The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.06 - November-December (2004 vol.2)
pp: 80-85
Published by the IEEE Computer Society

Author Index

A

Alfonsi, B.J., "Privacy Debate Centers on Radio Frequency Identification" [News], Mar./Apr., p. 12.

Alfonsi, B., "Corporate Security Under Seige" [News], July/Aug., p. 13.

Andresen, S.L., NewsBriefs [News] Jan./Feb., pp. 18-19.

Andresen, S.L., NewsBriefs [News], Mar./Apr., pp. 14-15.

Andresen, S.L., NewsBriefs [News], May/June, pp. 16-17.

Andresen, S.L., NewsBriefs [News], July/Aug., pp. 14-15.

Andrews, M., and J.A. Whittaker, "Computer Security" [Basic Training], Sept./Oct., pp. 68-71.

Antón, A.I., J.B. Earp, Q. He, W. Stufflebeam, D. Bolchini, and C. Jensen, "Financial Privacy Policies and the Need for Standardization," Mar./Apr., pp. 36-45.

Antón, A.I., see Hope, P., May/June, pp. 90-92.

Antón, A.I., Q. He, and D.L. Baumer, "Inside JetBlue's Privacy Policy Violations," Nov./Dec., pp. 12-18.

Arbaugh, W.A., "Wired on Wireless" [Guest Editor's Introduction], May/June, pp. 26-27.

Arce, I., "More Bang For the Bug: An Account of 2003's Attack Trends" [Attack Trends], Jan./Feb., pp. 66-68.

Arce, I., "The Kernel Craze" [Attack Trends], May/June, pp. 79-81.

Arce, I., and G. McGraw, "Why Attacking Systems Is a Good Idea" [Guest Editors' Introduction], July/Aug., pp. 17-19.

Arce, I., "The Shellcode Generation" [Attack Trends], Sept./Oct., pp. 72-76.

Aslam, J., S. Bratus, D. Kotz, R. Peterson, B. Tofel, and D. Rus, "The Kerf Toolkit for Intrusion Analysis," Nov./Dec., pp. 42-52.

B

Baker, B., see J. Pincus., July/Aug., pp. 20-27.

Bakken, D.E., R. Parameswaran, D.M. Blough, A.A. Franz, and T.J. Palmer, "Data Obfuscation: Anonymity and Desensitization of Usable Data Sets," Nov./Dec., pp. 34-41.

Balfanz, D.,G. Durfee, R.E. Grinter, and D. Smetters, "In Search of Usable Security: Five Lessons from the Field," Sept./Oct., pp. 19-24.

Bannet, J., D.W. Price, A. Rudys, J. Singer, and D.S. Wallach, "Hack-a-Vote: Security Issues with Electronic Voting Systems," Jan./Feb., pp. 32-37.

Baumer, D.L., see Antón, A.I., Nov./Dec., pp. 12-18.

Berthier, Y., see Raynal, F., July/Aug., pp. 72-78.

Berthier, Y., see Raynal, F., Sept./Oct., pp. 77-80.

Biondi, P., see Raynal, F., July/Aug., pp. 72-78.

Biondi, P., see Raynal, F., Sept./Oct., pp. 77-80.

Bishop, M., and D. Frincke, "Teaching Robust Programming" [Education], Mar./Apr., pp. 54-57.

Bishop, M., see Frincke, D.A., May/June, pp. 69-72.

Bishop, M., see Frincke, D., July/Aug., pp. 54-56.

Bishop, M., see Frincke, D., Sept./Oct., pp. 61-63.

Bishop, M., and D. Frincke, "Academic Degrees and Professional Certification" [Education], Nov./Oct., pp. 56-58.

Blough, D.M., see Bakken, D.E., Nov./Dec., pp. 34-41.

Bolchini, D., see Antón, A.I., Mar./Apr., pp. 36-45.

Branch, J.W., N.L. Petroni Jr., L. Van Doorn, and D. Safford, "Autonomic 802.11 Wireless LAN Security Auditing," May/June, pp. 56-65.

Bratus, S., see Aslam, J., Nov./Dec., pp. 42-52.

Bunt, T., see Guida, R., July/Aug., pp. 67-71.

Byers, S., "Information Leakage Caused by Hidden Data in Published Documents," Mar./Apr., pp. 23-27.

C

Caloyannides, M.A., "Online Monitoring: Security or Social Control?" [Privacy Matters], Jan./Feb., pp. 81-83.

