If you made any changes in Pure, your changes will be visible here soon.

Fingerprint Dive into the research topics where Susan B Older is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 5 Similar Profiles
Access control Engineering & Materials Science
Fairness Mathematics
Access Control Mathematics
Semantics Engineering & Materials Science
Higher-order Logic Mathematics
Logic Mathematics
Interoperability Engineering & Materials Science
Modal Logic Mathematics

Projects 2006 2016

Research Output 1995 2014

  • 39 Citations
  • 4 h-Index
  • 8 Article
  • 7 Conference contribution
  • 1 Book
4 Citations (Scopus)

Banking on interoperability: Secure, interoperable credential management

Benson, G., Chin, S. K., Croston, S., Jayaraman, K. & Older, S. B., Jul 4 2014, In : Computer Networks. 67, p. 235-251 17 p.

Research output: Contribution to journalArticle

Interoperability
Industry
Formal logic
Scalability
Websites

Reasoning about delegation and account access in retail payment systems

Chin, S. K. & Older, S. B., 2013, Communications in Computer and Information Science. PART II ed. Vol. 374. p. 99-114 16 p. (Communications in Computer and Information Science; vol. 374, no. PART II).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electronic commerce
Access control
Internet

Engineering Assurance at the Undergraduate Level

Irvine, C., Yasinsac, A., Older, S. B. & Chin, S. K., 2012, In : IEEE Security and Privacy. 10, 6, p. 74-77 4 p.

Research output: Contribution to journalArticle

engineering
6 Citations (Scopus)

Access control, security, and trust: A logical approach

Chin, S. K. & Older, S. B., Jan 1 2010, CRC Press. 325 p.

Research output: Book/ReportBook

Access control
Research laboratories
Computer hardware
Cryptography
Information systems

Credentials management for high-value transactions

Benson, G., Chin, S. K., Croston, S., Jayaraman, K. & Older, S. B., 2010, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 6258 LNCS. p. 169-182 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6258 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Transactions
Key Management
Public Key Infrastructure
Authorization
Access Control

Press and Media

SYRACUSE UNIVERSITY HOSTS AIR FORCE CYBERSECURITY WORKSHOP

Susan B Older & Jae C Oh

9/10/18

1 item of Media coverage

Press/Media: Expert Comment

Alumna Interprets Cybersecurity on Capitol Hill

Susan B Older

12/10/15

1 item of Media coverage

Press/Media: Expert Comment