CERIAS Security Seminar Series
The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, ...
The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, information ethics, public policy for computing and security, the computing "underground," and other related topics.
Show all Visit Show Website http://www.cerias.purdue.edu/sec...Recently Aired
-
HD
Ed Lopez, "The Inertia of Productivity"
Why do we implement systems and application with poor security ...
Why do we implement systems and application with poor security characteristics? This talk looks at the evolution of network security as a consequence of productive change. Specifically, we will look at the challenges imposed by BYOD requirements (particul
-
HD
Lewis Shepherd, "Challenges for R&D in the Security Field"
Long-range research into information assurance and security has seen peaks ...
Long-range research into information assurance and security has seen peaks and valleys over the past three decades, mirroring larger trends including the explosive growth of Internet services and declining technology R&D investment trends. A gulf thre
-
HD
Scott Andersen, "The New Frontier, Welcome the Cloud Brokers"
The recent and new concept of "Cloud Brokers" and Brokerage ...
The recent and new concept of "Cloud Brokers" and Brokerage came to light with the recent release of the GSA Cloud Broker RFI. What does that mean for the cloud professionals of today (skills they need) and the cloud professionals of tomorrow (skills they
-
HD
Christine Task, "A Practical Beginners' Guide to Differential Privacy"
Differential privacy is a very powerful approach to protecting individual ...
Differential privacy is a very powerful approach to protecting individual privacy in data-mining; it's also an approach that hasn't seen much application outside academic circles. There's a reason for this: many people aren't quite certain how it works. U
-
HD
Steve Battista, "What firmware exists in your computer and how the fight for your systems will be below your operating system"
Many security professionals look to software on hardrives as the ...
Many security professionals look to software on hardrives as the source of compromise. To detect compromises, they use systems to check the hashes of all files on disk, When a machine is compromised, they wipe the hardrive, and assume that the machine in
-
HD
Traian Truta, ": K-Anonymity in Social Networks: A Clustering Approach"
The proliferation of social networks, where individuals share private information, ...
The proliferation of social networks, where individuals share private information, has caused, in the last few years, a growth in the volume of sensitive data being stored in these networks. As users subscribe to more services and connect more with their
-
HD
Nabeel Mohamed, "Privacy preserving attribute based group key management"
Group key management (GKM) is a fundamental building block in ...
Group key management (GKM) is a fundamental building block in any secure group communication applications. In fact, successful management of group keys is critical to the security of any cryptosystem. In this talk, I will first give an overview of the tra
-
HD
Randall Brooks, "Adding a Software Assurance Dimension to Supply Chain Practices"
There is a long history of supply chain management, from ...
There is a long history of supply chain management, from which many related policies, practices, processes, and enabling artifacts have been developed and employed by those business enterprises that acquire hardware and software components from a third pa
-
HD
Chenyun Dai, "Privacy-Preserving Assessment of Location Data Trustworthiness"
Assessing the trustworthiness of location data corresponding to individuals is ...
Assessing the trustworthiness of location data corresponding to individuals is essential in several applications, such as forensic science and epidemic control. To obtain accurate and trustworthy location data, analysts must often gather and correlate inf
-
HD
Nishanth Chandran, "Cryptographic protocols in the era of cloud computing"
With the advent of cloud computing, our view of cryptographic ...
With the advent of cloud computing, our view of cryptographic protocols has changed dramatically. In this talk, I will give an overview of some of the newer challenges that we face in cloud cryptography and outline some of the techniques used to solve the