Journal: IEEE Security & Privacy

Volume 7, Issue 6

3 -- 0Fred B. Schneider. Labeling-in Security
5 -- 7Gary McGraw. Silver Bullet Talks with Fred Schneider
8 -- 9James Figueroa. News Briefs
10 -- 13Shari Lawrence Pfleeger, Salvatore J. Stolfo. Addressing the Insider Threat
14 -- 21Deanna Caputo, Marcus A. Maloof, Gregory D. Stephens. Detecting Insider Theft of Trade Secrets
22 -- 29Brian M. Bowen, Malek Ben Salem, Shlomo Hershkop, Angelos D. Keromytis, Salvatore J. Stolfo. Designing Host and Network Sensors to Mitigate the Insider Threat
30 -- 38Felicia Duran, Stephen H. Conrad, Gregory N. Conrad, David P. Duggan, Edward Bruce Held. Building A System For Insider Security
39 -- 45Saar Drimer, Steven J. Murdoch, Ross J. Anderson. Failures of Tamper-Proofing in PIN Entry Devices
46 -- 53Eric A. Bier, Richard Chow, Philippe Golle, Tracy Holloway King, Jessica Staddon. The Rules of Redaction: Identify, Protect, Review (and Repeat)
54 -- 56Bruce Potter. High Time for Trusted Computing
57 -- 59Adam Goldstein, David Bucciero. The Dartmouth Cyber Security Initiative: Faculty, Staff, and Students Work Together
60 -- 64O. Sami Saydjari, Cynthia E. Irvine. A Tale of Three Cyber-Defense Workshops
69 -- 71Richard Ford, William H. Allen. Malware Shall Greatly Increase ...
72 -- 76Franco Callegati, Marco Ramilli. Frightened by Links
77 -- 81Michael E. Locasto, Sergey Bratus, Brian Schulte. Bickering In-Depth: Rethinking the Composition of Competing Security Systems
82 -- 85Alessandro Acquisti. Nudging Privacy: The Behavioral Economics of Personal Information
86 -- 87Daniel E. Geer Jr., Daniel G. Conway. Patch Grief with Proverbs
88 -- 0Daniel E. Geer Jr.. Deskilling Digital Security