CISA

Results: 407



#Item
261Cloud infrastructure / IBM cloud computing / Rackspace Cloud / Cloud computing / Centralized computing / Computing

Private Virtual Infrastructure: A Model for Trustworthy Utility Cloud Computing UMBC Computer Science Technical Report Number TR-CS[removed]F. John Krautheim 1 Dhananjay S. Phatak

Add to Reading List

Source URL: www.cisa.umbc.edu

Language: English - Date: 2010-04-09 15:36:45
262Cloud infrastructure / Amazon Elastic Compute Cloud / Eucalyptus / Forensic Toolkit / Azure Services Platform / Forensic disk controller / Department of Defense Cyber Crime Center / Xen / Guidance Software / Cloud computing / Computing / Centralized computing

Acquiring Forensic Evidence from Infrastructure-as-a-Service Cloud Computing: Exploring and Evaluating Tools, Trust, and Techniques Josiah Dykstra and Alan T. Sherman Cyber Defense Lab, Department of CSEE University of M

Add to Reading List

Source URL: www.cisa.umbc.edu

Language: English - Date: 2014-01-18 12:14:48
263Infographics / Scientific modeling / Science / System software / Visualization / Shadow Copy / Filesystem Hierarchy Standard / Windows / Path / Computing / Computational science / Computer graphics

VizSec2012_ChangeLink_Leschke.pdf

Add to Reading List

Source URL: www.cisa.umbc.edu

Language: English - Date: 2012-09-23 15:50:50
264Government / Election technology / Punchscan / Electronic voting / Election fraud / Ballot / Absentee ballot / Voting machine / Vote counting system / Politics / Elections / Electoral systems

Punchscan: Introduction and System Definition of a High-Integrity Election System Kevin Fisher, Richard Carback and Alan T. Sherman Center for Information Security and Assurance (CISA) Department of Computer Science and

Add to Reading List

Source URL: www.cisa.umbc.edu

Language: English - Date: 2006-08-14 20:44:26
265Information / Man-in-the-middle attack / Interlock protocol / Out-of-band / Communications protocol / Transport Layer Security / Authentication / Streaming media / Computing / Cryptographic protocols / Data

ABSTRACT Title of thesis: CHAUM’S PROTOCOL FOR DETECTING MAN-IN-THE-MIDDLE:

Add to Reading List

Source URL: www.cisa.umbc.edu

Language: English - Date: 2010-12-05 17:18:58
266Cloud infrastructure / Eucalyptus / Trusted Computing / Trusted Platform Module / IBM cloud computing / Rackspace Cloud / Cloud computing / Centralized computing / Computing

Private Virtual Infrastructure for Cloud Computing F. John Krautheim University of Maryland, Baltimore County, 1000 Hilltop Circle, Baltimore, MD[removed]removed] outsourced service. Companies are turning t

Add to Reading List

Source URL: www.cisa.umbc.edu

Language: English - Date: 2010-06-04 12:12:19
267Trusted Platform Module / Smart card / Passphrase / Direct Anonymous Attestation / Trusted Execution Technology / Computer security / Cryptography / Trusted computing

Catching the Cuckoo: Verifying TPM Proximity Using a Quote Timing Side-Channel (short paper) Russell A. Fink1,2 , Alan T. Sherman2 , Alexander O. Mitchell3 , and David C. Challener1 1

Add to Reading List

Source URL: www.cisa.umbc.edu

Language: English - Date: 2012-01-13 15:12:16
268Firewall / Electronic filter / Network packet / Information / Electronics / Computing / Computer network security / Cyberwarfare / Data security

8th ANNUAL SYMPOSIUM ON INFORMATION ASSURANCE (ASIA’13), JUNE 4-5, 2013, ALBANY, NY A Private Packet Filtering Language for Cyber Defense Michael Oehler, Dhananjay S. Phatak and Alan T. Sherman 

Add to Reading List

Source URL: www.cisa.umbc.edu

Language: English - Date: 2013-06-03 08:27:09
269Electronic voting / Punchscan / Alan Sherman / Scantegrity / University Voting Systems Competition / David Chaum / Optical scan voting system / Vote counting system / Secret ballot / Politics / Election technology / Elections

APPROVAL SHEET Title of Thesis: Security Innovations in the Punchscan Voting System Name of Candidate:

Add to Reading List

Source URL: www.cisa.umbc.edu

Language: English - Date: 2008-04-24 18:37:00
270Bloom filter / Search engine indexing / Hash function / RSA / Information science / Information retrieval / Hashing

A Conjunction, Language, and System Facets for Private Packet Filtering Michael Oehler, Dhananjay S. Phatak, and Alan T. Sherman Cyber Defense Lab Department of Computer Science and Electrical Engineering University of M

Add to Reading List

Source URL: www.cisa.umbc.edu

Language: English - Date: 2014-01-18 12:30:58
UPDATE