Display Shows:

My Language:

CERIAS Security Seminar Series

The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, ...

The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, information ethics, public policy for computing and security, the computing "underground," and other related topics.

Show all Visit Show Website http://www.cerias.purdue.edu/sec...

Recently Aired


  • HD

    Peter Bajcsy, "Toward Hazard Aware Spaces: Knowing Where, When and What Hazards Occur"

    While considering all existing hazards for humans due to (a) ...

    While considering all existing hazards for humans due to (a) natural disastrous events, (b) failures of human hazard attention or (c) intentional harmful behaviors of humans, we address the problem of building hazard aware spaces (HAS) to alert innocent p

    Sep 14, 2005 Read more
  • HD

    Ed Finkler, "Real World Web Application Security"

    This talk deals with practical issues of web application security, ...

    This talk deals with practical issues of web application security, with an emphasis on open-source web service tools such as Apache, PHP, and MySQL. Recent exploits in widely-used open source web applications such as phpBB and Wordpress underline the need

    Sep 7, 2005 Read more
  • HD

    Himanshu Khurana, "Minimizing Trust Liabilities in Secure Group Messaging Infrastructures"

    Large-scale collaborative applications are characterized by a large number of ...

    Large-scale collaborative applications are characterized by a large number of users and other processing end entities that are distributed over geographically disparate locations. Therefore, these applications use messaging infrastructures that scale to t

    Aug 31, 2005 Read more
  • HD

    Stephen Elliott, "An Introduction to Biometric Technologies"

    This lecture provides an introduction to biometric technologies. Various technologies ...

    This lecture provides an introduction to biometric technologies. Various technologies will be examined, including iris, face, voice, dynamic signature, fingerprint, and keystroke dynamics. An overview of assessing performance, discussing implementations,

    Aug 24, 2005 Read more
  • HD

    Sheng Zhong, "PrivacyEnhancing k-Anonymization of Customer Data"

    In order to protect individuals' privacy, the technique of k-anonymization ...

    In order to protect individuals' privacy, the technique of k-anonymization has been proposed to de-associate sensitive attributes from the corresponding identifiers. In this work, we provide privacy-enhancing methods for creating k-anonymous tables in a d

    Apr 27, 2005 Read more
  • HD

    Marianne Winslett, "Traust and PeerTrust2: Applying Trust Negotiation to Real Systems"

    Automated trust negotiation is an approach to authorization for open ...

    Automated trust negotiation is an approach to authorization for open systems, i.e., systems where resources are shared across organizational boundaries. Automated trust negotiation enables open computing by assigning an access control policy to each resou

    Apr 20, 2005 Read more
  • HD

    Mohamed Shehab, "Watermarking Relational Databases"

    Proving ownership rights on outsourced relational databases is a crucial ...

    Proving ownership rights on outsourced relational databases is a crucial issue in today internet-based application environment and in many content distribution applications. In this talk, we will present mechanisms for proof of ownership based on the secu

    Apr 13, 2005 Read more
  • HD

    Brian Carrier, "Defining a Digital Forensic Investigation"

    Digital investigations have occurred in some form or another for ...

    Digital investigations have occurred in some form or another for many years, yet there is no scientific model of the process. After all, there are multiple ways and sequences in which evidence may be found. An investigator does not necessarily need a mode

    Apr 6, 2005 Read more
  • HD

    Helen J. Wang, "Vulnerability-Driven Network Filters for Preventing Known Vulnerability Attacks"

    Software patching has not been an effective first-line defense preventing ...

    Software patching has not been an effective first-line defense preventing large-scale worm attacks, even when patches had long been available for their corresponding vulnerabilities. Generally, people have been reluctant to patch their systems immediately

    Mar 30, 2005 Read more
  • HD

    Dr. Kate Cherry and Dr. Wendy Hamilton, "Lockheed Martin"

    Lockheed Martin realizes that their newly hired college graduates are ...

    Lockheed Martin realizes that their newly hired college graduates are an investment in Lockheed Martin's future. As a result the Company looks out for their new college hires. Dr Cherry will talk about several programs dedicated to enhancing the work expe

    Mar 23, 2005 Read more
Loading...