Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Heather Maria Hinton is active.

Publication


Featured researches published by Heather Maria Hinton.


annual computer security applications conference | 2001

Wired versus wireless security: the Internet, WAP and iMode for E-commerce

Paul Anthony Ashley; Heather Maria Hinton; Mark Vandenwauver

The perceived lack of security in the wireless environment has delayed many initiatives in providing access to E-commerce applications from wireless devices. Many organizations are skeptical that the same kind of security protections that they are used to in the current Internet (wired) E-commerce environment are also available for wireless transactions. We show that these perceptions are misplaced. We describe the security properties and mechanisms available for Internet (wired), WAP based and iMode E-commerce. We find that both WAP and iMode provide excellent security features and are geared to provide other security provisions over and above those commonly available in a wired environment.


annual computer security applications conference | 1999

SAM: Security Adaptation Manager

Heather Maria Hinton; Crispin Cowan; Lois M. L. Delcambre; Shawn Bowers

In the trade-offs between security and performance, it seems that security is always the loser. If we allow for adaptive security, we can at least ensure that security and performance are treated somewhat equally. Using adaptive security, we can allow a system to exist in a less secure, more performant state until it comes under attack. We then adapt the system to a more secure, less performant implementation. In this paper, we introduce the Security Adaptation Manager, or SAM. We describe SAM and how we have implemented SAM to take advantage of the different protection strengths offered by the StackGuard compiler. Using SAM to provide StackGuard-based adaptive security provides a form of misuse-based intrusion detection, capable of detecting known and novel attacks.


Innovations in Systems and Software Engineering | 2006

Identifying Patterns of Federation Adoption

Heather Maria Hinton; Mark Vandenwauver

“I don’t see that [federation identity] happening this year, I don’t see it happening next year or the year after that--that leaves 2009, and I’ll leave that one open... There are a lot of issues, but basically it boils down to trust and antitrust.” [PennO6]. Despite this pessimism, federation technology and models are being deployed and are in production now, only not in those areas that they were originally expected. In this paper, we describe several adoption patterns that we have observed and the characteristics that have driven these deployments. Existing business relationships between companies are often strong enough to support federated relationships and are being used as the foundation of present-day federated identity deployments.


Archive | 2004

Method and system for federated provisioning

Heather Maria Hinton; Brian James Turner; Anthony Scott Moran; Shane Bradley Weeden; Ian Michael Glazer; Gavin G. Bray; Venkat Raghavan


Archive | 2009

Specializing support for a federation relationship

Heather Maria Hinton; Anthony Scott Moran; Dolapo Martin Falola; Ivan Matthew Milman; Patrick Ryan Wardrop


Archive | 2002

Method and system for attribute exchange in a heterogeneous federated environment

George Robert Blakley; Heather Maria Hinton; Anthony Joseph Nadalin; Birgit Pfitzmann


Archive | 2003

Method and system for consolidated sign-off in a heterogeneous federated environment

George Robert Blakley; Heather Maria Hinton; Anthony Joseph Nadalin; Ajamu A. Wesley


Archive | 2005

Method and system for a runtime user account creation operation within a single-sign-on process in a federated computing environment

Heather Maria Hinton; Ivan Matthew Milman; Venkat Raghavan; Shane Bradley Weeden


Archive | 2004

Method and system for user-determined authentication in a federated environment

Heather Maria Hinton


Archive | 2006

METHOD AND SYSTEM FOR IDENTITY PROVIDER MIGRATION USING FEDERATED SINGLE-SIGN-ON OPERATION

Heather Maria Hinton

Researchain Logo
Decentralizing Knowledge