Caloyannides, M.A., "The Cost of Convenience: A Faustian Deal" [Privacy Matters], Mar./Apr., pp. 84-87.

Caloyannides, M.A., "Security or Cosmetology?" [Privacy Matters], May/June, pp. 93-95.

Caloyannides, M.A., "Is Privacy Really Constraining Security or Is this a Red Herring?" [Privacy Matters], July/Aug., pp. 86-87.

Caloyannides, M.A., "Speech Privacy Technophobes Need Not Apply" [Privacy Matters], Sept./Oct., pp. 86-87.

Caloyannides, M.A., "Enhancing Security: Not for the Conformist" [Privacy Matters], Nov./Dec., pp. 86-88.

Čapkun, S., see Hubaux, J., May/June, pp. 49-55.

Chamales, G., "The Honeywall CD-ROM" [The Honeynet Files], Mar./Apr., pp. 77-79.

Chaum, D., "Secret-Ballot Receipts: True Voter-Verifiable Elections," Jan./Feb., pp. 38-47.

Chess, B., and G. McGraw, "Static Analysis for Security" [Building Security In], Nov./Dec., pp. 76-79.

Clifton, C, see Vaidya, J., Nov./Dec., pp. 19-27.

Cole, E., see Ring, S., July/Aug., pp. 38-45.

Conklin, A., see White, G., July/Aug., pp. 33-37.

Cranor, L.F., and S. Garfinkel, "Secure or Usable?" [Guest Editors' Introduction], Sept./Oct., pp. 16-18.

Cybenko, G., "Don't Bring a Knife to a Gunfight" [From the Editors], Mar./Apr., pp. 5.

Cybenko, G., "Security Alchemy" [From the Editors], Nov./Dec., p. 5.

D

Davis, N. W. Humphrey, S.T. Redwine Jr., G. Zibulski, and G. McGraw, "Processes for Producing Secure Software: Summary of US National Cybersecurity Summit Subgroup Report," May/June, pp. 18-25.

Dill, D.L., and A.D. Rubin, "E-Voting Security" [Guest Editors' Introduction], Jan./Feb., pp. 22-23.

Donner, M., "Die Gedanken Sind Frei" [Biblio Tech], Jan./Feb., pp. 53-55.

Donner, M., "Hacking the Best-Seller List" [Biblio Tech], Mar./Apr., pp. 51-53.

Donner, M., "Whose Data Are These, Anyway?" [From the Editors], May/June, pp. 5-6.

Donner, M., "Cult Classics" [Biblio Tech], May/June, pp. 66-68.

Donner, M., "Deus Est Machina" [Biblio Tech], July/Aug., pp. 51-53.

Donner, M., "A Witty Lesson" [From the Editors], July/Aug., pp. 5.

Donner, M., "Jennifer Government" [Biblio Tech], Sept./Oct., pp. 57-59.

Donner, M., "Use the Force, Luke" [Biblio Tech], Nov./Dec., pp. 53-55.

Durfee, G., see Balfanz, D., Sept./Oct., pp. 19-24.

E

Earp, J.B., see Antón, A.I., Mar./Apr., pp. 36-45.

Elliott, C., "Quantum Cryptography" [On the Horizon], July/Aug., pp. 57-61.

Evans, D., and N. Paul, "Election Security: Perception and Reality," Jan./Feb., pp. 24-31.

Evans, S., D. Heinbuch, E. Kyle, J. Piorkowski, and J. Wallner, "Risk-based Systems Security Engineering: Stopping Attacks with Intention" [On the Horizon], Nov./Dec., pp. 59-62.

F

Forbes, S., "A .NET Gold Mine" [Book Reviews], July/Aug., p. 10.

Forbes, S., "Protecting Consumers' Private Health Information" [Book Reviews], Sept./Oct., p. 12.

Forbes, S., "Privacy Law Resource for Students and Professionals" [Book Reviews], Nov./Dec., p. 7.

Ford, R., "The Wrong Stuff?" [Application Security], May/June, pp. 86-89.

Franz, A.A., see Bakken, D.E., Nov./Dec., pp. 34-41.

Frincke, D., see Bishop, M., Mar./Apr., pp. 54-57.

Frincke, D.A., and M. Bishop, "Guarding the Castle Keep: Teaching with the Fortress Metaphor" [Education], May/June, pp. 69-72.

Frincke, D., and M. Bishop, "Back to School" [Education], July/Aug., pp. 54-56.

