The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.06 - November-December (2003 vol.1)
pp: 83-88
Published by the IEEE Computer Society

AUTHOR INDEX

A

Agrawal, Dakshi et al, "Measuring Anonymity: The Disclosure Attack," [Understanding Privacy], Nov/Dec, pp. 27-34.

Ahmad, Dave, "The Rising Threat of Vulnerabilities Due to Integer Errors," [Attack Trends], Jul/Aug, pp. 77-82.

Alfonsi, Benjamin J., "Hacker Study: Aiding Security Measures Development?," [News], Nov/Dec, p. 11.

Aljifri, Hassan, "IP Traceback: A New Denial-of-Service Deterrent?," [Open-Source Security], May/Jun, pp. 24-31.

Almeida, Virgilio, see L. Ishitani, May/Jun, pp. 18-23.

Amin, Massoud, "North America's Electricity Infrastructure: Are We Ready for More Perfect Storms?," [Blackout 2003], Sep/Oct, pp. 19-25.

Andresen, Scott L., "New Draft to Secure Cyberspace Leaked," [News], Jan/Feb, p. 13.

Andresen, Scott L., "News Briefs," [News], Jul/Aug, pp. 12-13.

Andresen, Scott L., "News Briefs," [News], Sep/Oct, pp. 12-13.

Andresen, Scott L., "News Briefs," [News], Nov/Dec, pp. 12-13.

Andresen, Scott L., see G. Goth, May/Jun, pp. 8-13.

Arbaugh, William A., see N. Petroni, Jr., Jan/Feb, pp. 28-36.

Arce, Iván, and E. Levy, "An Analysis of the Slapper Worm," [Attack Trends], Jan/Feb, pp. 82-87.

Arce, Iván, "The Weakest Link Revisited," [Attack Trends], Mar/Apr, pp. 72-76.

Arce, Iván, "The Rise of the Gadgets," [Attack Trends], Sep/Oct, pp. 78-81.

Aucsmith, Dave, "Monocultures Are Hard to Find in Practice,"[Monoculture], Nov/Dec, pp. 15-17.

B

Ball, Edward, D. Chadwick, and D. Mundy, "Patient Privacy in Electronic Prescription Transfer," [Secure Systems], Mar/Apr, pp. 77-80.

Bishop, Matt, "What Is Computer Security?," [Education], Jan/Feb, pp. 67-69.

Blaze, Matt, "Rights Amplification in Master-Keyed Mechanical Locks," [Cryptology], Mar/Apr, pp. 24-32.

Bouguettaya , Athman, see A. Abdelmounaam, Nov/Dec, pp. 40-49.

Burr, William E., "Selecting the Advanced Encryption Standard," [Encryption Standards], Mar/Apr, pp. 43-52.

C

Caloyannides, Michael, "Privacy vs. Information Technology," [Privacy Matters], Jan/Feb, pp. 100-103.

Caloyannides, Michael A., "Engineering or Sloganeering? The Counterattack on Privacy," [Privacy Matters], Mar/Apr, pp. 84-87.

Caloyannides, Michael A., "Society Cannot Function Without Privacy," [Privacy Matters], May/Jun, pp. 84-86.

Caloyannides, Michael A., "The Assault on Logic," [Privacy Matters], Jul/Aug, pp. 91-95.

Caloyannides, Michael A., "Keeping Offline Computer Usage Private," [Privacy Matters], Sep/Oct, pp. 93-95.

Caloyannides, Michael A., "Digital 'Evidence' and Reasonable Doubt," [Privacy Matters], Nov/Dec, pp. 89-91.

Camp, Jean, "Access Denied," [Secure Systems], Sep/Oct, pp. 82-85.

Campbell, Robert J., "Crime Scene Investigators: The Next Generation," [Book Reviews], Sep/Oct, p. 15.

Capek, Peter G., D. Chess, and S. White, "Merry Christma: An Early Network Worm," [Christma Worm], Sep/Oct, pp. 26-34.

Chadwick, David W., see E. Ball, Mar/Apr, pp. 77-80.

Chess, David M., see P. Capek, Sep/Oct, pp. 26-34.

Clandos, Rosemary, "Eye on Cybercrime," [News], Jul/Aug, pp. 8-11.

Collberg, Christian, G. Myles, and A. Huntwork, "Sandmark—A Tool for Software Protection Research," [Software Protection], Jul/Aug, pp. 40-49.

