The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Archive


2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Affiliation shown is the affiliation at the time the talk was given.

01/09/2008
Security in a Changing World

Security in a Changing World

Eric Cole - Lockheed Martin

01/16/2008
Tor: Anonymous communications for government agencies, corporations, journalists... and you

Tor: Anonymous communications for government agencies, corporations, journalists... and you

Paul Syverson & Roger Dingledine - U.S. Naval Research Laboratory (NRL)

01/23/2008
Electronic Voting: Danger and Opportunity

Electronic Voting: Danger and Opportunity

Edward W. Felten - Princeton University

02/06/2008

A Question of Security

Carlos Solari - Alcatel-Lucent

02/27/2008
Managing Security Polarities

Managing Security Polarities

Buzz Walsh - Booz Allen Hamilton

03/05/2008
Hacking the Mobile Workforce

Hacking the Mobile Workforce

Daniel Hoffman - Fiberlink Communications

03/26/2008
Towards Event Source Location Privacy in Wireless Sensor Networks

Towards Event Source Location Privacy in Wireless Sensor Networks

Sencun Zhu - Pennsylvania State

04/02/2008
Exploiting Opportunistic Scheduling in Cellular Data Networks

Exploiting Opportunistic Scheduling in Cellular Data Networks

Hao Chen - University of California, Davis

04/09/2008
Shifting focus:  Aligning security with risk management

Shifting focus: Aligning security with risk management

Jack Jones - Risk Management Insight

04/16/2008
Static source code analysis

Static source code analysis

Jacob West - Fortify Software

04/23/2008

TBA

09/03/2008
Private Queries in Location Based Services:  Anonymizers are not Necessary

Private Queries in Location Based Services: Anonymizers are not Necessary

Gabriel Ghinita - Purdue University

09/10/2008
Virtualization: Resource Coupling and Security across the Stack

Virtualization: Resource Coupling and Security across the Stack

Dennis Moreau - Configuresoft

09/24/2008
Responding to Anomalous Database Requests

Responding to Anomalous Database Requests

Ashish Kamra - Purdue University

10/01/2008
Resilient Systems for Mission Assurance

Resilient Systems for Mission Assurance

Dave Keppler - MITRE

10/08/2008
Measuring the Attack Surfaces of Enterprise Software Systems

Measuring the Attack Surfaces of Enterprise Software Systems

Yuecel Karabulut - SAP Research

10/22/2008
Access Control and Resiliency for WS-BPEL

Access Control and Resiliency for WS-BPEL

Federica Paci - Purdue University

10/29/2008
Trends in Identity Management

Trends in Identity Management

Kenji Takahashi - ITT Information Sharing Platform Laboratories

11/12/2008
John Oritz, SRA International

John Oritz, SRA International

John Oritz - SRA International

11/19/2008
The Role Graph Model and its Extensions

The Role Graph Model and its Extensions

Sylvia Osborn - University of Western Ontario

Ways to Watch

YouTube

Watch Now!

Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!