Journal: IEEE Security & Privacy

Volume 10, Issue 6

3 -- 4John Viega. Giving Back
6 -- 8Lee Garber. Security, Privacy, Policy, and Dependability Roundup
9 -- 12Gary McGraw. Silver Bullet Talks with Howard Schmidt
13 -- 16John Viega. Ten Years On, How Are We Doing? (Spoiler Alert: We Have No Clue)
17 -- 19Dan Thomsen, Jeremy Epstein, Peter G. Neumann. Lost Treasures
20 -- 25Richard E. Smith. A Contemporary Look at Saltzer and Schroeder's 1975 Design Principles
26 -- 35Steve Lipner, Trent Jaeger, Mary Ellen Zurko. Lessons from VAX/SVS for High-Assurance VM Systems
36 -- 39Howard E. Shrobe, Daniel Adams. Suppose We Got a Do-Over: A Revolution for Secure Computing
40 -- 44Steven J. Murdoch, Mike Bond, Ross J. Anderson. How Certification Systems Fail: Lessons from the Ware Report
45 -- 50Jeffrey T. McDonald, Todd R. Andel. Integrating Historical Security Jewels in Information Assurance Education
52 -- 62Fernando Alonso-Fernandez, Julian Fiérrez, Javier Ortega-Garcia. Quality Measures in Biometric Systems
63 -- 69Dinei A. F. Florêncio, Cormac Herley. Is Everything We Know about Password Stealing Wrong?
70 -- 73Eugene Y. Vasserman, Krishna K. Venkatasubramanian, Oleg Sokolsky, Insup Lee. Security and Interoperable-Medical-Device Systems, Part 2: Failures, Consequences, and Classification
74 -- 77Susan Older, Shiu-Kai Chin. Engineering Assurance at the Undergraduate Level
78 -- 82Michael Brennan. Academic Impact at the Federal Trade Commission
84 -- 87Marco Prandini, Marco Ramilli. Return-Oriented Programming
88 -- 90Rick Wash. Folk Security
91 -- 93Josh Kebbel-Wyen. Training an Army of Security Ninjas
94 -- 95Daniel E. Geer Jr., Daniel B. Larremore. Progress Is Infectious
96 -- 0Steven M. Bellovin. The Major Cyberincident Investigations Board

Volume 10, Issue 5

3 -- 0Robin E. Bloomfield. Are Things Getting Worse?
5 -- 7Gary McGraw. Silver Bullet Talks with Kay Connelly
8 -- 9Lee Garber. Security, Privacy, and Policy Roundup
10 -- 15Ann Cavoukian, Alan Davidson, Ed Felton, Marit Hansen, Susan Landau, Anna Slomovic. Privacy: Front and Center
16 -- 17Michael I. Shamos, Alec Yasinsac. Realities of E-voting Security
18 -- 24Aleksander Essex, Urs Hengartner. Hover: Trustworthy Elections with Hash-Only Verification
25 -- 32Richard Buckland, Roland Wen. The Future of E-voting in Australia
33 -- 41Philip B. Stark, David Wagner. Evidence-Based Elections
42 -- 49Mark Lindeman, Philip B. Stark. A Gentle Introduction to Risk-Limiting Audits
50 -- 52Merle S. King, Brian Hancock. Electronic Voting Security 10 Years after the Help America Vote Act
53 -- 60Mariana Raykova 0001, Ang Cui, Binh Vo, Bin Liu, Tal Malkin, Steven M. Bellovin, Salvatore J. Stolfo. Usable, Secure, Private Search
61 -- 63Krishna K. Venkatasubramanian, Eugene Y. Vasserman, Oleg Sokolsky, Insup Lee. Security and Interoperable-Medical-Device Systems, Part 1
64 -- 67Matt Bishop, Sean Peisert. Security and Elections
68 -- 70John Viega, Hugh Thompson. The State of Embedded-Device Security (Spoiler Alert: It's Bad)
71 -- 74Joshua J. Pauli, Patrick Henry Engebretson. Filling Your Cyber Operations Training Toolbox
75 -- 78Sean W. Smith. Security and Cognitive Bias: Exploring the Role of the Mind
79 -- 81Michael Lesk. The Price of Privacy
82 -- 85Zeljko Obrenovic, Bart den Haak. Integrating User Customization and Authentication: The Identity Crisis
86 -- 87Daniel E. Geer Jr.. Risk Aversion
88 -- 0Bruce Schneier. The Importance of Security Engineering