Cowan, Crispin, "Software Security for Open-Source Systems," [Open-Source Security], Jan/Feb, pp. 38-45.

Cranor, Lorrie Faith, "P3P: making Privacy Policies More Useful," [Understanding Privacy], Nov/Dec, pp. 50-55.

Cybenko, George, "A Critical Need, An Ambitious Mission, A New Magazine," [From the Editor], Jan/Feb, pp. 5-9.

Cybenko, George, "Sapphire/Slammer Redux," [From the Editor], Mar/Apr, p. 6.

Cybenko, George, "Boiling Frogs?," [From the Editor], Jul/Aug, p. 5.

Cybenko, George, "Privacy Is the Issue," [From the Editor], Nov/Dec, p. 5.

D

Dark, Melissa, see J. Davis, Mar/Apr, pp. 56-58.

Davis, Jim, and M. Dark, "Teaching Students to Design Secure Systems," [Education], Mar/Apr, pp. 56-58.

Dern, Daniel P., "Privacy Concerns," [News], Mar/Apr, pp. 11-13.

Dharmagadda, Tushneem, see S. Hariri, Sep/Oct, pp. 49-54.

Dodge, Ron, see D. Ragsdale, Sep/Oct, pp. 64-67.

Donner, Marc, "AI Bites Man?," [Biblio Tech], Jan/Feb, pp. 63-66.

Donner, Marc, "Post-Apocalypse Now," [Biblio Tech], Mar/Apr, pp. 53-55.

Donner, Marc, "Hey, Robot!," [Biblio Tech], May/Jun, pp. 51-55.

Donner, Marc, "Toward a Security Ontology," [From the Editor], May/Jun, pp. 6-7.

Donner, Marc, "The Girl with No Eyes," [Biblio Tech], Jul/Aug, pp. 60-64.

E

Eltoweissy, Mohamed Y., see A. Rezgui, Nov/Dec, pp. 40-49.

Endicott-Popovsky, Barbara, "Ethics and Teaching Information Assurance," [Education], Jul/Aug, pp. 65-67.

Erbacher, Robert F., see A. Yasinsac, Jul/Aug, pp. 15-23.

F

Felten, Edward W., "Understanding Trusted Computing: Will Its Benefits Outweigh Its Drawbacks?," [On the Horizon], May/Jun, pp. 60-62.

Frincke, Deborah, "Who Watches the Security Educators?," [Education], May/Jun, pp. 56-58.

G

Garfinkel, Simson L., and A. Shelat, "Remembrance of Data Passed: A Study of Disk Sanitization Practices," [Data Forensics], Jan/Feb, pp. 17-27.

Garfinkel, Simson L., "Email-Based Identification and Authentication: An Alternative to PKI?," [Understanding Privacy], Nov/Dec, pp. 20-26.

Geer, Jr., Daniel, K. Hoo, and A. Jaquith, "Information Security: Why the Future Belongs to the Quants," [Information Security], Jul/Aug, pp. 24-32.

Geer, Jr., Daniel, "Monopoly Considered Harmful," [Monoculture], Nov/Dec, pp. 14-17.

Goth, Greg, "Questions about Strategy to Secure Cyberspace," [News], May/Jun, pp. 8-13.

Goth, Greg, "Antispam Bills Face Tough Challenges," [News], Sep/Oct, pp. 8-10.

Goth, Greg, "Addressing the Monoculture" [News], Nov/Dec, pp. 8-10.

H

Haines, Joshua, D. Ryder, L. Tinnel, and S. Taylor, "Validation of Sensor Alert Correlators," [Intrusion Alert Correlation], Jan/Feb, pp. 46-56.

Hariri, Salim, M. Ramkishore, T. Dharmagadda, G. Qu, and C. Raghavendra, "Impact Analysis of Faults and Attacks in Large-Scale Networks," [Impact Analysis], Sep/Oct, pp. 49-54.

Hearn, Jim, "International Participation: The Continuing March Toward Security and Privacy," [Global Perspectives], Jan/Feb, pp. 79-81.

Hearn, Jim, "Moving Forward?," [Global Perspectives], Mar/Apr, pp. 70-71.

Hearn, Jim, "Slow Dancing," [Global Perspectives], May/Jun, pp. 67-68.

Hearn, Jim, "Keeping Up Appearances," [Global Perspectives], Jul/Aug, pp. 75-76.

Hearn, Jim, "What Works?," [Global Perspectives], Sep/Oct, pp. 76-77.

