Journal: IEEE Security & Privacy

Volume 7, Issue 6

3 -- 0Fred B. Schneider. Labeling-in Security
5 -- 7Gary McGraw. Silver Bullet Talks with Fred Schneider
8 -- 9James Figueroa. News Briefs
10 -- 13Shari Lawrence Pfleeger, Salvatore J. Stolfo. Addressing the Insider Threat
14 -- 21Deanna Caputo, Marcus A. Maloof, Gregory D. Stephens. Detecting Insider Theft of Trade Secrets
22 -- 29Brian M. Bowen, Malek Ben Salem, Shlomo Hershkop, Angelos D. Keromytis, Salvatore J. Stolfo. Designing Host and Network Sensors to Mitigate the Insider Threat
30 -- 38Felicia Duran, Stephen H. Conrad, Gregory N. Conrad, David P. Duggan, Edward Bruce Held. Building A System For Insider Security
39 -- 45Saar Drimer, Steven J. Murdoch, Ross J. Anderson. Failures of Tamper-Proofing in PIN Entry Devices
46 -- 53Eric A. Bier, Richard Chow, Philippe Golle, Tracy Holloway King, Jessica Staddon. The Rules of Redaction: Identify, Protect, Review (and Repeat)
54 -- 56Bruce Potter. High Time for Trusted Computing
57 -- 59Adam Goldstein, David Bucciero. The Dartmouth Cyber Security Initiative: Faculty, Staff, and Students Work Together
60 -- 64O. Sami Saydjari, Cynthia E. Irvine. A Tale of Three Cyber-Defense Workshops
69 -- 71Richard Ford, William H. Allen. Malware Shall Greatly Increase ...
72 -- 76Franco Callegati, Marco Ramilli. Frightened by Links
77 -- 81Michael E. Locasto, Sergey Bratus, Brian Schulte. Bickering In-Depth: Rethinking the Composition of Competing Security Systems
82 -- 85Alessandro Acquisti. Nudging Privacy: The Behavioral Economics of Personal Information
86 -- 87Daniel E. Geer Jr., Daniel G. Conway. Patch Grief with Proverbs
88 -- 0Daniel E. Geer Jr.. Deskilling Digital Security

Volume 7, Issue 5

3 -- 0Bret Michael. In Clouds Shall We Trust?
5 -- 8Gary McGraw. Silver Bullet Talks with Bob Blakley
9 -- 10James Figueroa. News Briefs
11 -- 13Daniel Massey, Dorothy E. Denning. Guest Editors Introduction: Securing the Domain Name System
14 -- 20Ioannis C. Avramopoulos, Martin Suchara. Protecting the DNS from Routing Attacks: Two Alternative Anycast Implementations
21 -- 28D. Kevin McGrath, Andrew J. Kalafut, Minaxi Gupta. Phishing Infrastructure Fluxes All the Way
29 -- 35Ramaswamy Chandramouli, Scott Rose. Open Issues in Secure DNS Deployment
36 -- 43Wouter C. A. Wijngaards, Benno J. Overeinder. Securing DNS: Extending DNS Servers with a DNSSEC Validator
44 -- 51Eric Osterweil, Lixia Zhang. Interadministrative Challenges in Managing DNSKEYs
53 -- 55Kara L. Nance. Teach Them When They Aren t Looking: Introducing Security in CS1
56 -- 59Scott Charney. The Evolution of Online Identity
60 -- 63Fred H. Cate. Security, Privacy, and the Role of Law
64 -- 65Justin Troutman, Vincent Rijmen. Green Cryptography: Cleaner Engineering through Recycling, Part 2
66 -- 68Michael Howard. Managing the Security Wall of Data
70 -- 74Stefano Zanero. Wireless Malware Propagation: A Reality Check
75 -- 77Matt Blaze. Taking Surveillance Out of the Shadows
78 -- 81Michael Lesk. Incentives to Innovate: Improve the Past or Break with It?
82 -- 85Ryan W. Gardner, Matt Bishop, Tadayoshi Kohno. Are Patched Machines Really Fixed?
86 -- 87Daniel E. Geer Jr., Daniel G. Conway. Risk Concentration
88 -- 0Steven M. Bellovin, Daniel G. Conway. Security as a Systems Property

