Journal: IEEE Security & Privacy

Volume 9, Issue 6

3 -- 0Marc Donner. The Invisible Computers
5 -- 8Gary McGraw. Silver Bullet Talks with Halvar Flake
9 -- 11Lee Garber. News Briefs
12 -- 13William A. Arbaugh, Deborah A. Frincke. Living with Insecurity
14 -- 19Rosa R. Heckle. Security Dilemma: Healthcare Clinicians at Work
20 -- 28Debin Liu, Ninghui Li, Xiaofeng Wang, L. Jean Camp. Security Risk Management Using Incentives
29 -- 35Antonio Manuel Fernandez Villamor, Juan Carlos Yelmo Garcia. Helping Users Deal with Digital Threats: The Online User Supervision Architecture
36 -- 42Steven Cheung. Securing Collaborative Intrusion Detection Systems
43 -- 48Simson Garfinkel, George W. Dinolt. Operations with Degraded Security
49 -- 55Joel Weis, Jim Alves-Foss. Securing Database as a Service: Issues and Compromises
56 -- 57Mohamed Kaâniche, Aad P. A. van Moorsel. It All Depends, and Increasingly So
58 -- 60Cynthia E. Irvine. The Value of Capture-the-Flag Exercises in Education: An Interview with Chris Eagle
61 -- 62Tara Whalen. Mobile Devices and Location Privacy: Where Do We Go from Here?
63 -- 66Kirsten Ferguson-Boucher. Cloud Computing: A Records and Information Management Perspective
67 -- 70Dan Guido. A Case Study of Intelligence-Driven Defense
71 -- 75Kathleen M. Moriarty. Incident Coordination
76 -- 79Michael Lesk. Cybersecurity and Economics
80 -- 85Robert Fly. Detecting Fraud on Websites
86 -- 87Daniel E. Geer Jr.. Small Is Beautiful, Big Is Inevitable
88 -- 0Steven M. Bellovin. Security Think

Volume 9, Issue 5

3 -- 4John Viega. Ten Years of Trustworthy Computing: Lessons Learned
6 -- 8Lee Garber. News Briefs
9 -- 12Gary McGraw. Silver Bullet Talks with Elinor Mills
13 -- 15Thomas A. Berson, Dorothy E. Denning. Cyberwarfare
16 -- 22Scott D. Applegate. Cybermilitias and Political Hackers: Use of Irregular Forces in Cyberwarfare
23 -- 29James A. Lewis. Cyberwar Thresholds and Effects
30 -- 35Raymond C. Parks, David P. Duggan. Principles of Cyberwarfare
36 -- 40David Elliott. Deterring Strategic Cyberattack
41 -- 47Philip O'Kane, Sakir Sezer, Kieran McLaughlin. Obfuscation: The Hidden Malware
48 -- 55Carl A. Gunter, David M. Liebovitz, Bradley Malin. Experience-Based Access Management: A Life-Cycle Framework for Identity and Access Management Systems
56 -- 61Raheem A. Beyah, Aravind Venkataraman. Rogue-Access-Point Detection: Challenges, Solutions, and Future Directions
62 -- 69Shuihua Han, Stephen Leung, Zongwei Luo. Tamper Detection in the EPC Network Using Digital Watermarking
70 -- 73Wenliang Du. SEED: Hands-On Lab Exercises for Computer Security Education
74 -- 76Landon P. Cox. Truth in Crowdsourcing
77 -- 80Jeffrey K. MacKie-Mason. All Space Will Be Public Space
81 -- 85Dimitri do B. DeFigueiredo. The Case for Mobile Two-Factor Authentication
86 -- 87Daniel E. Geer Jr., Peter Kuper. When $80 Billion Is Not Enough
88 -- 0Bruce Schneier. Empathy and Security

Volume 9, Issue 4

3 -- 4Fred B. Schneider, Deirdre K. Mulligan. A Doctrinal Thesis
6 -- 8Lee Garber. News Briefs
9 -- 12Gary McGraw. Silver Bullet Talks with John Savage
14 -- 23Lee Hively, Frederick T. Sheldon, Anna Cinzia Squicciarini. Toward Scalable Trustworthy Computing Using the Human-Physiology-Immunity Metaphor
24 -- 31Quyen L. Nguyen, Arun Sood. A Comparison of Intrusion-Tolerant System Architectures
32 -- 40David Dittrich, Michael Bailey, Sven Dietrich. Building an Active Computer Security Ethics Community
41 -- 47Danny Dhillon. Developer-Driven Threat Modeling: Lessons Learned in the Trenches
48 -- 51Gregory J. Conti, James Caroland. Embracing the Kobayashi Maru: Why You Should Teach Your Students to Cheat
52 -- 55Denis Trcek. Trust Management in the Pervasive Computing Era
56 -- 59David P. Fidler. Was Stuxnet an Act of War? Decoding a Cyberattack
60 -- 63Sean W. Smith. Room at the Bottom: Authenticated Encryption on Slow Legacy Networks
64 -- 67Tara Whalen. Security as if People Mattered
68 -- 70Charlie Miller. Mobile Attacks and Defense
71 -- 75Michael E. Locasto, Matthew C. Little. A Failure-Based Discipline of Trustworthy Information Systems
76 -- 79Michael Lesk. Reading: From Paper to Pixels
85 -- 86Daniel E. Geer Jr.. Attack Surface Inflation
88 -- 0Daniel E. Geer Jr.. Eisenhower Revisited