Frincke, D., and M. Bishop, "Joining the Security Education Community" [Education], Sept./Oct., pp. 61-63.

Frincke, D., see Bishop, M., Nov./Dec., pp. 56-58.

G

Garfinkel, S., see Cranor, L.F., Sept./Oct., pp. 16-18.

Goetz, E. et al "NewsBriefs [News]," Nov./Dec., pp. 10-11.

Gorder, P.F., "Balancing Video-Game Piracy Issues" [News], Jan./Feb., p. 17.

Gorodetsky, V., see Sklavos, N., Jan./Feb., pp. 49-52.

Goth, G., "E-Voting Security: The Electoral Dialectic Gets Hot" [News], Jan./Feb., pp. 14-17.

Goth, G., "How Useful Are Attack Trend Resources?" [News], Mar./Apr., pp. 9-11.

Goth, G., "Richard Clarke Talks Cybersecurity and JELL-O" [News], May/June, pp. 11-15.

Goth, G., "Santa Barbara Health Exchange: User-Driven Security Prevails" [News], Sept./Oct., pp. 8-9.

Goth, G., "DES is Dead: NIST Declares Standard Officially Obsolete" [News], Sept./Oct., p. 9.

Goth, G., "Timetable Set for Better Intelligence Network" [News], Nov./Dec., pp. 8-9.

Grimaila, M.R., "Maximizing Business Information Security's Educational Value" [Education], Jan./Feb., pp. 56-60.

Grinter, R.E., see Balfanz, D., Sept./Oct., pp. 19-24.

Grizzard, J.B., see Levine, J.G., Nov./Dec., pp. 73-75.

Gruteser, M., and X. Liu, "Protecting Privacy in Continuous Location-Tracking Applications," Mar./Apr., pp. 28-34.

Guida, R., R. Stahl, T. Bunt, G. Secrest, and J. Moorcones, "Deploying and Using Public Key Technology: Lessons Learned in Real Life" [Secure Systems], July/Aug., pp. 67-71.

H

He, Q., see Antón, A.I., Mar./Apr., pp. 36-45.

He, Q., see Antón, A.I., Nov./Dec., pp. 12-18.

Hearn, J., "Does the Common Criteria Paradigm Have a Future?" [Global Perspectives], Jan./Feb., pp. 64-65.

Heinbuch, D., see Evans, S., Nov./Dec., pp. 59-62.

Hope, P., G. McGraw, and A.I. Antón, "Misuse and Abuse Cases: Getting Past the Positive" [Building Security In], May/June, pp. 90-92.

Howard, M., "Building More Secure Software with Improved Development Processes" [Basic Training], Nov./Dec., pp. 63-65.

Hu, Y-C., and A. Perrig, "A Survey of Secure Wireless Ad Hoc Routing," May/June, pp. 28-39.

Hubaux, J.,, S. Čapkun, and J. Luo, "The Security and Privacy of Smart Vehicles," May/June, pp. 49-55.

Humphrey, W., see Davis, N., May/June, pp. 18-25.

J

Jensen, C., see Antón, A.I., Mar./Apr., pp. 36-45.

Jiwnani, K., and M. Zelkowitz, "Susceptibility Matrix: A New Aid to Software Auditing," Mar./Apr., pp. 16-21.

Johnston, D., and J. Walker, "Overview of IEEE 802.16 Security," May/June, pp. 40-48.

Just, M., "Designing and Evaluating Challenge-Question Systems," Sept./Oct., pp. 32-39.

K

Kaminsky, D., see Raynal, F., July/Aug., pp. 72-78.

Kaminsky, D., see Raynal, F., Sept./Oct., pp. 77-80.

Ke, X., see Peacock, A., Sept./Oct., pp. 40-47.

Kotz, D., see Aslam, J., Nov./Dec., pp. 42-52.

Koufopavlou, O., see Sklavos, N., Jan./Feb., pp. 49-52.

Krawetz, N., "Anti-Honeypot Technology" [The Honeynet Files], Jan./Feb., pp. 76-79.

Kurth, H., see Shankar, K.S., Nov./Dec., pp. 28-33.

Kyle, E., see Evans, S., Nov./Dec., pp. 59-62.

L

Lesk, M., "Micropayments: An Idea Whose Time Has Passed Twice?" [Digital Rights], Jan./Feb., pp. 61-63.

Lesk, M., "Shedding Light on Creativity: The History of Photography" [Digital Rights], Mar./Apr., pp. 62-64.