Volume 7, Issue 4

3 -- 4Marc Donner. New Models for Old
8 -- 10James Figueroa. News Briefs
11 -- 14Gary McGraw. Silver Bullet Talks with Virgil Gligor
15 -- 21Herbert Lin. Lifting the Veil on Cyber Offense
22 -- 28Jeff Yan, Ahmad Salah El Ahmad. CAPTCHA Security: A Case Study
29 -- 34Gordon F. Hughes, Tom Coughlin, Daniel M. Commins. Disposal of Disk and Tape Data by Secure Sanitization
35 -- 43Qun Ni, Elisa Bertino, Jorge Lobo, Seraphin B. Calo. Privacy-Aware Role-Based Access Control
44 -- 51Michael Meike, Johannes Sametinger, Andreas Wiesauer. Security in Open Source Web Content Management Systems
52 -- 60Rachel Rue, Shari Lawrence Pfleeger. Making the Best Use of Cybersecurity Economic Models
61 -- 64Lori M. Kaufman. Data Security in the World of Cloud Computing
65 -- 67Janne Merete Hagen. Human Relationships: A Never-Ending Security Education Challenge?
68 -- 70Betsy Masiello. Deconstructing the Privacy Experience
71 -- 73Justin Troutman, Vincent Rijmen. Green Cryptography: Cleaner Engineering through Recycling
74 -- 76Ronda Henning. Predictable Surprises
77 -- 79Patrick Traynor. Securing Cellular Infrastructure: Challenges and Opportunities
80 -- 83Jeffrey K. MacKie-Mason. Incentive-Centered Design for Security
84 -- 87Andy Steingruebl, Gunnar Peterson. Software Assumptions Lead to Preventable Errors
88 -- 0Bruce Schneier. Security, Group Size, and the Human Brain

Volume 7, Issue 3

3 -- 4Carl E. Landwehr. A National Goal for Cyberspace: Create an Open, Accountable Internet
6 -- 7James Figueroa. News Briefs
8 -- 10James McGovern. Silver Bullet Talks with Gary McGraw
11 -- 12Gary McGraw, Ming Chow. Guest Editors Introduction: Securing Online Games: Safeguarding the Future of Software Security
13 -- 19Stephen Bono, Dan Caselden, Gabriel Landau, Charlie Miller. Reducing the Attack Surface in Massively Multiplayer Online Role-Playing Games
20 -- 22Aaron Portnoy, Ali-Rizvi Santiago. Walking on Water: A Cheating Case Study
29 -- 36Stefan Mitterhofer, Christopher Krügel, Engin Kirda, Christian Platzer. Server-Side Bot Detection in Massively Multiplayer Online Games
37 -- 44Jeff Jianxin Yan, Brian Randell. An Investigation of Cheating in Online Games
45 -- 52M. Eric Johnson, Eric Goetz, Shari Lawrence Pfleeger. Security through Information Risk Management
53 -- 56Michael E. Locasto. Helping Students 0wn Their Own Code
57 -- 59Vijay Varadharajan. A Note on Trust-Enhanced Security
60 -- 63Marc Donner. War Stories
64 -- 67Gregory J. Conti, Edward Sobiesk. Malicious Interfaces and Personalization s Uninviting Future
68 -- 71Michael Howard. Improving Software Security by Eliminating the CWE Top 25 Vulnerabilities
72 -- 74Bojan Zdrnja. Malicious JavaScript Insertion through ARP Poisoning Attacks
75 -- 77Patrick Drew McDaniel, Stephen E. McLaughlin. Security and Privacy Challenges in the Smart Grid
78 -- 81Michael Lesk. Reading Over Your Shoulder
82 -- 85Anton Chuvakin, Gunnar Peterson. Logging in the Age of Web Services
86 -- 87Daniel E. Geer Jr., Daniel G. Conway. A Doubt of the Benefit
88 -- 0Daniel E. Geer Jr.. Digital Endosymbiosis

