From: John Young <jya@pipeline.com>
To: cypherpunks@toad.com
Message Hash: 2af11dcd6b329312d0654634910de03ace4f777866f90508595f0bd4f98265ea
Message ID: <199511252301.SAA20824@pipe4.nyc.pipeline.com>
Reply To: N/A
UTC Datetime: 1995-11-25 23:15:26 UTC
Raw Date: Sun, 26 Nov 1995 07:15:26 +0800
From: John Young <jya@pipeline.com>
Date: Sun, 26 Nov 1995 07:15:26 +0800
To: cypherpunks@toad.com
Subject: NOF_uss
Message-ID: <199511252301.SAA20824@pipe4.nyc.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain
Science, Nov 17, 1995:
"Security Schemes Aspire to No Fuss System Protection."
Because of the painful trade offs between security and
usability that come with current protective measures,
computer scientists have heen investigating new ways to
detect and ward off intruders that present fewer
obstacles to users and administrators. Two of the most
intriguing directions announced at the Baltimore
security conference were reported by researchers at
Purdue University's Computer Operations, Audit, and
Security Technology laboratory (COAST). The first was an
attempt to harness techniques from artificial
intelligence to detect intrusions; the second, a pilot
test of what has been called software forensics -- an
effort to recognize malign programs by identifying the
fingerprints of their creators.
NOF_uss (15 kb)
Return to November 1995
Return to “John Young <jya@pipeline.com>”
1995-11-25 (Sun, 26 Nov 1995 07:15:26 +0800) - NOF_uss - John Young <jya@pipeline.com>