mobile nodes with links that are made or broken in an arbitrary way. Communication is achieved via routes whose node relay packets. Several routing algorithms have been proposed in the literature

    Feb 15, 2006 Read more
  • HD

    Brian Carrier, "Categories of Digital Forensic Investigation Techniques"

    This talk examines formal concepts of digital forensic investigations. To ...

    This talk examines formal concepts of digital forensic investigations. To date, the field has had an applied focus and little theory exists to formally define analysis techniques and requirements. This work defines an extended finite state machine (FSM) m

    Feb 8, 2006 Read more
  • HD

    Abhilasha Bhargav-Spantzel, "Digital Identity Management and Theft Protection"

    Digital identity management technology is fundamental in customizing user experience, ...

    Digital identity management technology is fundamental in customizing user experience, protecting privacy, underpinning accountability and compliance in today

    Feb 1, 2006 Read more
  • HD

    Paul Thompson, "Semantic Attacks and Security"

    Attacks on computer and other networked systems can be categorized ...

    Attacks on computer and other networked systems can be categorized as physical, syntactic and semantic. Physical attacks seek to destroy hardware, while syntactic attacks, such as computer worms and viruses, target the network infrastructure. Semantic att

    Jan 25, 2006 Read more
Loading...