Volume 7, Issue 2

3 -- 4Fred B. Schneider. Accountability for Perfection
8 -- 9Brandi Ortega. News Briefs
10 -- 14Gary McGraw. Silver Bullet Talks with Jeremiah Grossman
15 -- 0Shari Lawrence Pfleeger. Searching for You
16 -- 17Michael A. Caloyannides, Nasir Memon, Wietse Venema. Digital Forensics
18 -- 25Michael A. Caloyannides. Forensics Is So Yesterday
26 -- 29Brian D. Carrier. Digital Forensics Works
30 -- 37Brian Hay, Matt Bishop, Kara L. Nance. Live Analysis: Progress and Challenges
38 -- 44Simson L. Garfinkel, James J. Migletz. New XML-Based Files Implications for Forensics
45 -- 48Gavin Wylie Manes, Elizabeth Downing. Overview of Licensing and Legal Issues for Digital Forensic Investigators
49 -- 55Vassil Roussev. Hashing and Data Fingerprinting in Digital Forensics
56 -- 62Sarah Spiekermann, Sergei Evdokimov. Critical RFID Privacy-Enhancing Technologies
67 -- 70John Harauz, Lori M. Kaufman. A New Era of Presidential Security: The President and His BlackBerry
71 -- 74Jungwoo Ryoo, Angsana A. Techatassanasoontorn, Dongwon Lee. Security Education Using Second Life
75 -- 78Khaled El Emam, Patricia Kosseim. Privacy Interests in Prescription Data, Part 2: Patient Privacy
79 -- 82Julien Brouchier, Tom Kean, Carol Marsh, David Naccache. Temperature Attacks
83 -- 86Martin Gilje Jaatun, Jostein Jensen, Havard Vegge, Finn Michael Halvorsen, Rune Walso Nergard. Fools Download Where Angels Fear to Tread
87 -- 90Michael Zhivich, Robert K. Cunningham. The Real Cost of Software Errors
91 -- 93Gunnar Peterson. Service-Oriented Security Indications for Use
94 -- 95Daniel E. Geer Jr., Daniel G. Conway. Hard Data Is Good to Find
96 -- 0Steven M. Bellovin. The Government and Cybersecurity

Volume 7, Issue 1

3 -- 0Marc Donner. Reading (with) the Enemy
5 -- 6Brandi Ortega. Shaking Up the Cybersecurity Landscape
7 -- 11Gary McGraw. Silver Bullet Talks with Gunnar Peterson
12 -- 13Jaynarayan H. Lala, Fred B. Schneider. IT Monoculture Security Risks and Defenses
14 -- 17Kenneth P. Birman, Fred B. Schneider. The Monoculture Risk Put into Context
18 -- 25Angelos D. Keromytis. Randomized Instruction Sets and Runtime Environments Past Research and Future Directions
26 -- 33Daniel Williams, Wei Hu, Jack W. Davidson, Jason Hiser, John C. Knight, Anh Nguyen-Tuong. Security through Diversity: Leveraging Virtual Machine Technology
34 -- 41Kjell Jørgen Hole, André N. Klingsheim, Lars-Helge Netland, Yngve Espelid, Thomas Tjøstheim, Vebjørn Moen. Risk Assessment of a National Security Infrastructure
42 -- 48Michel Cukier, Susmit Panjwani. Prioritizing Vulnerability Remediation by Determining Attacker-Targeted Vulnerabilities
50 -- 57William Enck, Machigar Ongtang, Patrick Drew McDaniel. Understanding Android Security
58 -- 62Susan Landau. The NRC Takes on Data Mining, Behavioral Surveillance, and Privacy
63 -- 67Bret Michael, Jeffrey M. Voas, Phillip A. Laplante. Cyberpandemics: History, Inevitability, Response
68 -- 71Yuen-Yan Chan, Victor K.-W. Wei. Teaching for Conceptual Change in Security Awareness: A Case Study in Higher Education
72 -- 76Patricia Kosseim, Khaled El Emam. Privacy Interests in Prescription Data, Part I: Prescriber Privacy
78 -- 81Franco Callegati, Walter Cerroni, Marco Ramilli. Man-in-the-Middle Attack to the HTTPS Protocol
82 -- 85Phillip A. Porras. Directions in Network-Based Security Monitoring
86 -- 87Daniel E. Geer Jr., Daniel G. Conway. The 0wned Price Index
88 -- 0Bruce Schneier. Architecture of Privacy