Heckman, Carey, "Two Views on Security Software Liability: Using the Right Legal Tools," [On the Horizon], Jan/Feb, pp. 73-75.

Holt, Jason, see T. Yu, Jul/Aug, pp. 50-52.

Honeyman, Peter, see N. Provos, May/Jun, pp. 32-44.

Hoo, Kevin Soo, see D. Geer, Jr., Jul/Aug, pp. 24-32.

Howard, Michael, S. Lipner, "Inside the Windows Security Push," [Secure Coding], Jan/Feb, pp. 57-61.

Huntwork, Andrew, see C. Collberg, Jul/Aug, pp. 40-49.

I

Irvine, Cynthia E., "Teaching Constructive Security," [Education], Nov/Dec, pp. 59-61.

Ishitani, Lucila, V. Almeida, and W. Meira, Jr., "Masks: Bringing Anonymity and Personalization Together," [Privacy], May/Jun, pp. 18-23.

J

Jain, Anil K., see S. Prabhakar, Mar/Apr, pp. 33-42.

Jaquith, Andrew, see D. Geer, Jr., Jul/Aug, pp. 24-32.

Jensen, Christian Damsgaard, "Privacy Recovery with Disposable Email Addresses,"[Understanding Privacy], Nov/Dec, pp. 35-39.

K

Kesdogan, Dogan, see D. Agrawal, Nov/Dec, pp. 27-34.

L

Landwehr, Carl E., "Security Cosmology: Moving from Big Bang to Worlds in Collusion," [From the Editor], Sep/Oct, p. 5.

Lenarcic, John, "The Dinosaur and the Butterfly: A Tale of Computer Ethics," [Biblio Tech], Sep/Oct, pp. 61-63.

Lesk, Michael, "Copyright Extension: Eldred v. Ashcroft," [Digital Rights], Jan/Feb, pp. 76-78.

Lesk, Michael, "Copyright Enforcement or Censorship: New Uses for the DMCA?," [Digital Rights], Mar/Apr, pp. 67-69.

Lesk, Michael, "The Good, the Bad, and the Ugly: What Might Change if We Had Good DRM," [Digital Rights], May/Jun, pp. 63-66.

Lesk, Michael, "Making the Copyright Law Work," [Digital Rights], Jul/Aug, pp. 73-74.

Lesk, Michael, "Chicken Little and the Recorded Music Crisis," [Digital Rights], Sep/Oct, pp. 73-75.

Lesk, Michael, "Feist and Facts: If Data Is Protected, Will It Be More or Less Available?," [Digital Rights], Nov/Dec, pp. 68-70.

Levy, Elias, see I. Arce, Jan/Feb, pp. 82-87.

Levy, Elias, "Poisoning the Software Supply Chain," [Attack Trends], May/Jun, pp. 70-73.

Levy, Elias, "Crossover: Online Pests Plaguing the Offline World," [Attack Trends], Nov/Dec, pp. 71-73.

Levy, Elias, "The Making of a Spam Zombie Army: Dissecting the Sobig Worms," [Malware Recon], Jul/Aug, pp. 58-59.

Lipner, Steve, see M. Howard, Jan/Feb, pp. 57-61.

M

Marks, Donald G., see A. Yasinsac, Jul/Aug, pp. 15-23.

Matyas, Jr., Vaclav, and Z. Riha, "Toward Reliable User Authentication through Biometrics," [Biometrics], May/Jun, pp. 45-49.

McCarty, Bill, "Botnets: Big and Bigger," [The Honeynet Files], Jul/Aug, pp. 87-90.

McCarty, Bill, "Automated Identity Theft," [The Honeynet Files], Sep/Oct, pp. 89-92.

McCarty, Bill, "The Honeynet Arms Race," [The Honeynet Files], Nov/Dec, pp. 79-82.

McGrath, Dennis, "Measuring the 4:11 Effect: The Power Failure and the Internet," [Blackout 2003], Sep/Oct, pp. 16-18.

McGraw, Gary, "From the Ground Up: The DIMACS Software Security Workshop," [On the Horizon], Mar/Apr, pp. 59-66.

McLaughlin, Laurianne, "Virus-Writing 101: College Class Stirs Up Controversy," [News], Jul/Aug, pp. 8-11.

Mead, Nancy R., "Building a Foundation," [Book Reviews], May/Jun, p. 14.

