Search For:

Displaying 1-11 out of 11 total
Guest Editors' Introduction: Data Surveillance
Found in: IEEE Security and Privacy
By Simson Garfinkel, Michael D. Smith
Issue Date:November 2006
pp. 15-17
The guest editors discuss data surveillance. Proponents hope that data surveillance technology will be able to anticipate and prevent terrorist attacks, detect disease outbreaks, and allow for detailed social science research--all without the corresponding...
Distinct Sector Hashes for Target File Detection
Found in: Computer
By Joel Young,Kristina Foster,Simson Garfinkel,Kevin Fairbanks
Issue Date:December 2012
pp. 28-35
Using an alternative approach to traditional file hashing, digital forensic investigators can hash individually sampled subject drives on sector boundaries and then check these hashes against a prebuilt database, making it possible to process raw media wit...
Sharp Figures, Fuzzy Purpose
Found in: IEEE Security and Privacy
By Simson Garfinkel
Issue Date:March 2008
pp. 5
Simson Garfinkel reviews Security Data Visualization: Graphical Techniques for Network Analysis by Greg Conti.
Guest Editors' Introduction: Secure or Usable?
Found in: IEEE Security and Privacy
By Lorrie Faith Cranor, Simson Garfinkel
Issue Date:September 2004
pp. 16-18
There's an old joke that computers are actually easy machines to secure: just turn them off, lock them in a metal-lined room, and throw away the key. What you end up with is a machine that is very secure--just not very usable.<p>As the joke's continu...
Extending digital repository architectures to support disk image preservation and access
Found in: Proceeding of the 11th annual international ACM/IEEE joint conference on Digital libraries (JCDL '11)
By Christopher A. Lee, Kam Woods, Simson Garfinkel
Issue Date:June 2011
pp. 57-66
Disk images (bitstreams extracted from physical media) can play an essential role in the acquisition and management of digital collections by serving as containers that support data integrity and chain of custody, while ensuring continued access to the und...
Wouldn't it be nice to have software labels
Found in: Proceedings of the ACM SIGAda annual international conference on SIGAda (SIGAda '10)
By Elizabeth Fong, Gary McGraw, Jeff Williams, Larry Wagoner, Paul E. Black, Richard F. Leslie, Simson Garfinkel
Issue Date:October 2010
pp. 441-442
EN-50128, the European standard for railway software safety, requires that software be demonstrated as free from using language features that would trigger known bugs in the compiler. Given a list of problem reports provided by the compiler vendor, this pa...
Invisible HCI-SEC: ways of re-architecting the operating system to increase usability and security
Found in: Proceedings of the 5th Symposium on Usable Privacy and Security (SOUPS '09)
By Simson Garfinkel
Issue Date:July 2009
pp. 1-32
Existing technologies for file sharing differ widely in the granularity of control they give users over who can access their data; achieving finer-grained control generally requires more user effort. We want to understand what level of control users need o...
Amazon S3 for science grids: a viable solution?
Found in: Proceedings of the 2008 international workshop on Data-aware distributed computing (DADC '08)
By Adriana Iamnitchi, Matei Ripeanu, Mayur R. Palankar, Simson Garfinkel
Issue Date:June 2008
pp. 55-64 has introduced the Simple Storage Service (S3), a commodity-priced storage utility. S3 aims to provide storage as a low-cost, highly available service, with a simple 'pay-as-you-go' charging model. This article makes three contributions. First, ...
My net connection approaches light speed with cable, but that doesn't guarantee victory over DSL
Found in: Proceedings of the tenth conference on Computers, freedom and privacy: challenging the assumptions (CFP '00)
By Simson Garfinkel
Issue Date:April 2000
pp. 129-135
Signal-to-noise ration and amount frequent subrange a partition spectrum of speech signal vocoders of system is analyzed with the purpose deriving a minimum transfer of rate signal.
Database nation (book excerpts)
Found in: Ubiquity
By Simson Garfinkel
Issue Date:February 2000
pp. 4-es
The Security Process Algebra (SPA) is a CCS-like specification languag e where actions belong to two different levels of confidentiality. It has been used to define several noninterference-like security properties whose verification has been automated by t...
Database nation (book excerpts)
Found in: Ubiquity
By Simson Garfinkel
Issue Date:February 2000
pp. 4-es
The blogosphere has grown to be a mainstream forum of social interaction as well as a commercially attractive source of information and influence. Tools are needed to better understand how communities that adhere to individual blogs are constituted in orde...