Journal: IEEE Security & Privacy

Volume 5, Issue 6

3 -- 4Carl E. Landwehr. Revolution through Competition?
6 -- 7Brandi Ortega. News Briefs
8 -- 11Gary McGraw. Silver Bullet Talks with Mikko Hypponen [Interview]
12 -- 0Martin R. Stytz. What Are the Numbers? [review of Security metrics: Replacing Fear, Uncertainty, and Doubt; Jaquith, A.; 2006]
16 -- 24Markus Jakobsson, Sid Stamm. Web Camouflage: Protecting Your Clients from Browser-Sniffing Attacks
25 -- 31Kjell Jørgen Hole, Vebjørn Moen, André N. Klingsheim, Knut M. Tande. Lessons from the Norwegian ATM System
32 -- 40Ugo Piazzalunga, Paolo Salvaneschi, Francesco Balducci, Pablo Jacomuzzi, Cristiano Moroncelli. Security Strength Measurement for Dongle-Protected Software
41 -- 49Ninghui Li, Ji-Won Byun, Elisa Bertino. A Critique of the ANSI Standard on Role-Based Access Control
51 -- 53David F. Ferraiolo, Rick Kuhn, Ravi S. Sandhu. RBAC Standard Rationale: Comments on A Critique of the ANSI Standard on Role-Based Access Control
54 -- 57Pythagoras Petratos. Weather, Information Security, and Markets
58 -- 60E. Michael Power. Developing a Culture of Privacy: A Case Study
61 -- 64Serge Vaudenay. E-Passport Threats
65 -- 68William H. Allen, Richard Ford. How Not to Be Seen II: The Defenders Fight Back
69 -- 73David McKinney. Vulnerability Bazaar
74 -- 77Luiz Felipe Perrone. Could a Caveman Do It? The Surprising Potential of Simple Attacks
78 -- 80Martin R. Stytz. Who Are the Experts, and What Have They Done for Us Lately?
81 -- 83John Steven, Gunnar Peterson. Metricon 2.0
84 -- 87Matt Bishop. About Penetration Testing
88 -- 0Bruce Schneier. The Death of the Security Industry

Volume 5, Issue 5

3 -- 4Fred B. Schneider. Technology Scapegoats and Policy Saviors
7 -- 0Shari Lawrence Pfleeger. Spooky Lessons
8 -- 11Gary McGraw. Silver Bullet Talks with Annie Antón
12 -- 14Brandi Ortega. News Briefs
15 -- 23Paul N. Otto, Annie I. Antón, David L. Baumer. The ChoicePoint Dilemma: How Data Brokers Should Handle the Privacy of Personal Information
24 -- 31Apostol T. Vassilev, Bertrand du Castel, Asad M. Ali. Personal Brokerage of Web Service Access
32 -- 39Frank Mabry, John R. James, Aaron J. Ferguson. Unicode Steganographic Exploits: Maintaining Enterprise Border Security
40 -- 49Barry E. Mullins, Timothy H. Lacey, Robert F. Mills, Joseph M. Trechter, Samuel D. Bass. How the Cyber Defense Exercise Shaped an Information-Assurance Curriculum
50 -- 56Ilan Oshri, Julia Kotlarsky, Corey Hirsch. An Information Security Strategy for Networkable Devices
57 -- 60Jonathan P. Caulkins, Eric D. Hough, Nancy R. Mead, Hassan Osman. Optimizing Investments in Security Countermeasures: A Practical Tool for Fixed Budgets
62 -- 65Julie J. C. H. Ryan. Plagiarism, Graduate Education, and Information Security
66 -- 68David Fraser. The Canadian Response to the USA Patriot Act
69 -- 71Vanessa Gratzer, David Naccache. Trust on a Nationwide Scale
76 -- 79Gary McGraw, Greg Hoglund. Online Games and Security
80 -- 82Fred Dushin, Eric Newcomer. Handling Multiple Credentials in a Heterogeneous SOA Environment
83 -- 87Roger Dingledine, Nick Mathewson, Paul F. Syverson. Deploying Low-Latency Anonymity: Design Challenges and Social Factors
88 -- 0Steve Bellovin. Seers and Craftspeople

