Journal: IEEE Security & Privacy

Volume 1, Issue 6

5 -- 7George Cybenko. From the Editors: Privacy Is the Issue
8 -- 13Greg Goth, Benjamin Alfonsi. News
14 -- 19Daniel E. Geer Jr., David Aucsmith, James A. Whittaker. Monoculture
20 -- 26Simson L. Garfinkel. Email-Based Identification and Authentication: An Alternative to PKI?
27 -- 34Dakshi Agrawal, Dogan Kesdogan. Measuring Anonymity: The Disclosure Attack
35 -- 39Jean-Marc Seigneur, Christian Damsgaard Jensen. Privacy Recovery with Disposable Email Addresses
40 -- 49Abdelmounaam Rezgui, Athman Bouguettaya, Mohamed Eltoweissy. Privacy on the Web: Facts, Challenges, and Solutions
50 -- 55Lorrie Faith Cranor. P3P: Making Privacy Policies More Useful
56 -- 58John S. Quarterman. The Ultimate in Instant Gratification
59 -- 61Cynthia E. Irvine. Teaching Constructive Security
62 -- 67Jeannette M. Wing. A Call to Action: Look Beyond the Horizon
68 -- 70Michael Lesk. Feist and Facts: If Data Is Protected, Will It Be More or Less Available?
71 -- 73Elias Levy. Crossover: Online Pests Plaguing the Offline World
74 -- 78Sean W. Smith, Jothy Rosenberg, Adam Golodner. A Funny Thing Happened on the Way to the Marketplace
79 -- 82Bill McCarty. The Honeynet Arms Race
83 -- 88. 2003 Annual Index IEEE Security & Privacy Volume 1
89 -- 91Michael A. Caloyannides. Digital Evidence and Reasonable Doubt
92 -- 0Bruce Schneier. Airplane Hackers

Volume 1, Issue 5

5 -- 0Carl E. Landwehr. From the Editor: Security Cosmology: Moving from Big Bang to Worlds in Collusion
6 -- 7. Security and Privacy Welcomes New Editorial Board Members
8 -- 11Greg Goth, Sandra Kay Miller. News
12 -- 13Scott L. Andresen. News Briefs
14 -- 0. Letters to the Editor
15 -- 0Robert J. Campbell. Crime Scene Investigators: The Next Generation
16 -- 18Dennis McGrath. Measuring the 4: 11 Effect: The Power Failure and the Internet
19 -- 25Massoud Amin. North America s Electricity Infrastructure: Are We Ready for More Perfect Storms?
26 -- 34Peter G. Capek, David M. Chess, Steve R. White. Merry Christma: An Early Network Worm
35 -- 43Hilarie K. Orman. The Morris Worm: A Fifteen-Year Perspective
44 -- 48Rolf Oppliger, Ruedi Rytz. Digital Evidence: Dream and Reality
49 -- 54Salim Hariri, Guangzhi Qu, Tushneem Dharmagadda, Modukuri Ramkishore, Cauligi S. Raghavendra. Impact Analysis of Faults and Attacks in Large-Scale Networks
55 -- 59Fred B. Schneider. Least Privilege and More
61 -- 63John Lenarcic. The Dinosaur and the Butterfly: A Tale of Computer Ethics
64 -- 67Daniel Ragsdale, Donald Welch, Ronald Dodge. Information Assurance the West Point Way
68 -- 72Nancy R. Mead. SEHAS 2003: The Future of High-Assurance Systems
73 -- 75Michael Lesk. Chicken Little and the Recorded Music Crisis
76 -- 77Jim Hearn. What Works?
78 -- 81Ivan Arce. The Rise of the Gadgets
82 -- 85Jean Camp. Access Denied
86 -- 88Martin R. Stytz, James A. Whittaker. Caution: This Product Contains Security Code
89 -- 92Bill McCarty. Automated Identity Theft
93 -- 95Michael A. Caloyannides. Keeping Offline Computer Usage Private

Volume 1, Issue 4

5 -- 0George Cybenko. Boiling Frogs?
6 -- 7. S&P Welcomes New Editorial Board Members
8 -- 11Laurianne McLaughlin, Rosemary Clandos. News
12 -- 13Scott L. Andresen. News Briefs
14 -- 0Martin R. Stytz. Setting the Standard for Security Literature
15 -- 23Alec Yasinsac, Robert F. Erbacher, Donald G. Marks, Mark Pollitt, Peter M. Sommer. Computer Forensics Education
24 -- 32Daniel Geer, Kevin Soo Hoo, Andrew Jaquith. Information Security: Why the Future Belongs to the Quants
33 -- 39David Moore, Vern Paxson, Stefan Savage, Colleen Shannon, Stuart Staniford-Chen, Nicholas Weaver. Inside the Slammer Worm
40 -- 49Christian S. Collberg, Ginger Myles, Andrew Huntwork. Sandmark--A Tool for Software Protection Research
50 -- 52Ting Yu, Marianne Winslett, Jason E. Holt. Two Security Symposia
53 -- 57. Bacon Ice Cream: The Best Mix of Proactive and Reactive Security?
58 -- 59Elias Levy. The Making of a Spam Zombie Army: Dissecting the Sobig Worms
60 -- 64Marc Donner. The Girl with No Eyes
65 -- 67Barbara Endicott-Popovsky. Ethics and Teaching Information Assurance
68 -- 72Bruce Potter. Wireless Security s Future
73 -- 74Michael Lesk. Making the Copyright Law Work
75 -- 76Jim Hearn. Keeping Up Appearances
77 -- 82Dave Ahmad. The Rising Threat of Vulnerabilities Due to Integer Errors
83 -- 86Herbert H. Thompson. Why Security Testing Is Hard
87 -- 90Bill McCarty. Botnets: Big and Bigger
91 -- 95Michael A. Caloyannides. The Assault on Logic
96 -- 0Bruce Schneier. The Speed of Security