Lesk, M., "Copyright and Creativity" [Digital Rights], May/June, pp. 76-78.

Lesk, M., "Bigger Share of a Smaller Pie" [Digital Rights], July/Aug., pp. 62-64.

Levine, J.G., J.B. Grizzard, and H.L. Owen, "Using Honeynets to Protect Large Enterprise Networks" [The Honeynet Files], Nov./Dec., pp. 73-75.

Levy, E., "Criminals Become Tech Savvy" [Attack Trends], Mar./Apr., pp. 65-68.

Levy, E., "Approaching Zero" [Attack Trends], July/Aug., pp. 65-66.

Levy, E., "Interface Illusions" [Attack Trends], Nov./Dec., pp. 66-69.

Liu, X., see Gruteser, M., Mar./Apr., pp. 28-34.

Luo, J., see Hubaux, J., May/June, pp. 49-55.

M

McGraw, G., "Software Security" [Building Security In], Mar./Apr., pp. 80-83.

McGraw, G., see Davis, N., May/June, pp. 18-25.

McGraw, G., see Hope, P., May/June, pp. 90-92.

McGraw, G., see Arce, I., July/Aug., pp. 17-19.

McGraw, G., see Verdon, D., July/Aug., pp. 79-84.

McGraw, G., see Chess, B., Nov./Dec., pp. 76-79.

McGraw, G., and B. Potter, "Software Security Testing" [Building Security In], Sept./Oct., pp. 81-85.

Meinel, C.P., "Cybercrime Treaty Could Chill Research" [Attacking Systems], July/Aug., pp. 28-32.

Moldovyan, N., see Sklavos, N., Jan./Feb., pp. 49-52.

Moorcones, J., see Guida, R., July/Aug., pp. 67-71.

Moore, D., see Shannon, C., July/Aug., pp. 46-50.

O

Owen, H.L., see Levine, J.G., Nov./Dec., pp. 73-75.

P

Palmer, C.C., "Can We Win the Security Game?" [Editorial Board Member Profile], Jan./Feb., pp. 10-12.

Palmer, T.J., see Bakken, D.E., Nov./Dec., pp. 34-41.

Parameswaran, R., see Bakken, D.E., Nov./Dec., pp. 34-41.

Paul, N., see Evans, D., Jan./Feb., pp. 24-31.

Payne, J.E., "Regulation and Information Security: Can Y2K Lessons Help Us?" [On the Horizon], Mar./Apr., pp. 58-61.

Peacock, A., X. Ke, and M. Wilkerson, "Typing Patterns: A Key to User Identification," Sept./Oct., pp. 40-47.

Perrig, A., see Hu, Y.-C., May/June, pp. 28-39.

Peterson, R., see Aslam, J., Nov./Dec., pp. 42-52.

Petroni Jr., N.L., see Branch, J.W., May/June, pp. 56-65.

Pfleeger, S.L., "A Gift of Impact" [Book Reviews], May/June, p. 7.

Pincus, J., and B. Baker, "Beyond Stack Smashing: Recent Advances in Exploiting Buffer Overruns," July/Aug., pp. 20-27.

Piorkowski, J., see Evans, S., Nov./Dec., pp. 59-62.

Popli, A., "ACM Computer and Communication Security Conference" [Conference Reports], Mar./Apr., pp. 46-47.

Potter, B., see McGraw, G., Sept./Oct., pp. 81-85.

Price, D.W., see Bannet, J., Jan./Feb., pp. 32-37.

R

Raynal, F., Y. Berthier, P. Biondi, and D. Kaminsky, "Honeypot Forensics Part I: Analyzing the Network" [The Honeynet Files], July/Aug., pp. 72-78.

Raynal, F., Y. Berthier, P. Biondi, and D. Kaminsky, "Honeypot Forensics, Part II: Analyzing the Compromised Host" [The Honeynet Files], Sept./Oct., pp. 77-80.

Redwine Jr., S.T., see Davis, N., May/June, pp. 18-25.

Ring, S., and E. Cole, "Taking a Lesson from Stealthy Rootkits," July/Aug., pp. 38-45.

Rubin, A.D., see Dill, D.L., Jan./Feb., pp. 22-23.

Rudys, A., see Bannet, J., Jan./Feb., pp. 32-37.

Rus, D., see Aslam, J., Nov./Dec., pp. 42-52.

S

Safford, D., see Branch, J.W., May/June, pp. 56-65.