Mead, Nancy R., "SEHAS 2003: The Future of High-Assurance Systems," [On the Horizon], Sep/Oct, pp. 68-72.

Meira, Jr., Wagner, see L. Ishitani, May/Jun, pp. 18-23.

Miller, Sandra Kay, "Legal Battle Looming for Internet Protections Acts," [News], Jan/Feb, pp. 10-12.

Miller, Sandra Kay, "Acquisition Accentuates Antivirus Industry," Sep/Oct, pp. 8-11.

Moore, David, S. Savage, C. Shannon, S. Staniford, V. Paxson, and N. Weaver, "Inside the Slammer Worm," [Slammer Worm Dissection], Jul/Aug, pp. 33-39.

Mundy, Darren, see E. Ball, Mar/Apr, pp. 77-80.

Myles, Ginger, see C. Collberg, Jul/Aug, pp. 40-49.

O

Oppliger, Rolf, and R. Rytz, "Digital Evidence: Dream and Reality," [Information Security], Sep/Oct, pp. 44-48.

Orman, Hilarie, "The Morris Worm: A Fifteen-Year Perspective," [The Morris Worm], Sep/Oct, pp. 35-43.

P

Pankanti, Sharath, see S. Prabhakar, Mar/Apr, pp. 33-42.

Paxson, Vern, see D. Moore, Jul/Aug, pp. 33-39.

Petroni, Jr., Nick L., and W. Arbaugh, "The Dangers of Mitigating Security Design Flaws: A Wireless Case Study," [Wireless Network Security], Jan/Feb, pp. 28-36.

Pollitt, Mark M., see A. Yasinsac, Jul/Aug, pp. 15-23.

Potter, Bruce, "Wireless Security's Future," [On the Horizon], Jul/Aug, pp. 68-72.

Prabhakar, Salil, S. Pankanti, and A. Jain, "Biometric Recognition: Security and Privacy Concerns," [Biometrics], Mar/Apr, pp. 33-42.

Provos, Niels, and P. Honeyman, "Hide and Seek: An Introduction to Steganography," [Steganography], May/Jun, pp. 32-44.

Q

Qu, Guangzhi, see S. Hariri, Sep/Oct, pp. 49-54.

Quarterman, John S., "The Ultimate in Instant Gratification," [Biblio Tech], Nov/Dec, pp. 56-61.

R

Raghavendra, Cauligi S., see S. Hariri, Sep/Oct, pp. 49-54.

Ragsdale, Dan, R. Dodge, and D. Welch, "Information Assurance the West Point Way," [Education], Sep/Oct, pp. 64-67.

Ramkishore, Modukuri, see S. Hariri, Sep/Oct, pp. 49-54.

Rezgui, Abdelmounaam et al, "Privacy on the Web: Facts, Challenges, and Solutions," [Understanding Privacy], Nov/Dec, pp. 40-49.

Riha, Zdenek, see V. Matyas, Jr., May/Jun, pp. 45-49.

Ryan, Daniel J., "Two Views on Security Software Liability: Let the Legal System Decide," [On the Horizon], Jan/Feb, pp. 70-72.

Ryder, Dorene Kewley, see J. Haines, Jan/Feb, pp. 46-56.

Rytz, Ruedi, see R. Oppliger, Sep/Oct, pp. 44-48.

S

Savage, Stefan, see D. Moore, Jul/Aug, pp. 33-39.

Schneider, Fred B., "Least Privilege and More," [Least Privilege], Sep/Oct, pp. 55-59.

Schneier, Bruce, "We Are All Security Consumers," [Log Off (see also Clear Text)], Jan/Feb, pp. 104.

Schneier, Bruce, "Locks and Full Disclosure," [Clear Text], Mar/Apr, pp. 88.

Schneier, Bruce, "Guilty Until Proven Innocent?," [Clear Text], May/Jun, pp. 88, 87.

Schneier, Bruce, "The Speed of Security," [Clear Text], Jul/Aug, pp. 96.

Schneier, Bruce, "Airplane Hackers," [Clear Text], Nov/Dec, pp. 92.

Seigneur, Jean-Marc et al., "Privacy Recovery with Disposable Email Addresses,"[Understanding Privacy], Nov/Dec, pp. 35-39.

Shannon, Colleen, see D. Moore, Jul/Aug, pp. 33-39.

Shelat, Abhi, see S. Garfinkel, Jan/Feb, pp. 17-27.

