CISA

Results: 407



#Item
271Electronic voting / Election fraud / Scantegrity / Electoral systems / Optical scan voting system / Punchscan / Electoral fraud / Ballot / End-to-end auditable voting systems / Politics / Elections / Voting

Scantegrity II Municipal Election at Takoma Park: The First E2E Binding Governmental Election with Ballot Privacy Richard Carback UMBC CDL Aleksander Essex University of Waterloo

Add to Reading List

Source URL: www.cisa.umbc.edu

Language: English - Date: 2012-01-15 13:47:37
272Computer security / Cloud computing / Krautheim / USENIX Annual Technical Conference / Trustworthy computing / Centralized computing / Computing / Security

Building Trust into Utility Cloud Computing

Add to Reading List

Source URL: www.cisa.umbc.edu

Language: English - Date: 2010-04-29 22:28:16
273

Reg Harnish (CISM, CISSP, CISA, ITIL) is an entrepreneur, speaker, security specialist and the Founder of GreyCastle Security. With nearly 15 years of security experience in Financial Services, Healthcare, Higher Educati

Add to Reading List

Source URL: www.bcnys.org

- Date: 2014-02-14 14:25:46
    274Privacy / Computer science / Algorithmic game theory / Peer-to-peer / Web mining / Distributed computing / Statistics / Data management / Ethics / Data analysis / Data mining

    APPROVAL SHEET Title of Thesis: Privacy Preserving Distributed Data Mining based on Multi-objective Optimization and Algorithmic Game Theory Name of Candidate:

    Add to Reading List

    Source URL: www.cisa.umbc.edu

    Language: English - Date: 2012-01-12 13:59:40
    275Cloud infrastructure / OpenStack / Ubuntu / Amazon Elastic Compute Cloud / Google Storage / Cloud.com / Cloud computing / Computing / Centralized computing

    Design and Implementation of FROST: Digital Forensic Tools for the OpenStack Cloud Computing Platform Josiah Dykstra and Alan T. Sherman Cyber Defense Lab, Department of CSEE University of Maryland, Baltimore County (UMB

    Add to Reading List

    Source URL: www.cisa.umbc.edu

    Language: English - Date: 2014-01-18 12:14:27
    276Law enforcement / Cloud computing / Network forensics / Science / Forensic science / American Academy of Forensic Sciences / EnCase / The Cloud / Digital forensics / Computing / Computer forensics

    APPROVAL SHEET Title of Dissertation: Digital Forensics for Infrastructure-as-a-Service Cloud Computing

    Add to Reading List

    Source URL: www.cisa.umbc.edu

    Language: English - Date: 2014-01-18 12:48:06
    277Cloud computing / Security / Data security / Risk analysis / Mehari / Computer security / Computing / European Network and Information Security Agency

    Cloud Computing Security ENISA Daniele Catteddu, CISM, CISA DigitPA

    Add to Reading List

    Source URL: archivio.digitpa.gov.it

    Language: English - Date: 2011-11-17 09:27:50
    278

    PDF Document

    Add to Reading List

    Source URL: www.cisa.umbc.edu

    - Date: 2012-01-13 15:12:16
      279

      PDF Document

      Add to Reading List

      Source URL: www.cisa.umbc.edu

      - Date: 2012-01-13 15:12:16
        280Electronic voting / Trusted computing / Information technology management / Trustworthy computing / Scantegrity / APL / E2E / Trusted Platform Module / Computer / Computing / Security / Computer security

        APPROVAL SHEET Title of Thesis: Applying Trustworthy Computing to End-To-End Electronic Voting Name of Candidate:

        Add to Reading List

        Source URL: www.cisa.umbc.edu

        Language: English - Date: 2010-12-05 17:39:20
        UPDATE