3 | -- | 4 | Carl E. Landwehr. Revolution through Competition? |
6 | -- | 7 | Brandi Ortega. News Briefs |
8 | -- | 11 | Gary McGraw. Silver Bullet Talks with Mikko Hypponen [Interview] |
12 | -- | 0 | Martin R. Stytz. What Are the Numbers? [review of Security metrics: Replacing Fear, Uncertainty, and Doubt; Jaquith, A.; 2006] |
16 | -- | 24 | Markus Jakobsson, Sid Stamm. Web Camouflage: Protecting Your Clients from Browser-Sniffing Attacks |
25 | -- | 31 | Kjell Jørgen Hole, Vebjørn Moen, André N. Klingsheim, Knut M. Tande. Lessons from the Norwegian ATM System |
32 | -- | 40 | Ugo Piazzalunga, Paolo Salvaneschi, Francesco Balducci, Pablo Jacomuzzi, Cristiano Moroncelli. Security Strength Measurement for Dongle-Protected Software |
41 | -- | 49 | Ninghui Li, Ji-Won Byun, Elisa Bertino. A Critique of the ANSI Standard on Role-Based Access Control |
51 | -- | 53 | David F. Ferraiolo, Rick Kuhn, Ravi S. Sandhu. RBAC Standard Rationale: Comments on A Critique of the ANSI Standard on Role-Based Access Control |
54 | -- | 57 | Pythagoras Petratos. Weather, Information Security, and Markets |
58 | -- | 60 | E. Michael Power. Developing a Culture of Privacy: A Case Study |
61 | -- | 64 | Serge Vaudenay. E-Passport Threats |
65 | -- | 68 | William H. Allen, Richard Ford. How Not to Be Seen II: The Defenders Fight Back |
69 | -- | 73 | David McKinney. Vulnerability Bazaar |
74 | -- | 77 | Luiz Felipe Perrone. Could a Caveman Do It? The Surprising Potential of Simple Attacks |
78 | -- | 80 | Martin R. Stytz. Who Are the Experts, and What Have They Done for Us Lately? |
81 | -- | 83 | John Steven, Gunnar Peterson. Metricon 2.0 |
84 | -- | 87 | Matt Bishop. About Penetration Testing |
88 | -- | 0 | Bruce Schneier. The Death of the Security Industry |