Journal: IEEE Security & Privacy

Volume 4, Issue 6

3 -- 0George Cybenko. Weak Links, Strong Ties
5 -- 0Eugene H. Spafford. Desert Island Books
6 -- 9Brandi Ortega. News
10 -- 13Gary McGraw. Silver Bullet Speaks with Ed Felten
15 -- 17Simson L. Garfinkel, Michael D. Smith. Guest Editors Introduction: Data Surveillance
18 -- 27Robert Popp, J. C. Poindexter. Countering Terrorism through Information and Privacy Protection Technologies
28 -- 34Jeff Jonas. Threat and Fraud Intelligence, Las Vegas Style
36 -- 43David J. Chaboya, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins. Network Intrusion Detection: Automated and Manual Methods Prone to Attack and Evasion
44 -- 52Vincent C. S. Lee, Linyi Shao. Estimating Potential IT Security Losses: An Alternative Quantitative Approach
53 -- 55Janice Y. Tsai, Serge Egelman. Soups 2006
56 -- 59Bradley S. Rubin, Donald Cheung. Computer Security Education and Research: Handle with Care
60 -- 63Phillip A. Porras. Privacy-Enabled Global Threat Monitoring
64 -- 66John P. Tomaszewski. Are You Sure You Had a Privacy Incident?
67 -- 70Vanessa Gratzer, David Naccache. Cryptography, Law Enforcement, and Mobile Communications
71 -- 73David Ladd. A Software Procurement and Security Primer
74 -- 77Laree Kiely, Terry V. Benzel. Systemic Security Management
78 -- 80William Suchan, Edward Sobiesk. Strengthening the Weakest Link in Digital Protection
81 -- 84Gunnar Peterson, John Steven. Defining Misuse within the Development Process
85 -- 89Peter Mell, Karen Scarfone, Sasha Romanosky. Common Vulnerability Scoring System
96 -- 0Daniel E. Geer Jr.. Evidently Evidentiary

Volume 4, Issue 5

4 -- 0Marc Donner. Insecurity through Obscurity
7 -- 0Geraldine MacDonald. Cross-Border Transaction Liability
8 -- 10Brandi Ortega. News Briefs
11 -- 14Gary McGraw. Interview: Silver Bullet Speaks to Marcus Ranum
16 -- 25Matthew Geiger, Lorrie Faith Cranor. Scrubbing Stubborn Data: An Evaluation of Counter-Forensic Privacy Tools
26 -- 33Robert Thibadeau. Trusted Computing for Disk Drives and Other Peripherals
34 -- 39Peng Shaunghe, Han Zhen. Enhancing PC Security with a U-Key
40 -- 49Grant A. Jacoby, Randy Marchany, Nathaniel J. Davis IV. Using Battery Constraints within Mobile Hosts to Improve Network Security
50 -- 56Brian Randell, Peter Y. A. Ryan. Voting Technologies and Trust
59 -- 59Stephen A. Weis. Privacy Enhancing Technologies
60 -- 63Jill Slay, Benjamin Turnbull. Computer Security Education and Research in Australia
64 -- 66Luther Martin. Fitting Square Pegs into Round Holes
67 -- 70Sarah Gordon. Understanding the Adversary: Virus Writers and Beyond
71 -- 73Elias Levy. Worst-Case Scenario
74 -- 78Roland L. Trope. Immaterial Transfers with Material Consequences
80 -- 83Kenneth R. van Wyk, John Steven. Essential Factors for Successful Software Security Awareness Training
84 -- 87Doug Montgomery, Sandra Murphy. Toward Secure Routing Infrastructures
88 -- 88Bruce Schneier. University Networks and Data Security

Volume 4, Issue 4

4 -- 5Carl E. Landwehr. Speaking of Privacy
6 -- 8Brent Kesler, Heather Drinan. News Briefs
9 -- 9Charles P. Pfleeger, Shari Lawrence Pfleeger. Why We Won t Review Books by Hackers
10 -- 13Gary McGraw. Silver Bullet Speaks with Dan Geer
14 -- 15Mike Andrews. Guest Editor s Introduction: The State of Web Security
16 -- 24J. D. Meier. Web application security engineering
25 -- 31John Viega, Jeremy Epstein. Why applying standards to Web services is not enough
32 -- 41Mark Curphey, Rudolph Arawo. Web application security assessment tools
42 -- 49Denis Verdon. Security policies and the software developer
50 -- 53Richard R. Brooks, Christopher N. Vutsinas. Kafka in the academy: a note on ethics in IA education
54 -- 62Paulo Veríssimo, Nuno Ferreira Neves, Christian Cachin, Jonathan A. Poritz, David Powell, Yves Deswarte, Robert J. Stroud, Ian Welch. Intrusion-tolerant middleware: the road to automatic security
64 -- 68Roland L. Trope, E. Michael Power. Lessons for laptops from the 18th century
70 -- 72Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum. RFID malware: truth vs. myth
74 -- 79Michael A. Howard. A process for performing security code reviews
80 -- 83Ivan Arce. Voices, I hear voices [VoIP security]
84 -- 87Jonathan Herzog. Applying protocol analysis to security device interfaces
88 -- 91Gunnar Peterson. Introduction to identity management risk metrics
92 -- 95Jim Robbins, John T. Sabo. Managing information privacy: developing a context for security and privacy standards convergence
96 -- 96Steven M. Bellovin. On the Brittleness of Software and the Infeasibility of Security Metrics