Volume 10, Issue 4

3 -- 0John Viega. Cloud Security: Not a Problem
5 -- 9Shari Lawrence Pfleeger. Security Measurement Steps, Missteps, and Next Steps
10 -- 15Shari Lawrence Pfleeger, Marc Rogers, Masooda Bashir, Kelly Caine, Deanna D. Caputo, Michael Losavio, Salvatore J. Stolfo. Does Profiling Make Us More Secure?
16 -- 18Lee Garber. Security, Privacy, and Policy Roundup
19 -- 22Gary McGraw. Silver Bullet Talks with Randy Sabett
24 -- 25Jose Nazario, John Kristoff. Internet Infrastructure Security
26 -- 34Ahmad AlSa'deh, Christoph Meinel. Secure Neighbor Discovery: Review, Challenges, Perspectives, and Recommendations
35 -- 43Matthew Dunlop, Stephen Groat, William Urbanski, Randy C. Marchany, Joseph G. Tront. The Blind Man's Bluff Approach to Security Using IPv6
44 -- 49Sergio Sánchez García, Ana Gómez Oliva, Emilia Pérez Belleboni. Is Europe Ready for a Pan-European Identity Management System?
50 -- 53Jan Kallberg. The Common Criteria Meets Realpolitik: Trust, Alliances, and Potential Betrayal
54 -- 61Frederick T. Sheldon, John Mark Weber, Seong-Moo Yoo, W. David Pan. The Insecurity of Wireless Networks
62 -- 70György Dán, Henrik Sandberg, Mathias Ekstedt, Gunnar Björkman. Challenges in Power System Information Security
71 -- 74Anthony Dessiatnikoff, Yves Deswarte, Eric Alata, Vincent Nicomette. Potential Attacks on Onboard Aerospace Systems
75 -- 79Efstratios Gavas, Nasir Memon, Douglas Britton. Winning Cybersecurity One Challenge at a Time
80 -- 81Helena Handschuh. Hardware-Anchored Security Based on SRAM PUFs, Part 2
82 -- 84Chris Valasek. Primitive-Chaining Exploits: A Real-World Example
85 -- 87Patrick McDaniel. Bloatware Comes to the Smartphone
88 -- 90Michael Lesk. Georgia on My Mind
91 -- 93Jeremiah Grossman. The State of Website Security
94 -- 95Daniel E. Geer Jr., Bob Blakley. Are You Smarter than the TSA? (Hint: No)
96 -- 0Daniel E. Geer Jr., Jerry Archer. Stand Your Ground

Volume 10, Issue 3

3 -- 0Shari Lawrence Pfleeger. A Key to the Castle
5 -- 8George Cybenko, Carl E. Landwehr. Security Analytics and Measurements
9 -- 11Gary McGraw. Silver Bullet Talks with Giovanni Vigna
12 -- 13Lee Garber. Security, Privacy, and Policy Roundup
14 -- 15Brian Chess, Chris Wysopal. Guest editors' introduction: Software Assurance for the Masses
16 -- 23Cristina Cifuentes, Nathan Keynes, Lian Li, Nathan Hawes, Manuel Valdiviezo. Transitioning Parfait into a Development Tool
24 -- 31Robert A. Martin, Steven M. Christey. The Software Industry's "Clean Water Act" Alternative
32 -- 39James Walden, Maureen Doyle. SAVI: Static-Analysis Vulnerability Indicator
40 -- 47Paul Anderson. Measuring the Value of Static-Analysis Tool Deployments
48 -- 52Paul E. Black. Static Analyzers: Seat Belts for Your Code
53 -- 56Brian Chess, Kris Britton, Chris Eng, Bill Pugh, Lakshmikanth Raghavan, Jacob West. Static Analysis in Motion
57 -- 63Karen Renaud. Blaming Noncompliance Is Too Convenient: What Really Causes Information Breaches?
64 -- 71Rohan M. Amin, Julie Ryan, Johan van Dorp. Detecting Targeted Malicious Email
72 -- 75Lorenzo Strigini. Resilience: What Is It, and How Much Do We Want?
76 -- 79Celia Paulsen, Ernest McDuffie, William Newhouse, Patricia Toth. NICE: Creating a Cybersecurity Workforce and Aware Public
80 -- 83Helena Handschuh. Hardware-Anchored Security Based on SRAM PUFs, Part 1
84 -- 87Michael Lesk. The Clouds Roll By
88 -- 92Eric Baize. Developing Secure Products in the Age of Advanced Persistent Threats
93 -- 95Daniel E. Geer Jr., Mukul Pareek. ICS Update
96 -- 0Steven M. Bellovin. Fighting the Last War

