| 6 | -- | 8 | David Alan Grier. The Dictator and the Web Design |
| 11 | -- | 13 | Steven J. Vaughan-Nichols. Vendors Draw up a New Graphics-Hardware Approach |
| 14 | -- | 17 | George Lawton. The Changing Face of Open Source |
| 18 | -- | 21 | Linda Dailey Paulson. The Changing World of Outsourcing |
| 23 | -- | 29 | Nathanael Paul, Andrew S. Tanenbaum. Trustworthy Voting: From Machine to System |
| 30 | -- | 32 | Piotr Pacyna, Anthony M. Rutkowski, Amardeo Sarma, Kenji Takahashi. Trusted Identity for All: Toward Interoperable Trusted Identity Management Systems |
| 33 | -- | 40 | David W. Chadwick, George Inman. Attribute Aggregation in Federated Identity Management |
| 42 | -- | 49 | Paul Madsen, Hiroki Itoh. Challenges to Supporting Federated Assurance |
| 50 | -- | 57 | Federica Paci, Rodolfo Ferrini, Andrea Musci, Kevin Steuer Jr., Elisa Bertino. An Interoperable Approach to Multifactor Identity Verification |
| 58 | -- | 65 | Gabriel López, Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta, Joao Girão. A SWIFT Take on Identity Management |
| 66 | -- | 73 | Manuel Barranco, Julian Proenza, LuÃs Almeida. Boosting the Robustness of Controller Area Networks: CANcentrate and ReCANcentrate |
| 79 | -- | 83 | Bob Ward. Computer Society Connection |
| 87 | -- | 89 | Kirk W. Cameron. The Road to Greener IT Pastures |
| 90 | -- | 94 | Ken Birman, Jared Cantwell, Daniel Freedman, Qi Huang, Petko Nikolov, Krzysztof Ostrowski. Edge Mashups for Service-Oriented Collaboration |
| 95 | -- | 97 | Ali El Kateeb. Hardware Reconfiguration Capability for Third-Generation Sensor Nodes |
| 98 | -- | 101 | Bernard J. Jansen, Theresa Flaherty, Ricardo A. Baeza-Yates, Lee Hunter, Brendan Kitts, Jamie Murphy. The Components and Impact of Sponsored Search |
| 102 | -- | 104 | W. Neville Holmes. The Design of Government |