Smith, S.W., "Fairy Dust, Secrets, and the Real World," [Threats Perspective (see also Secure Systems)], Jan/Feb, pp. 89-93.

Smith, S.W., "Humans in the Loop: Human-Computer Interaction and Security," [Secure Systems], May/Jun, pp. 75-79.

Smith, S.W., "A Funny Thing Happened on the Way to the Marketplace," [Secure Systems], Nov/Dec, pp. 74-78.

Sommer, Peter M., see A. Yasinsac, Jul/Aug, pp. 15-23.

Spitzner, Lance, "The Honeynet Project: Trapping the Hackers," [Intrusion Detection], Mar/Apr, pp. 15-23.

Staniford, Stuart, see D. Moore, Jul/Aug, pp. 33-39.

Stytz, Martin R., and J. Whittaker, "Software Protection: Security's Last Stand?," [Application Security], Jan/Feb, pp. 95-98.

Stytz, Martin R., "The Case for Software Warranties," [Application Security], May/Jun, pp. 80-82.

Stytz, Martin R., "Setting the Standard for Security Literature," [Book Reviews], Jul/Aug, pp. 14.

Stytz, Martin, and J. Whittaker, "Caution: This Product Contains Security Code," [Application Security], Sep/Oct, pp. 86-88.

T

Taylor, Stephen, see J. Haines, Jan/Feb, pp. 46-56.

Thompson, Herbert H., "Why Security Testing Is Hard," [Application Security], Jul/Aug, pp. 83-86.

Tinnel, Laura, see J. Haines, Jan/Feb, pp. 46-56.

W

Weaver, Nicholas, see D. Moore, Jul/Aug, pp. 33-39.

Welch, Don, see D. Ragsdale, Sep/Oct, pp. 64-67.

White, Steve R., see P. Capek, Sep/Oct, pp. 26-34.

Whittaker, James A., see M. Stytz, Jan/Feb, pp. 95-98.

Whittaker, James A., see M. Stytz, Sep/Oct, pp. 86-88.

Whittaker, James, "Why Secure Applications are Difficult to Write," [Application Security], Mar/Apr, pp. 81-83.

Whittaker, James, "No Clear Issues on Monoculture Issues," [Monoculture], Nov/Dec, pp. 18-19.

Wing, Jeannette M., "A Call to Action: Look Beyond the Horizon," [On the Horizon], Nov/Dec, pp. 62-67.

Winslett, Marianne, see T. Yu, Jul/Aug, pp. 50-52.

Y

Yasinsac, Alec, P. Sommer, R. Erbacher, D. Marks, and M. Pollitt, "Computer Forensics Education," [Forensics Education], Jul/Aug, pp. 15-23.

Yu, Ting, J. Holt, and M. Winslett, "Two Security Symposia," [Conference Reports], Jul/Aug, pp. 50-52.

SUBJECT INDEX

Application Security

"Software Protection: Security's Last Stand?," Stytz, Martin R. et al., Jan/Feb, pp. 95-98.

"Why Secure Applications Are Difficult to Write," Whittaker, James, Mar/Apr, pp. 81-83.

"The Case for Software Warranties," Stytz, Martin R., May/Jun, pp. 80-82.

"Why Security Testing Is Hard," Thompson, Herbert H., Jul/Aug, pp. 83-86.

"Caution: This Product Contains Security Code," Stytz, Martin et al., Sep/Oct, pp. 86-88.

Attack Trends

"An Analysis of the Slapper Worm," Arce, Iván et al., Jan/Feb, pp. 82-87.

"The Weakest Link Revisited," Arce, Iván, Mar/Apr, pp. 72-76.

"Poisoning the Software Supply Chain," Levy, Elias, May/Jun, pp. 70-73.

"The Rising Threat of Vulnerabilities Due to Integer Errors," Ahmad, Dave, Jul/Aug, pp. 77-82.

"The Rise of the Gadgets," Arce, Iván, Sep/Oct, pp. 78-81.

"Crossover: Online Pests Plaguing the Offline World," Levy, Elias, Nov/Dec, pp. 71-73.

Biblio Tech

"AI Bites Man?," Donner, Marc, Jan/Feb, pp. 63-66.

"Post-Apocalypse Now," Donner, Marc, Mar/Apr, pp. 53-55.

"Hey, Robot!," Donner, Marc, May/Jun, pp. 51-55.

"The Girl with No Eyes," Donner, Marc, Jul/Aug, pp. 60-64.