Volume 10, Issue 2

3 -- 5Jeremy Epstein. Can We Be Too Careful?
7 -- 10Jeremy Epstein. Reflecting on Some Past Predictions
11 -- 14Gary McGraw. Silver Bullet Talks with Neil Daswani
15 -- 17Lee Garber. Security, Privacy, and Policy Roundup
19 -- 23Shari Lawrence Pfleeger, Cynthia E. Irvine, Mischel Kwon. Guest Editors' Introduction
24 -- 32Iacovos Kirlappos, Martina Angela Sasse. Security Education against Phishing: A Modest Proposal for a Major Rethink
33 -- 39Lance J. Hoffman, Diana Burley, Costis Toregas. Holistically Building the Cybersecurity Workforce
40 -- 49Susanne Furman, Mary Frances Theofanos, Yee-Yin Choong, Brian Stanton. Basing Cybersecurity Training on User Perceptions
50 -- 53Mischel Kwon, Michael J. Jacobs, David Cullinane, Christopher G. Ipsen, James Foley. Educating Cyber Professionals: A View from Academia, the Private Sector, and Government
54 -- 59Scott Charney. Collective Defense: Applying the Public-Health Model to the Internet
60 -- 64Sanjeev Kumar, Sirisha Surisetty. Microsoft vs. Apple: Resilience against Distributed Denial-of-Service Attacks
65 -- 66Peter G. Neumann, Ulf Lindqvist. The IEEE Symposium on Security and Privacy Is Moving to San Francisco
67 -- 70Gernot Heiser, Toby C. Murray, Gerwin Klein. It's Time for Trustworthy Systems
71 -- 75Michael Bailey, David Dittrich, Erin Kenneally, Douglas Maughan. The Menlo Report
76 -- 79Diana Maimut, Khaled Ouafi. Lightweight Cryptography for RFID Tags
80 -- 83Barbara Endicott-Popovsky, Donald J. Horowitz. Unintended Consequences: Digital Evidence in Our Legal System
84 -- 86Chris Rohlf, Yan Ivnitskiy. The Security Challenges of Client-Side Just-in-Time Engines
87 -- 91Len Sassaman, Meredith L. Patterson, Sergey Bratus. A Patch for Postel's Robustness Principle
93 -- 96Lorrie Faith Cranor. Can Users Control Online Behavioral Advertising Effectively?
97 -- 101Barbara Fichtinger, Frances Paulisch, Peter Panholzer. Driving Secure Software Development Experience in a Diverse Product Environment
102 -- 103Daniel E. Geer Jr.. Numbers Worth Having
104 -- 0Bruce Schneier. How Changing Technology Affects Security

Volume 10, Issue 1

6 -- 10Anup K. Ghosh, Gary McGraw. Lost Decade or Golden Era: Computer Security since 9/11
22 -- 27Dirk Balfanz, Richard Chow, Ori Eisen, Markus Jakobsson, Steve Kirsch, Scott Matsumoto, Jesus Molina, Paul C. van Oorschot. The Future of Authentication
28 -- 36Cormac Herley, Paul C. van Oorschot. A Research Agenda Acknowledging the Persistence of Passwords
37 -- 45Amir Herzberg, Ronen Margulies. Training Johnny to Authenticate (Safely)
46 -- 54Andreas Poller, Ulrich Waldmann, Sven Vowe, Sven Türpe. Electronic Identity Cards for User Authentication - Promise and Practice
55 -- 59Idoia Aguirre, Sergio Alonso. Improving the Automation of Security Information Management: A Collaborative Approach
60 -- 68James Pettigrew, Julie Ryan. Making Successful Security Decisions: A Qualitative Evaluation
69 -- 72Jean Arlat, Zbigniew Kalbarczyk, Takashi Nanya. Nanocomputing: Small Devices, Large Dependability Challenges
73 -- 76Jelena Mirkovic, Terry Benzel. Teaching Cybersecurity with DeterLab
77 -- 79Tara Whalen. This Time, It's Personal: Recent Discussions on Concepts of Personal Information
80 -- 83Jan Camenisch, Anja Lehmann, Gregory Neven. Electronic Identities Need Private Credentials
84 -- 87Don A. Bailey. Moving 2 Mishap: M2M's Impact on Privacy and Safety
88 -- 90Michael Lesk. Your Memory Is Now a Vendor Service
91 -- 93Bronwen Matthews. Optimizing Product Improvement Spending with Third-Party Security Consultants
94 -- 95Daniel E. Geer Jr.. Power. Law