The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Reports and Papers Archive


Browse All Papers »       Submit A Paper »

A Multi-dimensional Yao's Millionaire Problem

CERIAS TR 2001-09
Mikhail J. Atallah, Wenliang Du
Download: PDF
Added 2002-07-26


Application of Randomized Response Strategy in Privacy-Preserving Survey

CERIAS TR 2001-14
Wenliang Du, Rajeev Gopalakrishna
Download: PDF
Added 2002-07-26

Privacy-Preserving Computations and Their Applications

CERIAS TR 2001-15
Wenliang Du, Mikhail J. Atallah
Download: PDF
Added 2002-07-26

Authentication-driven Authorization on Web Access

CERIAS TR 2001-17
Yuhui Zhong, Bharat Bhargava
Download: PDF
Added 2002-07-26

Next Generation Intrusion Detection Expert System (NIDES)

Debra Anderson, Thane Frivold, Ann Tamaru, Alfoso Valdes
Added 2002-07-26

{Experiences in Specifications: Learning to Live With Ambiguity}

CERIAS TR 2001-18
Mark Crosbie and Benjamin Kuperman
Download: PDF

This paper describes our practical experiences in setting and working with requirements for a piece of security software.  Principally, it discusses the conflicts that occurred between the ease of putting the initial requirements on paper and the difficulty in applying them. The requirements were not formally specified, but the process of turning them into code followed our standard software development process.  However, the informality of the requirements was not the primary source of our conflicts; we believe that ambiguity always exists, ambiguity leads to assumptions, and assumptions are what lead to flaws—some of which may cause security vulnerabilities.

By explaining our journey through the software development process, we show how seemingly obvious and easily stated requirements lead to ambiguity, choices, and the need for revisiting specifications throughout the process.  We conclude with some recommendations from our experiences that we hope will be useful to other practitioners.

Added 2002-07-26

Purdue School of ECE Annual Research Summary

School of ECE

This Annual Research Summary presents and overview of the 1999-2000 research activities of the faculty members in the School of Electrical and Computer Engineering at Purdue University.  It provides information on 70 of the country\‘s finest researchers literally at your fingertips.  Of course, the limitations of print media make it impossible to keep up with the changes, breakthroughs, and updates occuring almost daily, so do access our home page.  Also, printing constraints do not allow us to publish this document in color; for images notated that the originals are in color, please refer to the appropriate section of the on-line Research Summary

Added 2002-07-26

New Security Paradigm Workshop 2000

ACM

The modeling of penetration testing as a Petri net is surprisingly useful.  It retains key advantages of the flaw hypothesis and attack tree approaches while providing some new benefits.

Added 2002-07-26




National Security in the Information Age

Matthew G. Devost

This thesis examines the impact information technologies have had on the national security of the United States.  It looks at how these technologies have evolved into a significant component of the economic, military, and social construct of the nation resulting in a transition from the Industrial Age to the Information Age. It introduces a new paradigm for conflict among nations based upon attacking information infrastructures.  The political attractions and deterrents to using these new information warfare methods are discussed at great length.  The debate is then placed in a traditional realist/liberal context and examined fromm both perspectives, suggesting technological developments are explored and contrasted with new technologies to develop hypotheses regarding the future strategic impacts that these new technologies will have. An increased reliance on information technology which is highly vulnerable to failure and sabotage has created a new risk to the national security of the United States.  These vulnerabilities will be exploited during any conventional military conflicts between nation states, but several political deterrents including economic interdependence and fear of escalation decrease their attraction during peacetime.  Despite this, the political and strategic attractions of information warfare make it a likely terrorist weapon. The final chapter offers policy prescriptions and solutions for integrating these concerns into the franework of the United States grand strategy to decrease the security threat and facilitate international cooperation in this area.

Added 2002-07-26

Information Warfare Technologies: Survey of Selected Civil Sector Activities

Institute for Defense Analyses

The objective of this initial phase of work by IDA was to identify promising, relevant technologies from the academic and civil sectors and assess their long-term applications and payoffs for IW functions.

Added 2002-07-26