"The Dinosaur and the Butterfly: A Tale of Computer Ethics," Lenarcic, John, Sep/Oct, pp. 61-63.

"The Ultimate in Instant Gratification," Quarterman, John S., Nov/Dec, pp. 56-61.

Biometrics

"Biometric Recognition: Security and Privacy Concerns," Prabhakar, Salil et al., Mar/Apr, pp. 33-42.

"Toward Reliable User Authentication through Biometrics," Matyas Jr., Vaclav et al., May/Jun, pp. 45-49.

Blackout 2003

"Measuring the 4:11 Effect: The Power Failure and the Internet," McGrath, Dennis, Sep/Oct, pp. 16-18.

"North America's Electricity Infrastructure: Are We Ready for More Perfect Storms?," Amin, Massoud, Sep/Oct, pp. 19-25.

Book Reviews

"Building a Foundation," Mead, Nancy R., May/Jun, p. 14

"Setting the Standard for Security Literature," Stytz, Martin R., Jul/Aug, p. 14.

"Crime Scene Investigators: The Next Generation," Campbell, Robert J., Sep/Oct, p. 15.

Clear Text

"We Are All Security Consumers," [see also Log Off], Schneier, Bruce, Jan/Feb, p. 104.

"Locks and Full Disclosure," Schneier, Bruce, Mar/Apr, p. 88.

"Guilty Until Proven Innocent?," Schneier, Bruce, May/Jun, pp. 88, 87.

"The Speed of Security," Schneier, Bruce, Jul/Aug, p. 96.

"Airplane Hackers," Schneier, Bruce, Nov/Dec, pp. 92.

Conference Reports

"Two Security Symposia," Yu, Ting et al., Jul/Aug, pp. 50-52.

Cryptology and Encryption

"Rights Amplification in Master-Keyed Mechanical Locks," Blaze, Matt, Mar/Apr, pp. 24-32.

"Selecting the Advanced Encryption Standard," Burr, William E., Mar/Apr, pp. 43-52.

Digital Rights

"Copyright Extension: Eldred v. Ashcroft," Lesk, Michael, Jan/Feb, pp. 76-78.

"Copyright Enforcement or Censorship: New Uses for the DMCA?," Lesk, Michael, Mar/Apr, pp. 67-69.

"The Good, the Bad, and the Ugly: What Might Change if We Had Good DRM," Lesk, Michael, May/Jun, pp. 63-66.

"Making the Copyright Law Work," Lesk, Michael, Jul/Aug, pp. 73-74.

"Chicken Little and the Recorded Music Crisis," Lesk, Michael, Sep/Oct, pp. 73-75.

"Feist and Facts: If Data Is Protected, Will It Be More or Less Available?," Lesk, Michael, Nov/Dec, pp. 68-70.

Education

"What Is Computer Security?," Bishop, Matt, Jan/Feb, pp. 67-69.

"Teaching Students to Design Secure Systems," Davis, Jim et al., Mar/Apr, pp. 56-58.

"Who Watches the Security Educators?," Frincke, Deborah, May/Jun, pp. 56-58.

"Ethics and Teaching Information Assurance," Endicott-Popovsky, Barbara, Jul/Aug, pp. 65-67.

"Teaching Constructive Security," Irvine, Cynthia E., Nov/Dec, pp. 59-61.

"Information Assurance the West Point Way," Ragsdale, Dan et al., Sep/Oct, pp. 64-67.

Forensics

"Remembrance of Data Passed: A Study of Disk Sanitization Practices," Garfinkel, Simson L. et al., Jan/Feb, pp. 17-27.

"Computer Forensics Education," Yasinsac, Alec et al., Jul/Aug, pp. 15-23.

From the Editor

"A Critical Need, An Ambitious Mission, A New Magazine," Cybenko, George, Jan/Feb, pp. 5-9.

"From the Editor: Sapph ire/Slammer Redux," Cybenko, George, Mar/Apr, p. 6.

"Toward a Security Ontology," Donner, Marc, May/Jun, pp. 6-7.

"Boiling Frogs?," Cybenko, George, Jul/Aug, p. 5.

"From the Editor: Security Cosmology: Moving from Big Bang to Worlds in Collusion," Landwehr, Carl E., Sep/Oct, p. 5.

"Privacy Is the Issue," Cybenko, George, Nov/Dec, p. 5.

Global Perspectives

"International Participation: The Continuing March Toward Security and Privacy," Hearn, Jim, Jan/Feb, pp. 79-81.

