Search For:

Displaying 1-3 out of 3 total
Insiders Behaving Badly
Found in: IEEE Security and Privacy
By Joel Predd, Shari Lawrence Pfleeger, Jeffrey Hunker, Carla Bulford
Issue Date:July 2008
pp. 66-70
This column goes beyond previous insider analyses to identify a framework for a taxonomy of insider threats including both malicious and inadvertent actions by insiders that put organizations or their resources at some risk. The framework includes factors ...
 
The sisterhood of the traveling packets
Found in: Proceedings of the 2009 workshop on New security paradigms workshop (NSPW '09)
By Carrie Gates, Jeffrey Hunker, Matt Bishop
Issue Date:September 2009
pp. 59-70
From a cyber-security perspective, attribution is considered to be the ability to determine the originating location for an attack. However, should such an attribution system be developed and deployed, it would provide attribution for all traffic, not just...
     
A privacy expectations and security assurance offer system
Found in: Proceedings of the 2007 Workshop on New Security Paradigms (NSPW '07)
By Jeffrey Hunker
Issue Date:September 2007
pp. 15-22
Consumers accessing web sites for information or to purchase products face limited opportunity to express their privacy preferences, and even less recourse if security violations lead to inadvertent disclosure of privacy sensitive information. A privacy ex...
     
 1