Volume 4, Issue 3

3 -- 0Fred B. Schneider. Here Be Dragons
5 -- 0Shari Lawrence Pfleeger. Everything You Wanted to Know about Privacy (But Were Afraid to Ask)
6 -- 10Brent Kesler, Heather Drinan. News Briefs
11 -- 13Gary McGraw. Silver Bullet Speaks to Avi Rubin
15 -- 19James X. Dempsey, Ira Rubinstein. Guest Editors Introduction: Lawyers and Technologists--Joined at the Hip?
20 -- 28Patricia L. Bellia. The fourth amendment and emerging communications technologies
29 -- 36Albert Gidari. Designing the right wiretap solution: setting standards under CALEA
37 -- 44Erin Egan, Tim Jucovy. Building a better filter how to create a safer Internet and avoid the litigation trap
45 -- 51Charles D. Curran. Combating spam, spyware, and other desktop intrusions: legal considerations in operating trusted intermediary technologies
60 -- 65Pinny Sheoran, Oris Friesen, Barbara J. Huffman de Belón. Developing and sustaining information assurance: the role of community colleges. Part 2
66 -- 68Robin E. Bloomfield, Sofia Guerra, Ann Miller, Marcelo Masera, Charles B. Weinstock. International Working Group on Assurance Cases (for Security)
69 -- 72Kenneth G. Paterson, Arnold K. L. Yau. Lost in translation: theory and practice in cryptography
74 -- 76Tuomas Aura. Why you shouldn t study security [security education]
77 -- 79Martin R. Stytz, Sheila B. Banks. Dynamic software security testing
80 -- 83Pravir Chandra, Brian Chess, John Steven. Putting the tools to work: how to succeed with source code analysis
84 -- 87Anne Anderson. Web services policies
88 -- 88Daniel E. Geer Jr.. Convergence

Volume 4, Issue 2

4 -- 5Marc Donner. The Impending Debate
7 -- 0Mikhael Felker. Internet War Games: Power of the Masses
8 -- 13Brent Kesler, Heather Drinan, Nancy Fontaine. News Briefs
14 -- 20Kjell Jørgen Hole, Vebjørn Moen, Thomas Tjøstheim. Case Study: Online Banking Security
21 -- 29Alain P. Hiltgen, Thorsten Kramp, Thomas Weigold. Secure Internet Banking Authentication
30 -- 38Wenjie Wang, Yufei Yuan, Norman P. Archer. A Contextual Framework for Combating Identity Theft
40 -- 49David Hwang, Patrick Schaumont, Kris Tiri, Ingrid Verbauwhede. Securing Embedded Systems
50 -- 55Feisal Keblawi, Dick Sullivan. Applying the Common Criteria in Systems Engineering
56 -- 60Peter Kuper. A Warning to Industry--Fix It or Lose It
61 -- 63Matt Bishop, Deborah A. Frincke. Who Owns Your Computer?
64 -- 67Rosario Gennaro. Randomness in Cryptography
68 -- 71James A. Whittaker, Richard Ford. How to Think about Security
72 -- 75Thorsten Holz, Simon Marechal, Frédéric Raynal. New Threats and Attacks on the World Wide Web
76 -- 79Scott Bradner. The End of End-to-End Security?
80 -- 83Michael E. Lesk. Should Indexing Be Fair Use? The Battle over Google Book Search
84 -- 87John Steven. Adopting an Enterprise Software Security Framework
88 -- 91William E. Burr. Cryptographic Hash Standards: Where Do We Go from Here?

Volume 4, Issue 1

5 -- 0George Cybenko. Why Johnny Can t Evaluate Security Risk
9 -- 0Whitfield Diffie. Chattering about SIGINT
10 -- 13Laurianne McLaughlin. Philip Zimmermann on What s Next after PGP
14 -- 16Heather Drinan, Nancy Fontaine, Brent Kesler. News Briefs
18 -- 23Edward W. Felten, J. Alex Halderman. Digital Rights Management, Spyware, and Security
24 -- 32John G. Levine, Julian B. Grizzard, Henry L. Owen. Detecting and Categorizing Kernel-Level Rootkits to Aid Future Detection
33 -- 39Nir Kshetri. The Simple Economics of Cybercrimes
40 -- 45Steven Cheung. Denial of Service against the Domain Name System
46 -- 52John Black, Martin Cochran, Martin Ryan Gardner. A Security Analysis of the Internet Chess Club
54 -- 56Christian Rechberger, Vincent Rijmen, Nicolas Sklavos. The NIST Cryptographic Workshop on Hash Functions
57 -- 60Timothy Rosenberg, Lance J. Hoffman. Taking Networks on the Road: Portable Solutions for Security Educators
62 -- 69Virgil D. Gligor, Thomas Haigh, Dick Kemmerer, Carl E. Landwehr, Steven B. Lipner, John D. McLean. Information Assurance Technology Forecast 2005
70 -- 73Jean-Sébastien Coron. What Is Cryptography?
74 -- 76Robert C. Seacord. Secure Coding in C and C++: Of Strings and Integers
77 -- 79Dragos Ruiu. Learning from Information Security History
80 -- 83Jeremy Epstein, Scott R. Matsumoto, Gary McGraw. Software Security and SOA: Danger, Will Robinson!
84 -- 87Ramaswamy Chandramouli, Scott Rose. Challenges in Securing the Domain Name System
88 -- 0Steven M. Bellovin. Unconventional Wisdom