"Moving Forward?," Hearn, Jim, Mar/Apr, pp. 70-71.

"Slow Dancing," Hearn, Jim, May/Jun, pp. 67-68.

"Keeping Up Appearances," Hearn, Jim, Jul/Aug, pp. 75-76.

"What Works?," Hearn, Jim, Sep/Oct, pp. 76-77.

The Honeynet Files

"Botnets: Big and Bigger," McCarty, Bill, Jul/Aug, pp. 87-90.

"Automated Identity Theft," McCarty, Bill, Sep/Oct, pp. 89-92.

"The Honeynet Arms Race," McCarty, Bill, Nov/Dec, pp. 79-82.

Impact Analysis

"Impact Analysis of Faults and Attacks in Large-Scale Networks," Hariri, Salim et al., Sep/Oct, pp. 49-54.

Information Security

"Information Security: Why the Future Belongs to the Quants," Geer, Jr., Daniel et al., Jul/Aug, pp. 24-32.

"Digital Evidence: Dream and Reality," Oppliger, Rolf et al., Sep/Oct, pp. 44-48.

Intrusion Detection

"Validation of Sensor Alert Correlators," Haines, Joshua et al., Jan/Feb, pp. 46-56.

"The Honeynet Project: Trapping the Hackers," Spitzner, Lance, Mar/Apr, pp. 15-23.

Least Privilege

"Least Privilege and More," Schneider, Fred B., Sep/Oct, pp. 55-59.

Log Off

"We Are All Security Consumers," Schneier, Bruce, Jan/Feb, p. 104.

"Locks and Full Disclosure," [see also Clear Text], Schneier, Bruce, Mar/Apr, p. 88.

"Guilty Until Proven Innocent?," [see also Clear Text], Schneier, Bruce, May/Jun, pp. 88, 87.

"The Speed of Security," [see also Clear Text], Schneier, Bruce, Jul/Aug, p. 96.

"Airplane Hackers," [see also Clear Text], Schneier, Bruce, Nov/Dec, pp. 92.

Malware Recon

"The Making of a Spam Zombie Army: Dissecting the Sobig Worms," Levy, Elias, Jul/Aug, pp. 58-59.

Monoculture

"Monopoly Considered Harmful," Geer Jr., Daniel, Nov/Dec, pp. 14-17.

"Monocultures Are Hard to Find in Practice," Aucsmith, Dave, Nov/Dec, pp. 15-17.

"No Clear Issues on Monoculture Issues," Whittaker, James, Nov/Dec, pp. 18-19.

Network Security

"The Dangers of Mitigating Security Design Flaws: A Wireless Case Study," Petroni, Jr., Nick L. et al., Jan/Feb, pp. 28-36.

News

"Legal Battle Looming for Internet Protections Acts," Miller, Sandra Kay, Jan/Feb, pp. 10-12.

"New Draft to Secure Cyberspace Leaked," Andresen, Scott L., Jan/Feb, p. 13.

"Privacy Concerns," Dern, Daniel P., Mar/Apr, pp. 11-13.

"Questions about Strategy to Secure Cyberspace," Goth, Greg, May/Jun, pp. 8-13.

"Virus-Writing 101: College Class Stirs Up Controversy," McLaughlin, Laurianne, Jul/Aug, pp. 8-11.

"Eye on Cybercrime," Clandos, Rosemary, Jul/Aug, pp. 8-11.

"News Briefs," Andresen, Scott L., Jul/Aug, pp. 12-13.

"Antispam Bills Face Tough Challenges," Goth, Greg, Sep/Oct, pp. 8-11.

"News Briefs," Andresen, Scott L., Sep/Oct, pp. 12-13.

"Acquisition Accentuates Antivirus Industry," Miller, Sandra Kay, Sep/Oct, pp. 8-11.

"Addressing the Monoculture," Goth, Greg, Nov/Dec, pp. 8-10.

"Hacker Study: Aiding Security Measures Development?," Alfonsi, Benjamin J., Nov/Dec, p. 11.

"News Briefs," Andresen, Scott L., Nov/Dec, pp. 12-13.

On the Horizon

"Two Views on Security Software Liability: Let the Legal System Decide," Ryan, Daniel J., Jan/Feb, pp. 70-72.

"Two Views on Security Software Liability: Using the Right Legal Tools," Heckman, Carey, Jan/Feb, pp. 73-75.