Saydjari, O. Sami., "Multilevel Security: Reprise" [On the Horizon], Sept./Oct., pp. 64-67.

Schneider, F.B., "The Next Digital Divide" [From the Editors], Jan./Feb., p. 5.

Schneider, F., "Time Out for Station Identification" [From the Editors], Sept./Oct., p. 5.

Schneier, B., "Voting Security and Technology" [Clear Text], Jan./Feb., p. 84.

Schneier, B., "Security and Compliance" [Clear Text], May/June, p. 96.

Schneier, B., "Customers, Passwords, and Web Sites" [Clear Text], July/Aug., p. 88.

Schneier, B., "SIMS: Solution, or Part of the Problem?" [Clear Text], Sept./Oct., p. 88.

Secrest, G., see Guida, R., July/Aug., pp. 67-71.

Shankar, K.S., and H. Kurth, "Certifying Open SourceThe Linux Experience," Nov./Dec., pp. 28-33.

Shannon, C., and D. Moore, "The Spread of the Witty Worm" [Malware Recon], July/Aug., pp. 46-50.

Singer, J., see Bannet, J., Jan./Feb., pp. 32-37.

Sklavos, N., N. Moldovyan, V. Gorodetsky, and O. Koufopavlou, "Computer Network Security: Report from MMM-ACNS" [Conference Reports], Jan./Feb., pp. 49-52.

Smetters, D., see Balfanz, D., Sept./Oct., pp. 19-24.

Smith, S.W., and E.H. Spafford, "Grand Challenges in Information Security: Process and Output" [Secure Systems], Jan./Feb., pp. 69-71.

Somayaji, A., "How to Win an Evolutionary Arms Race" [Secure Systems], Nov./Dec., pp. 70-72.

Spafford, E.H., see Smith, S.W., Jan./Feb., pp. 69-71.

Stahl, R., see Guida, R., July/Aug., pp. 67-71.

Stolfo, S.J., "Worm and Attack Early Warning" [On the Horizon], May/June, pp. 73-75.

Stone, A., "The Delicate Balance: Security and Privacy" [News], July/Aug., pp. 12-15.

Stufflebeam, W., see Antón, A.I., Mar./Apr., pp. 36-45.

Stytz, M.R., "Wireless World Order" [Book Reviews], Jan./Feb., pp. 20-21.

Stytz, M.R., "Considering Defense in Depth for Software Applications" [Application Security], Jan./Feb., pp. 72-75.

Stytz, M.R., "Hacking for Understanding" [Book Reviews], Mar./Apr., p. 8.

T

Tofel, B., see Aslam, J., Nov./Dec., pp. 42-52.

Trope, R.L., "A Warranty of Cyberworthiness" [Application Security], Mar./Apr., pp. 73-76.

V

Vaidya, J. and C. Clifton, "Privacy-Preserving Data Mining: How, Why, and When," Nov./Dec., pp. 19-27.

Van Doorn, L., see Branch, J.W., May/June, pp. 56-65.

Verdon, D., and G. McGraw, "Risk Analysis in Software Design" [Building Security In], July/Aug., pp. 79-84.

Vilardo, M.F., "Online Impersonation in Securities Scams" [Secure Systems], May/June, pp. 82-85.

W

Walker, J., see Johnston, D., May/June, pp. 40-48.

Wallach, D.S., see Bannet, J., Jan./Feb., pp. 32-37.

Wallner, J., see Evans, S., Nov./Dec., pp. 59-62.

Wayner, P., "The Power of Candy-Coated Bits" [Secure Systems], Mar./Apr., pp. 69-72.

Weis, S.A., "RFID Privacy Workshop: Concerns, Consensus, and Questions" [Conference Reports], Mar./Apr., pp. 48-50.

White, G., and A. Conklin, "The Appropriate Use of Force-on-Force Cyberexercises," July/Aug., pp. 33-37.

Whittaker, J.A., see Andrews, M., Sept./Oct., pp. 68-71.

Wilkerson, M., see Peacock, A., Sept./Oct., pp. 40-47.

Y

Yan, J., A. Blackwell, R. Anderson, and A. Grant, "Password Memorability and Security: Empirical Results," Sept./Oct., pp. 25-31.

Yee, K.- P., "Aligning Security and Usability," Sept./Oct., pp. 48-55.

Z

Zelkowitz, M., see Jiwnani, K., Mar./Apr., pp. 16-21.