Volume 5, Issue 4

4 -- 0Marc Donner. Cyberassault on Estonia
6 -- 9Brandi Ortega. News Briefs
10 -- 13Gary McGraw, Ross Anderson. Silver Bullet Talks with Ross Anderson
14 -- 21Jennifer English, David Coe, Rhonda Kay Gaede, David W. Hyde, Jeffrey H. Kulick. MEMS-Assisted Cryptography for CPI Protection
22 -- 27Faith M. Heikkila. Encryption: Security Considerations for Portable Media Devices
33 -- 39Jangbok Kim, Kihyun Chung, Kyunghee Choi. Spam Filtering With Dynamically Updated URL Statistics
40 -- 47Christos K. Dimitriadis. Improving Mobile Core Network Security with Honeynets
48 -- 51Sean Peisert, Matt Bishop. I Am a Scientist, Not a Philosopher!
52 -- 56Michael Franz. Containing the Ultimate Trojan Horse
58 -- 61Sophie In t Veld. Data Sharing across the Atlantic
62 -- 64Onur Acucmez, Jean-Pierre Seifert, Çetin Kaya Koç. Micro-Architectural Cryptanalysis
65 -- 67William H. Allen. Mixing Wheat with the Chaff: Creating Useful Test Data for IDS Evaluation
68 -- 71Ivan Arce. Ghost in the Virtual Machine
72 -- 75Surgey Bratus. What Hackers Learn that the Rest of Us Don t: Notes on Hacker Curriculum
76 -- 79Michael Lesk. The New Front Line: Estonia under Cyberassault
80 -- 83Suvajit Gupta, Joel Winstead. Using Attack Graphs to Design Systems
84 -- 87Pete Bramhall, Marit Hansen, Kai Rannenberg, Thomas Roessler. User-Centric Identity Management: New Trends in Standardization and Regulation
88 -- 0Daniel E. Geer Jr.. The End of Black and White

Volume 5, Issue 3

3 -- 4Carl E. Landwehr. Food for Thought: Improving the Market for Assurance
6 -- 9Gary McGraw. Silver Bullet Talks with Becky Bace
10 -- 12Brandi Ortega. News Briefs
13 -- 15Shari Lawrence Pfleeger, Roland L. Trope, Charles C. Palmer. Guest Editors Introduction: Managing Organizational Security
16 -- 24M. Eric Johnson, Eric Goetz. Embedding Information Security into the Organization
25 -- 31Shari Lawrence Pfleeger, Martin Libicki, Michael Webber. I ll Buy That! Cybersecurity in the Internet Marketplace
32 -- 39Roland L. Trope, E. Michael Power, Vincent I. Polley, Bradford C. Morley. A Coherent Strategy for Data Security through Data Governance
40 -- 49David Rosenblum. What Anyone Can Know: The Privacy Risks of Social Networking Sites
50 -- 56Walter S. Baer, Andrew Parkinson. Cyberinsurance in IT Security Management
58 -- 61Richard S. Swart, Robert F. Erbacher. Educating Students to Create Trustworthy Systems
62 -- 65Matthew Carpenter, Tom Liston, Ed Skoudis. Hiding Virtualization from Attackers and Malware
66 -- 68Edward Sobiesk, Gregory J. Conti. The Cost of Free Web Tools
69 -- 71Anna Lysyanskaya. Authentication without Identification
75 -- 77David Ahmad. The Contemporary Software Security Landscape
78 -- 81M. Angela Sasse. Red-Eye Blink, Bendy Shuffle, and the Yuck Factor: A User Experience of Biometric Airport Systems
82 -- 84Michael N. Gagnon, Stephen Taylor, Anup K. Ghosh. Software Protection through Anti-Debugging
85 -- 87Johan Peeters, Paul Dyson. Cost-Effective Security
88 -- 0Bruce Schneier. Nonsecurity Considerations in Security Decisions

Volume 5, Issue 2

4 -- 5Fred B. Schneider. Trusted Computing in Context
7 -- 10Brandi Ortega. News Briefs
11 -- 14Gary McGraw. Silver Bullet Speaks with Dorothy Denning
15 -- 16Ivan Arce. A Surprise Party (on Your Computer)?
17 -- 25Luca Carettoni, Claudio Merloni, Stefano Zanero. Studying Bluetooth Malware Propagation: The BlueBag Project
26 -- 31Vanessa Gratzer, David Naccache. Alien vs. Quine
32 -- 39Carsten Willems, Thorsten Holz, Felix C. Freiling. Toward Automated Dynamic Malware Analysis Using CWSandbox
40 -- 45Robert Lyda, James Hamrock. Using Entropy Analysis to Find Encrypted and Packed Malware
46 -- 54Danilo Bruschi, Lorenzo Martignoni, Mattia Monga. Code Normalization for Self-Mutating Malware
55 -- 63Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Elisa Bertino. Trust Negotiation in Identity Management
64 -- 67Marianthi Theoharidou, Dimitris Gritzalis. Common Body of Knowledge for Information Security
68 -- 71Keye Martin. Secure Communication without Encryption?
72 -- 75E. Michael Power, Jonathan Gilhen, Roland L. Trope. Setting Boundaries at Borders: Reconciling Laptop Searches and Privacy
76 -- 79Patrick P. Tsang. When Cryptographers Turn Lead into Gold
80 -- 84Apu Kapadia. A Case (Study) For Usability in Secure Email Communication
85 -- 87Michael Lesk. South Korea s Way to the Future
88 -- 91Elizabeth A. Nichols, Gunnar Peterson. A Metrics Framework to Drive Application Security Improvement
92 -- 96Ramaswamy Chandramouli, Philip Lee. Infrastructure Standards for Smart ID Card Deployment

Volume 5, Issue 1

3 -- 4Carl E. Landwehr. New Challenges for the New Year
8 -- 0Ross Anderson. Software Security: State of the Art
9 -- 11Gary McGraw. Silver Bullet Speaks with John Stewart [Interview]
12 -- 15Brandi Ortega. News Briefs
16 -- 22Rolf Oppliger. Providing Certified Mail Services on the Internet
23 -- 29Marco Domenico Aime, Giorgio Calandriello, Antonio Lioy. Dependability in Wireless Networks: Can We Rely on WiFi?
30 -- 35Carol Woody, Christopher Alberts. Considering Operational Security Risk during System Development
36 -- 44Wade H. Baker, Linda Wallace. Is Information Security Under Control?: Investigating Quality in Information Security Management
45 -- 52Annie I. Antón, Julia B. Eart, Matthew W. Vail, Neha Jain, Carrie M. Gheen, Jack M. Frink. HIPAA s Effect on Web Site Privacy Policies
53 -- 56Matt Bishop, Deborah A. Frincke. Achieving Learning Objectives through E-Voting Case Studies
57 -- 62Ravishankar K. Iyer, Zbigniew Kalbarczyk, Karthik Pattabiraman, William Healey, Wen-mei W. Hwu, Peter Klemperer, Reza Farivar. Toward Application-Aware Security and Reliability
63 -- 66Willi Geiselmann, Rainer Steinwandt. Special-Purpose Hardware in Cryptanalysis: The Case of 1, 024-Bit RSA
67 -- 69Richard Ford, William H. Allen. How Not to Be Seen
70 -- 75Adam J. O Donnell. The Evolutionary Microcosm of Stock Spam
73 -- 75Lori L. DeLooze. Providing Web Service Security in a Federated Environment
76 -- 79John Morris, Jon Peterson. Who s Watching You Now?
80 -- 0Steve Bellovin. DRM, Complexity, and Correctness