Volume 1, Issue 3

0 -- 0Bruce Schneier. Guilty Until Proven Innocent?
6 -- 7Marc Donner. Toward a Security Ontology
8 -- 13Greg Goth, Scott L. Andresen. News
14 -- 0Nancy R. Mead. Building a Foundation
18 -- 23Lucila Ishitani, Virgílio A. F. Almeida, Wagner Meira Jr.. Masks: Bringing Anonymity and Personalization Together
24 -- 31Hassan Aljifri. IP Traceback: A New Denial-of-Service Deterrent?
32 -- 44Niels Provos, Peter Honeyman. Hide and Seek: An Introduction to Steganography
45 -- 49Václav Matyás Jr., Zdenek Ríha. Toward Reliable User Authentication through Biometrics
51 -- 55Marc Donner. Hey, Robot!
56 -- 58Deborah A. Frincke. Who Watches the Security Educators?
60 -- 62Edward W. Felten. Understanding Trusted Computing: Will Its Benefits Outweigh Its Drawbacks?
63 -- 66Michael Lesk. The Good, the Bad, and the Ugly: What Might Change if We Had Good DRM
67 -- 68Jim Hearn. Slow Dancing
70 -- 73Elias Levy. Poisoning the Software Supply Chain
75 -- 79Sean W. Smith. Humans in the Loop: Human-Computer Interaction and Security
80 -- 82Martin R. Stytz. The Case for Software Warranties
84 -- 86Michael A. Caloyannides. Society Cannot Function Without Privacy

Volume 1, Issue 2

6 -- 0George Cybenko. From the Editor: Sapphire/Slammer Redux
7 -- 10. Letters to the Editor
11 -- 13Daniel P. Dern. Privacy Concerns
15 -- 23Lance Spitzner. The Honeynet Project: Trapping the Hackers
24 -- 32Matt Blaze. Rights Amplification in Master-Keyed Mechanical Locks
33 -- 42Salil Prabhakar, Sharath Pankanti, Anil K. Jain. Biometric Recognition: Security and Privacy Concerns
43 -- 52William E. Burr. Selecting the Advanced Encryption Standard
53 -- 55Marc Donner. Post-Apocalypse Now
56 -- 58Jim Davis, Melissa Dark. Teaching Students to Design Secure Systems
59 -- 66Gary McGraw. From the Ground Up: The DIMACS Software Security Workshop
67 -- 69Michael Lesk. Copyright Enforcement or Censorship: New Uses for the DMCA?
70 -- 71Jim Hearn. Moving Forward?
72 -- 76Ivan Arce. The Weakest Link Revisited
77 -- 80Edward Ball, David W. Chadwick, Darren P. Mundy. Patient Privacy in Electronic Prescription Transfer
81 -- 83James A. Whittaker. Why Secure Applications are Difficult to Write
84 -- 87Michael Caloyannides. Engineering or Sloganeering? The Counterattack on Privacy
88 -- 0Bruce Schneier. Locks and Full Disclosure

Volume 1, Issue 1

5 -- 9George Cybenko. A Critical Need, An Ambitious Mission, A New Magazine
10 -- 12Sandra Kay Miller. Legal Battle Looming for Internet Protections Acts
13 -- 0Scott L. Andresen. New Draft to Secure Cyberspace Leaked
17 -- 27Simson L. Garfinkel, Abhi Shelat. Remembrance of Data Passed: A Study of Disk Sanitization Practices
28 -- 36Nick L. Petroni Jr., William A. Arbaugh. The Dangers of Mitigating Security Design Flaws: A Wireless Case Study
38 -- 45Crispin Cowan. Software Security for Open-Source Systems
46 -- 56Joshua W. Haines, Dorene Kewley Ryder, Laura Tinnel, Stephen Taylor. Validation of Sensor Alert Correlators
57 -- 61Michael Howard, Steve Lipner. Inside the Windows Security Push
63 -- 66Marc Donner. AI Bites Man?
67 -- 69Matt Bishop. What Is Computer Security?
70 -- 72Daniel J. Ryan. Two Views on Security Software Liability: Let the Legal System Decide
73 -- 75Carey Heckman. Two Views on Security Software Liability: Using the Right Legal Tools
76 -- 78Michael Lesk. Copyright Extension: Eldred v. Ashcroft
79 -- 81Jim Hearn. International Participation: The Continuing March Toward Security and Privacy
82 -- 87Ivan Arce, Elias Levy. An Analysis of the Slapper Worm
89 -- 93Sean W. Smith. Fairy Dust, Secrets, and the Real World
95 -- 98Martin R. Stytz, James A. Whittaker. Software Protection: Security s Last Stand?
100 -- 103Michael Caloyannides. Privacy vs. Information Technology
104 -- 0Bruce Schneier. We Are All Security Consumers