Display Shows:

My Language:

CERIAS Security Seminar Series

The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, ...

The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, information ethics, public policy for computing and security, the computing "underground," and other related topics.

Show all Visit Show Website http://www.cerias.purdue.edu/sec...

Recently Aired


  • HD

    James Joshi, "GTRBAC: A Generalized Temporal Role Based Access Control Model"

    A key issue in computer system security is to protect ...

    A key issue in computer system security is to protect information against unauthorized access. Emerging workflow-based applications in healthcare, manufacturing, the financial sector, and e-commerce inherently have complex, time-based access control requi

    Nov 10, 2004 Read more
  • HD

    Abe Singer, "Towards Mining Syslog Data"

    Syslog is the primary source of information about intrusion-related activity ...

    Syslog is the primary source of information about intrusion-related activity on a Unix system. Searching for known messages and patterns in syslog data is easy to do, and many tools are available for doing so. However, information and patterns that are no

    Nov 3, 2004 Read more
  • HD

    Ari Takanen, "Robustness testing - black-box testing for software security"

    The robustness testing method is based on systematic creation of ...

    The robustness testing method is based on systematic creation of a very large number of communication protocol messages containing exceptional data elements and structures simulating malicious attacks or corrupted traffic. The method provides a proactive

    Oct 27, 2004 Read more
  • HD

    Dan Thomsen, "Information Flow Analysis in Security Enhanced Linux"

    Most people now realize that computer security is hard. However, ...

    Most people now realize that computer security is hard. However, many people do not realize that creating a correct security policy is hard. Creating an accurate security policy is on the order of complexity of developing software in general. In particula

    Oct 13, 2004 Read more
  • HD

    Gail-Joon Ahn, "Secure Information Sharing within a Collaborative Environment"

    The Internet is uniquely and strategically positioned to address the ...

    The Internet is uniquely and strategically positioned to address the needs of a growing segment of population in a very cost-effective way. It provides tremendous connectivity and immense information sharing capability which the organizations can use for

    Sep 15, 2004 Read more
  • HD

    Jason Crampton, "Administrative Scope and Role-Based Administration"

    Role-based access control (RBAC) has received considerable attention in recent ...

    Role-based access control (RBAC) has received considerable attention in recent years, resulting in several important theoretical models and increasing use in commercial products. Nevertheless, role-based administration, the use of role-based techniques to

    Sep 8, 2004 Read more
  • HD

    Sam Wagstaff, "Cryptanalysis of Diffie-Hellman and Pohlig-Hellman"

    We describe the Diffie-Hellman key-exchange protocol and the Pohlig-Hellman cipher. ...

    We describe the Diffie-Hellman key-exchange protocol and the Pohlig-Hellman cipher. We discuss discrete logarithms and the cryptanalysis of these two systems. We also describe the Mental Poker protocol.

    Jan 23, 2002 Read more
  • HD

    Sam Wagstaff, "Information Theory"

    We discuss the history and basic facts of Information Theory ...

    We discuss the history and basic facts of Information Theory and give simple applications to cryptography and data security.

    Aug 22, 2001 Read more
  • HD

    Peter Stephenson, "Investigating Computer Security Incidents"

    The studies all say that 70% to 80% of information ...

    The studies all say that 70% to 80% of information security incidents involve "insiders". However, today, it is becoming increasingly difficult to pinpoint exactly what we mean by an insider. Complicating the issue, law enforcement is increasingly overloa

    Nov 8, 2000 Read more
  • HD

    Wenke Lee, "Developing Data Mining Techniques for Intrusion Detection: A Progress Report"

    Intrusion detection (ID) is an important component of infrastructure protection ...

    Intrusion detection (ID) is an important component of infrastructure protection mechanisms. Intrusion detection systems (IDSs) need to be accurate, adaptive, extensible, and cost-effective. These requirements are very challenging because of the complexiti

    Oct 11, 2000 Read more
Loading...