Zibulski, G., see Davis, N., May/June, pp. 18-25.

Subject Index

Application Security

"A Warranty of Cyberworthiness," R.L. Trope, Mar./Apr., pp. 73-76.

"Considering Defense in Depth for Software Applications," M.R. Stytz, Jan./Feb., pp. 72-75.

"The Wrong Stuff?," R. Ford, May/June, pp. 86-89.

Attack Trends

"Approaching Zero," E. Levy, July/Aug., pp. 65-66.

"Criminals Become Tech Savvy," E. Levy, Mar./Apr., pp. 65-68.

"Interface Illusions," E. Levy, Nov./Dec., pp. 66-69.

"More Bang For the Bug: An Account of 2003's Attack Trends," I. Arce, Jan./Feb., pp. 66-68.

"The Kernel Craze," I. Arce, May/June, pp. 79-81.

"The Shellcode Generation," I. Arce, Sept./Oct., pp. 72-76.

Attacking Systems

"Beyond Stack Smashing: Recent Advances in Exploiting Buffer Overruns," J. Pincus et al., July/Aug., pp. 20-27.

"Cybercrime Treaty Could Chill Research," C.P. Meinel, July/Aug., pp. 28-32.

"Taking a Lesson from Stealthy Rootkits," S. Ring et al., July/Aug., pp. 38-45.

"The Appropriate Use of Force-on-Force Cyberexercises," G. White et al., July/Aug., pp. 33-37.

"Why Attacking Systems Is a Good Idea," I. Arce et al., July/Aug., pp. 17-19.

Basic Training

"Building More Secure Software with Improved Development Processes," M. Howard, Nov./Dec., pp. 63-65.

"Computer Security," M. Andrews et al., Sept./Oct., pp. 68-71.

Biblio Tech

"Cult Classics," M. Donner, May/June, pp. 66-68.

"Deus Est Machina," M. Donner, July/Aug., pp. 51-53.

"Die Gedanken Sind Frei," M. Donner, Jan./Feb., pp. 53-55.

"Hacking the Best-Seller List," M. Donner, Mar./Apr., pp. 51-53.

"Jennifer Government," M. Donner, Sept./Oct., pp. 57-59.

"Use the Force, Luke," M. Donner, Nov./Dec., pp. 53-55.

Book Reviews

"A Gift of Impact," S.L. Pfleeger, May/June, p. 7.

"A .NET Gold Mine," S. Forbes, July/Aug., p. 10.

"Hacking for Understanding," M.R. Stytz, Mar./Apr., p. 8.

"Privacy Law Resource for Students and Professionals," S. Forbes, Nov./Dec., p. 7.

"Protecting Consumers' Private Health Information," S. Forbes, Sept./Oct., p. 12.

"Wireless World Order," M.R. Stytz, Jan./Feb., pp. 20-21.

Building Security In

"Misuse and Abuse Cases: Getting Past the Positive," P. Hope et al., May/June, pp. 90-92.

"Risk Analysis in Software Design," D. Verdon et al., July/Aug., pp. 79-84.

"Software Security," G. McGraw, Mar./Apr., pp. 80-83.

"Software Security Testing," G. McGraw et al., Sept./Oct., pp. 81-85.

"Static Analysis for Security," B. Chess et al., Nov./Dec., pp. 76-79.

Clear Text

"Customers, Passwords, and Web Sites," B. Schneier, July/Aug., p. 88.

"Security and Compliance," B. Schneier, May/June, p. 96.

"SIMS: Solution, or Part of the Problem?," B. Schneier, Sept./Oct., p. 88.

"Voting Security and Technology," B. Schneier, Jan./Feb., p. 84.

Conference Reports

"ACM Computer and Communication Security Conference," A. Popli, Mar./Apr., pp. 46-47.

"Computer Network Security: Report from MMM-ACNS," N. Sklavos et al., Jan./Feb., pp. 49-52.

"RFID Privacy Workshop: Concerns, Consensus, and Questions," S.A. Weis, Mar./Apr., pp. 48-50.

Data Leakage

"Information Leakage Caused by Hidden Data in Published Documents," S. Byers, Mar./Apr., pp. 23-27.

Data Obfuscation

"Data Obfuscation: Anonymity and Desensitization of Usable Data Sets," D.E. Bakken et al., Nov./Dec., pp. 34-41.

Digital Rights

"Bigger Share of a Smaller Pie," M. Lesk, July/Aug., pp. 62-64.

