Difference between revisions of "White Paper Projects"

From CyberSecurity
Jump to: navigation, search
 
Line 59: Line 59:
 
**[[Michael A. Laurenzano]]
 
**[[Michael A. Laurenzano]]
 
**[[Elijah Esquibel]]
 
**[[Elijah Esquibel]]
 +
*'''[[Cyber Criminal Activity (group 10)]]''' - group closed
 +
**[[Khaled Sedky]]
 +
**[[Manish Mittal]]
 +
**[[Ahmed Tolba]]
 +
**[[Pamela Mae Davis]]
 +
**[[Nilkund Aseef]]
 
*'''Liability'''
 
*'''Liability'''
 
**..
 
**..

Latest revision as of 08:08, 4 December 2005

PLEASE READ
Following is a list of suggested project topics. Please add your name for the topic(s) that you may be interested in. Try to add your name in only one or a few topics at most. Also feel free to add additional topics at the end. In order to meet the team formation guidelines [1] please clearly indicate if you think you are a "policy" student.


  • Full vs. Responsible Disclosure of Vulnerabilities: Vulnerabilities are associated with computer software and hardware. Does it make technical or economic sense to make a limited disclosure of vulnerabilities only to the manufacturer or software author? Does "Open Source" necessarily mean full disclosure? What are the tradeoffs?

Interrogation and Torture Group 2: Katie Veazey (UCB), Ian Richardson (UCB), Justin Delacruz (UCB), Cameron Mckenzie (UCB),


This page has been created by a student for students to assist in the process of team formation and bring together like-minded folks.