Search For:

Displaying 1-10 out of 10 total
Crossing the "Valley of Death": Transitioning Cybersecurity Research into Practice
Found in: IEEE Security & Privacy
By Douglas Maughan,David Balenson,Ulf Lindqvist,Zachary Tudor
Issue Date:March 2013
pp. 14-23
New and innovative technologies will only make a difference if they're deployed and used. It doesn't matter how visionary a technology is unless it meets user needs and requirements and is available as a product via user-acceptable channels. One of the cyb...
 
The IEEE Symposium on Security and Privacy Is Moving to San Francisco
Found in: IEEE Security and Privacy
By Peter G. Neumann,Ulf Lindqvist
Issue Date:March 2012
pp. 65-66
The authors discuss the IEEE Symposium on Security and Privacy, which because of its growing popularity, is moving to a larger venue this year.
 
Panel: Technical, Social and Legal Frameworks for Digital Forensics and CyberInfrastructure Security
Found in: Systematic Approaches to Digital Forensic Engineering, IEEE International Workshop on
By Jean West, Ulf Lindqvist Peter J. Vasquez, Michael Losavio, Sean Peisert
Issue Date:May 2009
pp. 97-98
A systematic approach to digital forensic engineering acknowledges the close, intertwine relationship between digital forensics and information security. Just as their technical structures are interrelated, so, too, are issues relating to legal and social ...
 
Bonsai: Balanced Lineage Authentication
Found in: Computer Security Applications Conference, Annual
By Ashish Gehani, Ulf Lindqvist
Issue Date:December 2007
pp. 363-373
The provenance of a piece of data is of utility to a wide range of applications. Its availability can be drastically increased by automatically collecting lineage information during filesystem operations. However, when data is pro- cessed by multiple users...
 
VEIL: A System for Certifying Video Provenance
Found in: Multimedia, International Symposium on
By Ashish Gehani, Ulf Lindqvist
Issue Date:December 2007
pp. 263-272
Traditionally, a consumer decided how much to trust a piece of data based on its source. As digital video cameras and editors become ubiquitous, an arbitrary video object is increasingly likely to be produced using a range of operations that combine clips ...
 
Detecting Computer and Network Misuse Through the Production-Based Expert System Toolset (P-BEST)
Found in: Security and Privacy, IEEE Symposium on
By Ulf Lindqvist, Phillip A. Porras
Issue Date:May 1999
pp. 0146
This paper describes an expert system development tool set called the Production-Based Expert System Toolset (P-BEST) and how it is employed in the development of a modern generic signature-analysis engine for computer and network misuse detection. For mor...
 
A Map of Security Risks Associated with Using COTS
Found in: Computer
By Ulf Lindqvist, Erland Jonsson
Issue Date:June 1998
pp. 60-66
Combining Internet connectivity and COTS-based systems results in increased threats from both external and internal sources. Traditionally, security design has been a matter of risk avoidance. Now more and more members of the security community realize the...
 
How to Systematically Classify Computer Security Intrusions
Found in: Security and Privacy, IEEE Symposium on
By Ulf Lindqvist, Erland Jonsson
Issue Date:May 1997
pp. 0154
This paper presents a classification of intrusions with respect to technique as well as to result. The taxonomy is intended to be a step on the road to an established taxonomy of intrusions for use in incident reporting, statistics, warning bulletins, intr...
 
Modeling Multistep Cyber Attacks for Scenario Recognition
Found in: DARPA Information Survivability Conference and Exposition,
By Steven Cheung, Ulf Lindqvist, Martin W. Fong
Issue Date:April 2003
pp. 284
Efforts toward automated detection and identification of multistep cyber attack scenarios would benefit significantly from a methodology and language for modeling such scenarios. The Correlated Attack Modeling Language (CAML) uses a modular approach, where...
 
Key management and secure software updates in wireless process control environments
Found in: Proceedings of the first ACM conference on Wireless network security (WiSec '08)
By Alfonso Valdes, Dennis K. Nilsson, Tanya Roosta, Ulf Lindqvist
Issue Date:March 2008
pp. 1-1
Process control systems using wireless sensor nodes are large and complex environments built to last for a long time. Cryptographic keys are typically preloaded in the wireless nodes prior to deployment and used for the rest of their lifetime. To reduce th...
     
 1