"Copyright and Creativity," M. Lesk, May/June, pp. 76-78.

"Micropayments: An Idea Whose Time Has Passed Twice?," M. Lesk, Jan./Feb., pp. 61-63.

"Shedding Light on Creativity: The History of Photography," M. Lesk, Mar./Apr., pp. 62-64.

E-Voting

"Election Security: Perception and Reality," D. Evans et al., Jan./Feb., pp. 24-31.

"E-Voting Security" [Guest Editors' Introduction], D.L. Dill et al., Jan./Feb., pp. 22-23.

"Hack-a-Vote: Security Issues with Electronic Voting Systems," J. Bannet et al., Jan./Feb., pp. 32-37.

"Secret-Ballot Receipts: True Voter-Verifiable Elections," D. Chaum, Jan./Feb., pp. 38-47.

"Voting Security and Technology," B. Schneier, Jan./Feb., p. 84.

Editorial Board Profile

"Can We Win the Security Game?," C.C. Palmer, Jan./Feb., pp. 10-12.

Education

"Academic Degrees and Professional Certification," M. Bishop et al., Nov./Dec., pp. 56-58.

"Back to School," D. Frincke et al., July/Aug., pp. 54-56.

"Guarding the Castle Keep: Teaching with the Fortress Metaphor," D.A. Frincke et al., May/June, pp. 69-72.

"Joining the Security Education Community," D. Frincke et al., Sept./Oct., pp. 61-63.

"Maximizing Business Information Security's Educational Value," M.R. Grimaila, Jan./Feb., pp. 56-60.

"Teaching Robust Programming," M. Bishop et al., Mar./Apr., pp. 54-57.

From the Editors

"A Witty Lesson," M. Donner, July/Aug., p. 5.

"Don't Bring a Knife to a Gunfight," G. Cybenko, Mar./Apr., p. 5.

"Security Alchemy," G. Cybenko, Nov./Dec., p. 5.

"The Next Digital Divide," F.B. Schneider, Jan./Feb., p. 5.

"Time Out for Station Identification," F. Schneider, Sept./Oct., p. 5.

"Whose Data Are These, Anyway?," M. Donner, May/June, pp. 5-6.

Global Perspectives

"Does the Common Criteria Paradigm Have a Future?," J. Hearn, Jan./Feb., pp. 64-65.

Intrusion Analysis

"The Kerf Toolkit for Intrusion Analysis," J. Aslam et al., Nov./Dec., pp. 42-52.

Location-Tracking Applications

"Protecting Privacy in Continuous Location-Tracking Applications," M. Gruteser et al., Mar./Apr., pp. 28-34.

Making Wireless Work

"A Survey of Secure Wireless Ad Hoc Routing," Y. Hu et al., May/June, pp. 28-39.

"Autonomic 802.11 Wireless LAN Security Auditing," J.W. Branch et al., May/June, pp. 56-65.

"Overview of IEEE 802.16 Security," D. Johnston et al., May/June, pp. 40-48.

"The Security and Privacy of Smart Vehicles," J. Hubaux et al., May/June, pp. 49-55.

"Wired on Wireless" [Guest Editors' Introduction], W.A. Arbaugh, May/June, pp. 26-27.

Malware Recon

"The Spread of the Witty Worm," C. Shannon et al., July/Aug., pp. 46-50.

News

"Balancing Video-Game Piracy Issues," P.F. Gorder, Jan./Feb., p. 17.

"Corporate Security Under Siege," B.J. Alfonsi, July/Aug., p. 13.

"DES is Dead: NIST Declares Standard Officially Obsolete," G. Goth, Sept./Oct., p. 9.

"E-Voting Security: The Electoral Dialectic Gets Hot," G. Goth, Jan./Feb., pp. 14-17.

"How Useful Are Attack Trend Resources?," G. Goth, Mar./Apr., pp. 9-11.

"NewsBriefs," S.L. Andresen, Jan./Feb., pp. 18-19.

"NewsBriefs," S.L. Andresen, Mar./Apr., pp. 14-15.

"NewsBriefs," S.L. Andresen, May/June, pp. 16-17.

"NewsBriefs," S.L. Andresen, July/Aug., pp. 14-15.

"NewsBriefs," E. Goetz, G. Jones and B. Kesler, Nov./Dec., pp. 10-11.

"Privacy Debate Centers on Radio Frequency Identification," B.J. Alfonsi, Mar./Apr., p. 12.

