The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Reports and Papers Archive


Browse All Papers »       Submit A Paper »

NEATO User's Guide

S.C. North
Added 2002-07-26

Editing Graphs with dotty

E. Koutsofios,S.C. North
Added 2002-07-26

Editing Pictures with lefty

E. Koutsofios
Added 2002-07-26



Reinforcement Learning

Added 2002-07-26

XGobi: Interactive Dynamic Data Visualization in the X Window System

D.F. Swayne,D. Cook,A. Buja
Added 2002-07-26

Designing Secure Software

P. Galvin

This month Peter turns a jaundiced eye towars the sorry state of software development. Specifically what are the flaws that cause the industry to turn out program after program with security holes. What are Companies like Sun doing to correct the problem? What should they be doing? The answer: Peter’s own Software Development Security Design Methodology.

Added 2002-07-26

UNIX Computer Security Checklist

Australian Computer Emergency Response Team
Added 2002-07-26

Aspect Oriented Programming

Xerox Corporation
Added 2002-07-26

The Changing Environment for Security Protocols

R.M. Needham
Added 2002-07-26

Blocking JAVA Applets at the Firewall

D.M. Marint Jr.,S. Rajagopalan

This paper explores the problem of protecting a site on the internet against hostile external JAVA applets while allowing trusted internal applets to run . With careful implemnetation, a site can be made resistant to current JAVA security weaknesses as well as those yet to be discovered. In addtion, we describe a new attack on certain sophisticated firewalls that is most efeectively realized as a JAVA applet.

Added 2002-07-26

Taking Computers to Task

W.W. Gibbs
Added 2002-07-26

Inventing the Internet Again

G. Gilder
Added 2002-07-26