default search action
IEEE Security & Privacy, Volume 9
Volume 9, Number 1, January - February 2011
- John Viega:
Reality Check. 3-4 - Gary McGraw:
Silver Bullet Talks with Paul Kocher. 8-11 - Giovanni Vigna:
The 2010 International Capture the Flag Competition. 12-14 - Lee Garber:
News Briefs. 15-17 - Cynthia E. Irvine, Josyula R. Rao:
Guest Editors' Introduction: Engineering Secure Systems. 18-21 - Paul A. Karger, Suzanne McIntosh, Elaine R. Palmer, David C. Toll, Samuel Weber:
Lessons Learned: Building the Caernarvon High-Assurance Operating System. 22-30 - Clark Weissman, Timothy E. Levin:
Lessons Learned from Building a High-Assurance Crypto Gateway. 31-39 - Joshua Schiffman, Thomas Moyer, Trent Jaeger, Patrick D. McDaniel:
Network-Based Root of Trust for Installation. 40-48 - M. Eric Johnson, Shari Lawrence Pfleeger:
Addressing Information Risk in Turbulent Times. 49-57 - James Alexander, Jonathan M. Smith:
Disinformation: A Taxonomy. 58-63 - Brett Stone-Gross, Marco Cova, Bob Gilbert, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna:
Analysis of a Botnet Takeover. 64-72 - Lori M. Kaufman:
How Private Is the Internet? 73-75 - Fred H. Cate:
A Transatlantic Convergence on Privacy? 76-79 - Didier Stevens:
Malicious PDF Documents Explained. 80-82 - Wendy Seltzer:
Exposing the Flaws of Censorship by Domain Name. 83-87 - Michael Lesk:
What Is Information Worth? 88-90 - Richard Bejtlich, John Steven, Gunnar Peterson:
Directions in Incident Detection and Response. 91-92 - Daniel E. Geer Jr.:
Does a Rising Tide Lift All Boats? 93-94 - Daniel E. Geer Jr.:
A Time for Choosing. 96
Volume 9, Number 2, March - April 2011
- Marc Donner:
Privacy and the System Life Cycle. 3 - Lee Garber:
News Briefs. 5-7 - Gary McGraw:
Silver Bullet Talks with David Rice. 8-11 - Mary Frances Theofanos, Shari Lawrence Pfleeger:
Guest Editors' Introduction: Shouldn't All Security Be Usable? 12-17 - Cristian Bravo-Lillo, Lorrie Faith Cranor, Julie S. Downs, Saranga Komanduri:
Bridging the Gap in Computer Security Warnings: A Mental Model Approach. 18-26 - Kristin Fuglerud, Øystein Dale:
Secure and Inclusive Authentication with a Talking Mobile One-Time-Password Client. 27-34 - M. Eric Johnson, Nicholas D. Willey:
Usability Failures and Healthcare Data Hemorrhages. 35-42 - Robert W. Reeder, Stuart E. Schechter:
When the Password Doesn't Work: Secondary Authentication for Websites. 43-49 - Bernd Grobauer, Tobias Walloschek, Elmar Stöcker:
Understanding Cloud Computing Vulnerabilities. 50-57 - Stefan Fenz, Andreas Ekelhart:
Verification, Validation, and Evaluation in Information Security Risk Management. 58-65 - Jonathan Spring:
Monitoring Cloud Computing by Layer, Part 1. 66-68 - Matt Bishop:
Teaching Security Stealthily. 69-71 - Jennifer L. Bayuk:
Systems Security Engineering. 72-74 - Hervé Chabanne, Mehdi Tibouchi:
Securing E-passports with Elliptic Curves. 75-78 - Chris Greamo, Anup Ghosh:
Sandboxing and Virtualization: Modern Tools for Combating Malware. 79-82 - Patrick D. McDaniel:
Data Provenance and Security. 83-85 - Aza Raskin:
Your Life Experiences, Brought to You by Budweiser. 86-88 - Brian Chess, Brad Arkin:
Software Security in Practice. 89-92 - Daniel E. Geer Jr.:
Correlation Is Not Causation. 93-94 - Bruce Schneier:
Detecting Cheaters. 96
Volume 9, Number 3, May - June 2011
- Robin E. Bloomfield:
Resilient to the Unexpected. 3-4 - Lee Garber:
News Briefs. 6-8 - Gary McGraw:
Silver Bullet Talks with Ralph Langner. 9-14 - David Evans, Salvatore J. Stolfo:
Guest Editors' Introduction: The Science of Security. 16-17 - Jason Bau, John C. Mitchell:
Security Modeling and Analysis. 18-25 - Anupam Datta, Jason Franklin, Deepak Garg, Limin Jia, Dilsun Kirli Kaynar:
On Adversary Models and Compositional Security. 26-32 - Jean Paul Degabriele, Kenneth G. Paterson, Gaven J. Watson:
Provable Security in the Real World. 33-41 - David Barrera, Paul C. van Oorschot:
Secure Software Installation on Smartphones. 42-48 - Ralph Langner:
Stuxnet: Dissecting a Cyberwarfare Weapon. 49-51 - Jonathan Spring:
Monitoring Cloud Computing by Layer, Part 2. 52-55 - Gregory J. Conti, Thomas A. Babbitt, John Nelson:
Hacking Competitions and Their Untapped Potential for Security Education. 56-59 - Salvatore J. Stolfo, Steven M. Bellovin, David Evans:
Measuring Security. 60-65 - Paul M. Schwartz:
Privacy, Ethics, and Analytics. 66-69 - Ian Grigg, Peter Gutmann:
The Curse of Cryptographic Numerology. 70-72 - Sean Heelan:
Vulnerability Detection Systems: Think Cyborg, Not Robot. 74-77 - Michael Lesk:
Salmon, Songs, and Blankets: Creativity on the Northwest Coast. 78-81 - Brad Arkin:
Never Waste a Crisis. 82-85 - Daniel E. Geer Jr.:
New Measures. 86-87 - Steven M. Bellovin:
Clouds from Both Sides. 88
Volume 9, Number 4, July - August 2011
- Fred B. Schneider, Deirdre K. Mulligan:
A Doctrinal Thesis. 3-4 - Lee Garber:
News Briefs. 6-8 - Gary McGraw:
Silver Bullet Talks with John Savage. 9-12 - Lee M. Hively, Frederick T. Sheldon, Anna Cinzia Squicciarini:
Toward Scalable Trustworthy Computing Using the Human-Physiology-Immunity Metaphor. 14-23 - Quyen L. Nguyen, Arun Sood:
A Comparison of Intrusion-Tolerant System Architectures. 24-31 - David Dittrich, Michael D. Bailey, Sven Dietrich:
Building an Active Computer Security Ethics Community. 32-40 - Danny Dhillon:
Developer-Driven Threat Modeling: Lessons Learned in the Trenches. 41-47 - Gregory J. Conti, James Caroland:
Embracing the Kobayashi Maru: Why You Should Teach Your Students to Cheat. 48-51 - Denis Trcek:
Trust Management in the Pervasive Computing Era. 52-55 - David P. Fidler:
Was Stuxnet an Act of War? Decoding a Cyberattack. 56-59 - Sean W. Smith:
Room at the Bottom: Authenticated Encryption on Slow Legacy Networks. 60-63 - Tara Whalen:
Security as if People Mattered. 64-67 - Charlie Miller:
Mobile Attacks and Defense. 68-70 - Michael E. Locasto, Matthew C. Little:
A Failure-Based Discipline of Trustworthy Information Systems. 71-75 - Michael Lesk:
Reading: From Paper to Pixels. 76-79 - John Diamant:
Resilient Security Architecture: A Complementary Approach to Reducing Vulnerabilities. 80-84 - Daniel E. Geer Jr.:
Attack Surface Inflation. 85-86 - Daniel E. Geer Jr.:
Eisenhower Revisited. 88
Volume 9, Number 5, September - October 2011
- John Viega:
Ten Years of Trustworthy Computing: Lessons Learned. 3-4 - Lee Garber:
News Briefs. 6-8 - Gary McGraw:
Silver Bullet Talks with Elinor Mills. 9-12 - Thomas A. Berson, Dorothy E. Denning:
Cyberwarfare. 13-15 - Scott D. Applegate:
Cybermilitias and Political Hackers: Use of Irregular Forces in Cyberwarfare. 16-22 - James A. Lewis:
Cyberwar Thresholds and Effects. 23-29 - Raymond C. Parks, David P. Duggan:
Principles of Cyberwarfare. 30-35 - David Elliott:
Deterring Strategic Cyberattack. 36-40 - Philip O'Kane, Sakir Sezer, Kieran McLaughlin:
Obfuscation: The Hidden Malware. 41-47 - Carl A. Gunter, David M. Liebovitz, Bradley A. Malin:
Experience-Based Access Management: A Life-Cycle Framework for Identity and Access Management Systems. 48-55 - Raheem A. Beyah, Aravind Venkataraman:
Rogue-Access-Point Detection: Challenges, Solutions, and Future Directions. 56-61 - Shuihua Han, Stephen Leung, Zongwei Luo:
Tamper Detection in the EPC Network Using Digital Watermarking. 62-69 - Wenliang Du:
SEED: Hands-On Lab Exercises for Computer Security Education. 70-73 - Landon P. Cox:
Truth in Crowdsourcing. 74-76 - Jeffrey K. MacKie-Mason:
All Space Will Be Public Space. 77-80 - Dimitri do B. DeFigueiredo:
The Case for Mobile Two-Factor Authentication. 81-85 - Daniel E. Geer Jr., Peter Kuper:
When $80 Billion Is Not Enough. 86-87 - Bruce Schneier:
Empathy and Security. 88
Volume 9, Number 6, November - December 2011
- Marc Donner:
The Invisible Computers. 3 - Gary McGraw:
Silver Bullet Talks with Halvar Flake. 5-8 - Lee Garber:
News Briefs. 9-11 - William A. Arbaugh, Deborah A. Frincke:
Living with Insecurity. 12-13 - Rosa R. Heckle:
Security Dilemma: Healthcare Clinicians at Work. 14-19 - Debin Liu, Ninghui Li, XiaoFeng Wang, L. Jean Camp:
Security Risk Management Using Incentives. 20-28 - Antonio Manuel Fernandez Villamor, Juan Carlos Yelmo Garcia:
Helping Users Deal with Digital Threats: The Online User Supervision Architecture. 29-35 - Steven Cheung:
Securing Collaborative Intrusion Detection Systems. 36-42 - Simson L. Garfinkel, George W. Dinolt:
Operations with Degraded Security. 43-48 - Joel Weis, Jim Alves-Foss:
Securing Database as a Service: Issues and Compromises. 49-55 - Mohamed Kaâniche, Aad P. A. van Moorsel:
It All Depends, and Increasingly So. 56-57 - Cynthia E. Irvine:
The Value of Capture-the-Flag Exercises in Education: An Interview with Chris Eagle. 58-60 - Tara Whalen:
Mobile Devices and Location Privacy: Where Do We Go from Here? 61-62 - Kirsten Ferguson-Boucher:
Cloud Computing: A Records and Information Management Perspective. 63-66 - Dan Guido:
A Case Study of Intelligence-Driven Defense. 67-70 - Kathleen M. Moriarty:
Incident Coordination. 71-75 - Michael Lesk:
Cybersecurity and Economics. 76-79 - Robert Fly:
Detecting Fraud on Websites. 80-85 - Daniel E. Geer Jr.:
Small Is Beautiful, Big Is Inevitable. 86-87 - Steven M. Bellovin:
Security Think. 88
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.