"Richard Clarke Talks Cybersecurity and JELL-O," G. Goth, May/June, pp. 11-15.

"Santa Barbara Health Exchange: User-Driven Security Prevails," G. Goth, Sept./Oct., pp. 8-9.

"The Delicate Balance: Security and Privacy," A. Stone, July/Aug., pp. 12-13.

"Timetable Set for Better Intelligence Network," G. Goth, Nov./Dec., pp. 8-9.

"Secure Real-Time Operating Systems at Lower Costs", B.J. Alfonsi, Nov./Dec., p. 9.

On the Horizon

"Multilevel Security: Reprise," O. Sami Saydjari, Sept./Oct., pp. 64-67.

"Quantum Cryptography," C. Elliott, July/Aug., pp. 57-61.

"Regulation and Information Security: Can Y2K Lessons Help Us?," J.E. Payne, Mar./Apr., pp. 58-61.

"Risk-based Systems Security Engineering: Stopping Attacks with Intention," S. Evans et al., Nov./Dec., pp. 59-62.

"Worm and Attack Early Warning," S.J. Stolfo, May/June, pp. 73-75.

Privacy

"Financial Privacy Policies and the Need for Standardization," A.I. Antón et al., Mar./Apr., pp. 36-45.

"Inside JetBlue's Privacy Policy Violations," A.I. Antón et al., Nov./Dec., pp. 12-18.

"Privacy-Preserving Data Mining: How, Why, and When," J. Vaidya, Nov./Dec., pp. 19-27.

Privacy Matters

"Online Monitoring: Security or Social Control?," M.A. Caloyannides, Jan./Feb., pp. 81-83.

"The Cost of Convenience: A Faustian Deal," M.A. Caloyannides, Mar./Apr., pp. 84-87.

"Security or Cosmetology?," M.A. Caloyannides, May/June, pp. 93-95.

"Is Privacy Really Constraining Security or Is this a Red Herring?," M.A. Caloyannides, July/Aug., pp. 86-87.

"Speech Privacy Technophobes Need Not Apply," M.A. Caloyannides, Sept./Oct., pp. 86-87.

"Enhancing Security: Not for the Conformist," M.A. Caloyannides, Nov./Dec., pp. 86-88.

Secure Systems

"Grand Challenges in Information Security: Process and Output," S.W. Smith et al., Jan./Feb., pp. 69-71.

"The Power of Candy-Coated Bits," P. Wayner, Mar./Apr., pp. 69-72.

"Online Impersonation in Securities Scams," M.F. Vilardo, May/June, pp. 82-85.

"Deploying and Using Public Key Technology: Lessons Learned in Real Life," R. Guida et al., July/Aug., pp. 67-71.

"How to Win an Evolutionary Arms Race," A. Somayaji, Nov./Dec., pp. 70-72.

Software Auditing

"Susceptibility Matrix: A New Aid to Software Auditing," K. Jiwnani et al., Mar./Apr., pp. 16-21.

Special Report

"Processes for Producing Secure Software: Summary of US National Cybersecurity Summit Subgroup Report," N. Davis et al., May/June, pp. 18-25.

The Honeynet Files

"Anti-Honeypot Technology," N. Krawetz, Jan./Feb., pp. 76-79.

"The Honeywall CD-ROM," G. Chamales, Mar./Apr., pp. 77-79.

"Honeypot Forensics Part I: Analyzing the Network," F. Raynal et al., July/Aug., pp. 72-78.

"Honeypot Forensics, Part II: Analyzing the Compromised Host," F. Raynal et al., Sept./Oct., pp. 77-80.

"Using Honeynets to Protect Large Enterprise Networks," J.G. Levine, Nov./Dec., pp. 73-75.

Usability & Security

"In Search of Usable Security: Five Lessons from the Field," D. Balfanz et al., Sept./Oct., pp. 19-24.

"Secure or Usable?" [Guest Editors' Introduction], L.F. Cranor et al., Sept./Oct., pp. 16-18.

"Designing and Evaluating Challenge-Question Systems," M. Just, Sept./Oct., pp. 32-39.

"Typing Patterns: A Key to User Identification," A. Peacock et al., Sept./Oct., pp. 40-47.

"Password Memorability and Security: Empirical Results," J. Yan et al., Sept./Oct., pp. 25-31.

"Aligning Security and Usability," K.-P. Yee, Sept./Oct., pp. 48-55.

22 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool