Search For:

Displaying 1-12 out of 12 total
Ethics and Teaching Information Assurance
Found in: IEEE Security and Privacy
By Barbara Endicott-Popovsky
Issue Date:July 2003
pp. 65-67
<p>Has the US become an ethically challenged nation? If so, what does that mean for Information Assurance (IA) educators? The annual Computer Security Institute (CSI)-Federal Bureau of Investigations (FBI) Computer Crime Survey, typically a barometer...
2TAC: Distributed Access Control Architecture for "Bring Your Own Device" Security
Found in: 2012 ASE/IEEE International Conference on BioMedical Computing (BioMedCom)
By Sean Chung,Sam Chung,Teresa Escrig,Yan Bai,Barbara Endicott-Popovsky
Issue Date:December 2012
pp. 123-126
Mobile devices, specifically smartphones, have become ubiquitous. For this reason, businesses are starting to develop "Bring Your Own Device" policies to allow their employees to use their devices in the workplace. However, due to emerging attack...
Scalable and Reusable Attack Aware Software
Found in: 2012 ASE/IEEE International Conference on BioMedical Computing (BioMedCom)
By William Kim,Cheolmin Sky Moon,Sam Chung,Teresa Escrig,Barbara Endicott-Popovsky
Issue Date:December 2012
pp. 101-104
Developing and maintaining security software systems can be cost-prohibitive for all but the largest organizations. New requirements of hardware and software quickly outdate current security systems. Modern software architecture technology, such as Spring ...
Situational Awareness as a Measure of Performance in Cyber Security Collaborative Work
Found in: Information Technology: New Generations, Third International Conference on
By Ashish Malviya, Glenn A. Fink, Landon Sego, Barbara Endicott-Popovsky
Issue Date:April 2011
pp. 937-942
Cyber defense competitions arising from U.S. service academy exercises offer a platform for collecting data that can inform research that ranges from characterizing the ideal cyber warrior to describing behaviors during certain challenging cyber defense si...
Assessment of Virtualization as a Sensor Technique
Found in: Systematic Approaches to Digital Forensic Engineering, IEEE International Workshop on
By Julia Narvaez, Chiraag Aval, Barbara Endicott-Popovsky, Christian Seifert, Ashish Malviya, Doug Nordwall
Issue Date:May 2010
pp. 61-65
The explosive growth of malware development and the increasing sophistication of malware behavior require thatsecurity researchers be on the lookout for new vectors of attacks. Drive-by-downloads are among the types of attacks that are onthe rise. To study...
Toward Trustworthy Service Consumers and Producers
Found in: Internet and Web Applications and Services, International Conference on
By Phil Bonderud, Sam Chung, Barbara Endicott-Popovsky
Issue Date:June 2008
pp. 451-456
The purpose of this research is to propose a mechanism that enables trustworthy relationships among service producers and consumers. Service producers advertise their services through the UDDI. From a QoS perspective, a service consumer needs to know if a ...
Challenge Paper: Validation of Forensic Techniques for Criminal Prosecution
Found in: Systematic Approaches to Digital Forensic Engineering, IEEE International Workshop on
By Robert F. Erbacher, Barbara Endicott-Popovsky, Deborah A. Frincke
Issue Date:April 2007
pp. 150-154
As in many domains, there is increasing agreement in the user and research community that digital forensics analysts would benefit from the extension, development and application of advanced techniques in performing large scale and heterogeneous data analy...
Forensics Education: Assessment and Measures of Excellence
Found in: Systematic Approaches to Digital Forensic Engineering, IEEE International Workshop on
By Carol Taylor, Barbara Endicott-Popovsky, Amelia Phillips
Issue Date:April 2007
pp. 155-165
In this paper we assess current academic and certificate based education and training programs in digital forensics education. Strong interest in the digital forensics field has led to a proliferation of education options in both academia and professional ...
Unintended Consequences: Digital Evidence in Our Legal System
Found in: IEEE Security and Privacy
By Barbara Endicott-Popovsky,Donald J. Horowitz
Issue Date:March 2012
pp. 80-83
The legal and judicial communities have minimal, if any, background necessary to understand the nature of digital evidence and use it appropriately. Given accumulated examples of egregious outcomes resulting from this condition, the authors conclude that n...
An Operational Framework for Service Oriented Architecture Network Security
Found in: Hawaii International Conference on System Sciences
By Robert Bunge, Sam Chung, Barbara Endicott-Popovsky, Don McLane
Issue Date:January 2008
pp. 312
This study proposes a new operational framework of a network administrator for Service Oriented Architecture (SOA) network security. It seeks to characterize the current state of practices in SOA network security by gathering information regarding known th...
Found in: Hawaii International Conference on System Sciences
By Julia Narvaez, Barbara Endicott-Popovsky, Christian Seifert, Chiraag Aval, Deborah A. Frincke
Issue Date:January 2010
pp. 1-10
Drive-by-downloads are malware that push, and then execute, malicious code on a client system without the user's consent. The purpose of this paper is to introduce a discussion of the usefulness of antivirus software for detecting the installation of such ...
A Case Study in Rapid Introduction of an Information Assurance Track into a Software Engineering Curriculum
Found in: Software Engineering Education and Training, Conference on
By Barbara Endicott-Popovsky, Deborah A. Frincke
Issue Date:March 2004
pp. 118-123
Disciplines such as Software Engineering are expanding rapidly, and both the new knowledge gained as the discipline matures and the need to prepare students for changing environments make it important for departments to find a balance between evolving curr...