Volume 9, Issue 3

3 -- 4Robin E. Bloomfield. Resilient to the Unexpected
6 -- 8Lee Garber. News Briefs
9 -- 14Gary McGraw. Silver Bullet Talks with Ralph Langner
16 -- 17David Evans, Sal Stolfo. Guest Editors Introduction: The Science of Security
18 -- 25Jason Bau, John C. Mitchell. Security Modeling and Analysis
26 -- 32Anupam Datta, Jason Franklin, Deepak Garg, Limin Jia, Dilsun Kirli Kaynar. On Adversary Models and Compositional Security
33 -- 41Jean Paul Degabriele, Kenny Paterson, Gaven Watson. Provable Security in the Real World
42 -- 48David Barrera, Paul C. van Oorschot. Secure Software Installation on Smartphones
49 -- 51Ralph Langner. Stuxnet: Dissecting a Cyberwarfare Weapon
52 -- 55Jonathan Spring. Monitoring Cloud Computing by Layer, Part 2
56 -- 59Gregory J. Conti, Thomas Babbitt, John Nelson. Hacking Competitions and Their Untapped Potential for Security Education
60 -- 65Sal Stolfo, Steven M. Bellovin, David Evans. Measuring Security
66 -- 69Paul M. Schwartz. Privacy, Ethics, and Analytics
70 -- 72Ian Grigg, Peter Gutmann. The Curse of Cryptographic Numerology
74 -- 77Sean Heelan. Vulnerability Detection Systems: Think Cyborg, Not Robot
78 -- 81Michael Lesk. Salmon, Songs, and Blankets: Creativity on the Northwest Coast
82 -- 85Brad Arkin. Never Waste a Crisis
86 -- 87Daniel E. Geer. New Measures
88 -- 0Steven M. Bellovin. Clouds from Both Sides

Volume 9, Issue 2

3 -- 0Marc Donner. Privacy and the System Life Cycle
5 -- 7Lee Garber. News Briefs
8 -- 11Gary McGraw. Silver Bullet Talks with David Rice
12 -- 17Mary Frances Theofanos, Shari Lawrence Pfleeger. Guest Editors Introduction: Shouldn t All Security Be Usable?
18 -- 26Cristian Bravo-Lillo, Lorrie Faith Cranor, Julie S. Downs, Saranga Komanduri. Bridging the Gap in Computer Security Warnings: A Mental Model Approach
27 -- 34Kristin Fuglerud, Øystein Dale. Secure and Inclusive Authentication with a Talking Mobile One-Time-Password Client
35 -- 42M. Eric Johnson, Nicholas D. Willey. Usability Failures and Healthcare Data Hemorrhages
43 -- 49Robert W. Reeder, Stuart E. Schechter. When the Password Doesn t Work: Secondary Authentication for Websites
50 -- 57Bernd Grobauer, Tobias Walloschek, Elmar Stöcker. Understanding Cloud Computing Vulnerabilities
58 -- 65Stefan Fenz, Andreas Ekelhart. Verification, Validation, and Evaluation in Information Security Risk Management
66 -- 68Jonathan Spring. Monitoring Cloud Computing by Layer, Part 1
69 -- 71Matt Bishop. Teaching Security Stealthily
72 -- 74Jennifer L. Bayuk. Systems Security Engineering
75 -- 78Hervé Chabanne, Mehdi Tibouchi. Securing E-passports with Elliptic Curves
79 -- 82Chris Greamo, Anup Ghosh. Sandboxing and Virtualization: Modern Tools for Combating Malware
83 -- 85Patrick McDaniel. Data Provenance and Security
89 -- 92Brian Chess, Brad Arkin. Software Security in Practice
93 -- 94Daniel E. Geer Jr.. Correlation Is Not Causation
96 -- 0Bruce Schneier. Detecting Cheaters

Volume 9, Issue 1

3 -- 4John Viega. Reality Check
8 -- 11Gary McGraw. Silver Bullet Talks with Paul Kocher
12 -- 14Giovanni Vigna. The 2010 International Capture the Flag Competition
15 -- 17Lee Garber. News Briefs
18 -- 21Cynthia E. Irvine, J. R. Rao. Guest Editors Introduction: Engineering Secure Systems
22 -- 30Paul A. Karger, Suzanne McIntosh, Elaine R. Palmer, David C. Toll, Samuel Weber. Lessons Learned: Building the Caernarvon High-Assurance Operating System
31 -- 39Clark Weissman, Timothy E. Levin. Lessons Learned from Building a High-Assurance Crypto Gateway
40 -- 48Joshua Schiffman, Thomas Moyer, Trent Jaeger, Patrick McDaniel. Network-Based Root of Trust for Installation
49 -- 57M. Eric Johnson, Shari Lawrence Pfleeger. Addressing Information Risk in Turbulent Times
58 -- 63James Alexander, Jonathan M. Smith. Disinformation: A Taxonomy
64 -- 72Brett Stone-Gross, Marco Cova, Bob Gilbert, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna. Analysis of a Botnet Takeover
73 -- 75Lori M. Kaufman. How Private Is the Internet?
76 -- 79Fred H. Cate. A Transatlantic Convergence on Privacy?
83 -- 87Wendy Seltzer. Exposing the Flaws of Censorship by Domain Name
88 -- 90Michael Lesk. What Is Information Worth?
91 -- 92Richard Bejtlich, John Steven, Gunnar Peterson. Directions in Incident Detection and Response
93 -- 94Daniel E. Geer Jr.. Does a Rising Tide Lift All Boats?
96 -- 0Daniel E. Geer Jr.. A Time for Choosing