"From the Ground Up: The DIMACS Software Security Workshop," McGraw, Gary, Mar/Apr, pp. 59-66.

"Understanding Trusted Computing: Will Its Benefits Outweigh Its Drawbacks?," Felten, Edward W., May/Jun, pp. 60-62.

"Wireless Security's Future," Potter, Bruce, Jul/Aug, pp. 68-72.

"SEHAS 2003: The Future of High-Assurance Systems," Mead, Nancy R., Sep/Oct, pp. 68-72.

"A Call to Action: Look Beyond the Horizon," Wing, Jeannette M., Nov/Dec, pp. 62-67.

Open-Source Security

"Software Security for Open-Source Systems," Cowan, Crispin, Jan/Feb, pp. 38-45.

"IP Traceback: A New Denial-of-Service Deterrent?," Aljifri, Hassan, May/Jun, pp. 24-31.

Privacy

"Masks: Bringing Anonymity and Personalization Together," Ishitani, Lucila et al., May/Jun, pp. 18-23.

Privacy Matters

"Privacy vs. Information Technology," Caloyannides, Michael A., Jan/Feb, pp. 100-103.

"Engineering or Sloganeering? The Counterattack on Privacy," Caloyannides, Michael A., Mar/Apr, pp. 84-87.

"Society Cannot Function Without Privacy," Caloyannides, Michael A., May/Jun, pp. 84-86.

"The Assault on Logic," Caloyannides, Michael A., Jul/Aug, pp. 91-95.

"Keeping Offline Computer Usage Private," Caloyannides, Michael A., Sep/Oct, pp. 93-95.

"Digital 'Evidence' and Reasonable Doubt," Caloyannides, Michael A., Nov/Dec, pp. 89-91.

Secure Coding

"Inside the Windows Security Push," Howard, Michael et al., Jan/Feb, pp. 57-61.

Secure Systems

"Fairy Dust, Secrets, and the Real World," [see also Threats Perspective], Smith, S.W., Jan/Feb, pp. 89-93.

"Patient Privacy in Electronic Prescription Transfer," Ball, Edward et al., Mar/Apr, pp. 77-80.

"Humans in the Loop: Human-Computer Interaction and Security," Smith, S.W., May/Jun, pp. 75-79.

"Access Denied," Camp, Jean, Sep/Oct, pp. 82-85.

"A Funny Thing Happened on the Way to the Marketplace," Smith, S.W., Nov/Dec, pp. 74-78.

Software Protection

"Sandmark—A Tool for Software Protection Research," Collberg, Christian et al., Jul/Aug, pp. 40-49.

Steganography

"Hide and Seek: An Introduction to Steganography," Provos, Niels et al., May/Jun, pp. 32-44.

Threats Perspective

"Fairy Dust, Secrets, and the Real World," Smith, S.W., Jan/Feb, pp. 89-93.

"Patient Privacy in Electronic Prescription Transfer," [see also Secure Systems], Ball, Edward et al., Mar/Apr, pp. 77-80.

"Humans in the Loop: Human-Computer Interaction and Security," [see also Secure Systems], Smith, S.W., May/Jun, pp. 75-79.

"Access Denied," [see also Secure Systems], Camp, Jean, Sep/Oct, pp. 82-85.

"A Funny Thing Happened on the Way to the Marketplace," [see also Secure Systems], Smith, S.W., Nov/Dec, pp. 74-78.

Understanding Privacy

"Privacy on the Web: Facts, Challenges, and Solutions," Rezgui, Abdelmounaam et al, Nov/Dec, pp. 40-49.

"Email-Based Identification and Authentication: An Alternative to PKI?," Garfinkel, Simson L., Nov/Dec, pp. 20-26.

"Measuring Anonymity: The Disclosure Attack," Agrawal, Dakshi et al, Nov/Dec, pp. 27-34.

"Privacy Recovery with Disposable Email Addresses," Seigneur, Jean-Marc, et al., Nov/Dec, pp. 35-39.

"P3P: making Privacy Policies More Useful," Cranor, Lorrie Faith, Nov/Dec, pp. 50-55.

Worms

"Inside the Slammer Worm," Moore, David et al., Jul/Aug, pp. 33-39.

"Merry Christma: An Early Network Worm," Capek, Peter G. et al., Sep/Oct, pp. 26-34.

"The Morris Worm: A Fifteen-Year Perspective," Orman, Hilarie, Sep/Oct, pp. 35-43.

16 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool