Date | Speaker | Topic (Abstract) | More Info |
May 27, 2004 | Prof. Clark Thomborson (U. of Auckland) | New Techniques for Software Protection | N/A |
Apr 27, 2004 | Dr. George Yee (NRC) | Semi-Automated Derivation of Personal Privacy Policies | N/A |
Apr 13, 2004 | Dr. Tim Moses (Entrust) | Managing security policy in distributed systems | Slides (PDF) |
Mar 23, 2004 | Prof. Carlisle Adams (U. of Ottawa) | Revealing Personal Data without Abandoning Privacy: Some Initial Steps | N/A |
Mar 09, 2004 | Prof. Michel Barbeau (Carleton U.) | Intrusion Detection in Mobile and Wireless Networks Using Electronic Profiling | N/A |
Feb 24, 2004 | Prof. Sean Smith (Dartmouth College) | Enabling Effective Trust Judgments | N/A |
Feb 10, 2004 | Prof. Scott Knight (RMC) | Enterprise Network Vulnerability to HTTP Tunnelling | N/A |
Jan 27, 2004 | Prof. Paul Van Oorschot (Carleton U.) | Password Attacks and Human-in-the-Loop Protocols | Paper |
Jan 13, 2004 | Prof. Anil Somayaji (Carleton U.) | What Can Biology Teach Us About Computer Security? | N/A |