Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where James F. Riordan is active.

Publication


Featured researches published by James F. Riordan.


Mobile Agents and Security | 1998

Environmental Key Generation Towards Clueless Agents

James F. Riordan; Bruce Schneier

In this paper, we introduce a collection of cryptographic key constructions built from environmental data that are resistant to adversarial analysis and deceit. We expound upon their properties and discuss some possible applications; the primary envisioned use of these constructions is in the creation of mobile agents whose analysis does not reveal their exact purpose.


annual computer security applications conference | 1998

A certified e-mail protocol

Bruce Schneier; James F. Riordan

Protocols to facilitate secure electronic delivery are necessary if the Internet is to achieve its true potential as a business communications tool. We present a protocol for secure e-mail that protects both the sender and the receiver, and can be implemented using current e-mail products and existing Internet infrastructure.


Archive | 1993

Computational Results for a Two-Dimensional Model of Crystalline Microstructure

Charles Collins; Mitchell Luskin; James F. Riordan

We describe a two-dimensional model of crystalline martensitic microstructure, and we present a new visualization of computational results for the finite element approximation of solutions to the variational problem with microstructure on a sequence of refined meshes.


computational science and engineering | 2009

Deriving Expertise Profiles from Tags

Adriana Budura; Daniela Bourges-Waldegg; James F. Riordan

We propose a novel approach to the problem of expertise mining in an enterprise, taking advantage of online social applications deployed within the enterprise. Based on the assumption that the users’ interactions with such social software reflect to some extent their expertise, we devise a probabilistic method for identifying the main areas of expertise of users based solely on their set of tags extracted from a social bookmarking system. We base our approach on statistical language models, which we adapt to fit our unique setting. We train and validate our model on a real world dataset extracted from two IBM-internal applications. Our results show that our approach provides a viable alternative to other methods that rely on documents extracted from the enterprise corpora.


Archive | 2001

Die PERSEUS Systemarchitektur

Birgit Pfitzmann; James F. Riordan; Christian Stüble; Michael Waidner; Arnd Weber

Sichere Anwendungen sind ohne ein sicheres Betriebssystem unmoglich. Wir zeigen auf, wie bestehende Sicherheitsmechanismen wie kryptographische Protokolle oder Smartcards umgangen werden konnen und prasentieren eine Systemarchitektur fur eine allgemeine Sicherheitsplattform, die es Nutzern ermoglicht, ihre vorhandenen Anwendungen bequem weiterzubenutzen. Das Design enthalt alle notigen Dienste, um auch sichere Softwareinstallationen durch den Endbenutzer durchfuhren zu lassen. Um eine verbreitete Applikationsschnittstelle zur Verfugung zu stellen, arbeitet das Perseus System als Host, der als eine Clientapplikation ein existierendes Betriebssystem (Client OS) ausfuhrt. Da das Client OS alle nicht sicherheitskritischen Aufgaben ubernimmt, konnen wir den Sicherheitskern klein und uberschaubar halten und legen damit den Grundstein fur eine spatere Evaluation nach den Common Criteria oder ITSEC.


recent advances in intrusion detection | 2000

Target Naming and Service Apoptosis

James F. Riordan; Dominique Alessandri

The volume of traffic on security mailing lists, bulletin boards, news forums, et cetera has grown so sharply in recent times that it is no longer feasible for a systems administrator to follow all relevant news as a background task; it has become a full-time job. Even when relevant information does eventually reach the systems administrator, there is, often a dangerous window between public knowledge of a vulnerability and the administrators ability to correct it. Automated responses mechanisms are the key to closing these vulnerability windows. We propose a database of likely areas of vulnerability, called targets, in a machine readable and filterable manner so that administrators can greatly reduce the amount of security mail to be read. We then propose a cryptographically secure service with which semi-trusted third parties can act in a manner limited by the system administrator, say shutting down a specific service while not allowing general access, to diminish the window of vulnerability.


IEEE Spectrum | 2005

How to hook worms [computer network security]

James F. Riordan; Andreas Wespi; Diego Zamboni

This paper discusses the use of intrusion detection systems to protect against the various threats faced by computer systems by way of worms, viruses and other forms of attacks. Intrusion detection systems attempt to detect things that are wrong in a computer network or system. The main problems of these systems, however, are the many false alarms they produce, their lack of resistance to both malicious attacks and accidental failures, and the constant appearance of new attacks and vulnerabilities. IBM Zurich Research Laboratory has developed a system that specifically targets worms rather than trying to prevent all breaches of computer security. Called Billy Goat, the specialized worm detection system runs on a dedicated machine connected to the network and detects worm-infected machines anywhere in it. Billy Goat has been proven effective at detecting worm-infected machines in a network. It is currently used in several large corporate intranets, and it is normally able to detect infected machines within seconds of their becoming infected. Furthermore, not only is it able to detect the presence of a worm in the network, it can even provide the addresses of the infected machines. This makes it considerably easier to remedy the problem.


VIS | 2001

The PERSEUS System Architecture

Birgit Pfitzmann; James F. Riordan; Christian Stüble; Michael Waidner; Arnd Weber


Archive | 2003

Attack signature generation

Klaus Julisch; James F. Riordan


Archive | 2008

Stateless Methods for Resource Hiding and Access Control Support Based on URI Encryption

Christopher J. Giblin; Tadeusz Pietraszek; James F. Riordan; Chris Vanden Berghe

Researchain Logo
Decentralizing Knowledge