The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.06 - November/December (2005 vol.3)
pp: 90-95
Published by the IEEE Computer Society

Author Index

A

Acquisti, A., and J. Grossklags, "Privacy and Rationality in Individual Decision Making" [Economics of Information Security], Jan./Feb., pp. 26–33.

Adams, C.,"Building Secure Web-Based Environments: Understanding Research Interrelationships through a Construction Metaphor" [Secure Systems], Jan./Feb., pp. 74–77.

Adar, E., see Huberman, B.A., Sept./Oct., pp. 22–25.

Ahamad, M.,see Conti, G., Nov./Dec., pp. 50–56.

Alfonsi, B., "FBI's Virtual Case File Living in Limbo" [News], Mar./Apr., p. 7.

Alfonsi, B., "Alliance Addresses VoIP Security" [News], July/Aug., p. 8.

Allen, K.,see Irvine, C.E., May/June, pp. 61–64.

Allen, W.H., "Computer Forensics" [Basic Training], July/Aug., pp. 59–62.

Amin, M., "Guest Editor's Introduction: Infrastructure Security—Reliability and Dependability of Critical Systems" [Infrastructure Security], May/June, pp. 15–17.

Anderson, R.,see Danezis, G., Jan./Feb., pp. 45–50.

Anderson, R., and B. Schneier, "Guest Editors' Introduction: Economics of Information Security" [Economics of Information Security], Jan./Feb., pp. 12–13.

Apvrille, A., and M. Pourzandi, "Secure Software Development by Example" [Software Development], July/Aug., pp. 10–17.

Arce, I., "Bad Peripherals" [Attack Trends], Jan./Feb., pp. 70–73.

Arce, I., "The Land of the Blind" [Attack Trends], July/Aug., pp. 63–67.

Arkin, B., S. Stender, and G. McGraw, "Software Penetration Testing" [Building Security In], Jan./Feb., pp. 84–87.

Arora, A., and R. Telang, "Economics of Software Vulnerability Disclosure" [Economics of Information Security], Jan./Feb., pp. 20–25.

Arshad, F.,see Reeder, R.W., Sept./Oct., pp. 47–50.

B

Bailey, M., E. Cooke, F. Jahanian, D. Watson, and J. Nazario, "The Blaster Worm: Then and Now" [Attack Models], July/Aug., pp. 26–31.

Barnum, S., and G. McGraw, "Knowledge for Software Security" [Building Security In], Mar./Apr., pp. 74–78.

Bellovin, S., "Security and Privacy: Enemies or Allies?" [Clear Text], May/June, p. 92.

Bishop, M., and D.A. Frincke, "A Human Endeavor: Lessons from Shakespeare and Beyond" [Education], July/Aug., pp. 49–51.

Bishop, M., and D.A. Frincke, "Teaching Secure Programming" [Education], Sept./Oct., pp. 54–56.

Blaze, M.,see Sherr, M., Nov./Dec., pp. 13–25.

Bloom, G.,see Pfleeger, S.L., Mar./Apr., pp. 40–47.

Bodorik, P.,see Jutla, D.N., Mar./Apr., pp. 29–39.

Borg, S., "Economically Complex Cyberattacks" [On the Horizon], Nov./Dec., pp. 64–67.

Brown, L.,see Senior, A., May/June, pp. 50–57.

Burmester, M.,see Yasinsac, A., Jan./Feb., pp. 62–65.

C

Cai, M., K. Hwang, Y. Kwok, S. Song, and Y. Chen, "Collaborative Internet Worm Containment" [Infrastructure Security], May/June, pp. 25–33.

Campbell, P.L., "The Denial-of-Service Dance" [System Defense], Nov./Dec., pp. 34–40.

Carminati, B., E. Ferrari, and P.C.K. Hung, "Exploring Privacy Issues in Web Services Discovery Agencies" [The Value of Privacy], Sept./Oct., pp. 14–21.

Chen, Y.,see Cai, M., May/June, pp. 25–33.

Chess, B.,see Tsipenyuk, K., Nov./Dec., pp. 81–84.

Clark, S.,see Sherr, M., Nov./Dec., pp. 13–25.

Connell, J.,see Senior, A., May/June, pp. 50–57.

Conti, G., and M. Ahamad, "A Framework for Countering Denial-of-Information Attacks" [Denial of Information], Nov./Dec., pp. 50–56.

Cooke, E.,see Bailey, M., July/Aug., pp. 26–31.

Cronin, E.,see Sherr, M., Nov./Dec., pp. 13–25.

Cybenko, G., "The One-Eyed Man Is King" [From the Editors], July/Aug., pp. 4–5.

D

Danezis, G., and R. Anderson, "The Economics of Resisting Censorship" [Economics of Information Security], Jan./Feb., pp. 45–50.

Dodge, R.,see Hoffman, L.J., Sept./Oct., pp. 27–33.

Dodge, R., and D. Ragsdale, "Technology Education at the US Military Academy" [Education], Mar./Apr., pp. 49–53.

Donner, M., "What's in a Name?" [From the Editors], Mar./Apr., pp. 4–5.

Donner, M., "A Young Geek's Fancy Turns to...Science Fiction?" [Biblio Tech], May/June, pp. 58–60.

Donner, M., "There Ain't No Inside, There Ain't No Outside..." [From the Editor], Sept./Oct., pp. 4–5.

Drinan, H., and B. Kesler, "News Briefs" [News], Sept./Oct., pp. 8–10.

Drinan, H., N. Fontaine, and B. Kesler, "News Briefs" [News], Nov./Dec., pp. 7–8.

E

Ekin, A.,see Senior, A., May/June, pp. 50–57.

F

Ferrari, E.,see Carminati, B., Sept./Oct., pp. 14–21.

Fine, L.R.,see Huberman, B.A., Sept./Oct., pp. 22–25.

Fontaine, N.,see Drinan, H., Nov./Dec., pp. 7–8.

Ford, R., "Malcode Mysteries Revealed" [Basic Training], May/June, pp. 72–75.

Friesen, O.,see Sheoran, P., Nov./Dec., pp. 61–63.

Frincke, D.A.,see Bishop, M., July/Aug., pp. 49–51.

Frincke, D.A.,see Bishop, M., Sept./Oct., pp. 54–56.

G

Garfinkel, S.L., A. Juels, and R. Pappu, "RFID Privacy: An Overview of Problems and Proposed Solutions" [Radio Frequency Identification], May/June, pp. 34–43.

Gattiker, U.E., "EICAR 2005" [Conference Reports], July/Aug., pp. 45–48.

Geer Jr., D., "The Problem Statement Is the Problem" [Clear Text], Mar./Apr., p. 80.

Geer Jr., D., "When Is a Product a Security Product?" [Clear Text], Sept./Oct., p. 80.

Goetz, E., G. Jones, and B. Kesler, "News Briefs" [News], Mar./Apr., pp. 8–10.

Goth, G., "Phishing Attacks Rising, But Dollar Losses Down" [News], Jan./Feb., p. 8.

Grigg, I.,see Gutmann, P., July/Aug., pp. 56–58.

Grossklags, J.,see Acquisti, A., Jan./Feb., pp. 26–33.

Gutmann, P., D. Naccache, and C.C. Palmer, "When Hashes Collide" [Crypto Corner], May/June, pp. 68–71.

Gutmann, P., and I. Grigg, "Security Usability" [Crypto Corner], July/Aug., pp. 56–58.

H

Hampapur, A.,see Senior, A., May/June, pp. 50–57.

Heikkila, F.M., "SecureWorld Expo 2005" [Conference Reports], Nov./Dec., pp. 57–60.

Hoffman, L.J., T. Rosenberg, R. Dodge, and D. Ragsdale, "Exploring a National Cybersecurity Exercise for Universities" [Cyberexercises], Sept./Oct., pp. 27–33.

Holz, T., "A Short Visit to the Bot Zoo" [Attack Trends], May/June, pp. 76–79.

Huberman, B.A., E. Adar, and L.R. Fine, "Valuating Privacy" [The Value of Privacy], Sept./Oct., pp. 22–25.

Huffman de Belón, B.J.,see Sheoran, P., Nov./Dec., pp. 61–63.

Hung, P.C.K.,see Carminati, B., Sept./Oct., pp. 14–21.

Hwang, K.,see Cai, M., May/June, pp. 25–33.

I

Iliev, A., and S.W. Smith, "Protecting Client Privacy with Trusted Computing at the Server" [Trusted Computing], Mar./Apr., pp. 20–28.

Irvine, C.E., M.F. Thompson, and K. Allen, "CyberCIEGE: Gaming for Information Assurance" [Education], May/June, pp. 61–64.

Iverson, R., "A Framework to Consider" [Book Reviews], Mar./Apr., p. 14.

J

Jahanian, F.,see Bailey, M., July/Aug., pp. 26–31.

Jones, G.,see Goetz, E., Mar./Apr., pp. 8–10.

Jones, G., and B. Kesler, "News Briefs" [News], May/June, pp. 12–14.

Juels, A.,see Garfinkel, S.L., May/June, pp. 34–43.

Jutla, D.N., and P. Bodorik, "Sociotechnical Architecture for Online Privacy" [Online Privacy], Mar./Apr., pp. 29–39.

K

Kantubhukta, H.R.,see Ray, H.T., July/Aug., pp. 18–25.

Karygiannis, T.,see Phillips, T., Nov./Dec., pp. 85–89.

Keromytis, A.D.,see Sidiroglou, S., Nov./Dec., pp. 41–49.

Kesler, B.,see Jones, G., May/June, pp. 12–14.

Kesler, B.,see Drinan, H., Sept./Oct., pp. 8–10.

Kesler, B.,see Drinan, H., Nov./Dec., pp. 7–8.

Kuhn, D.R.,see Walsh, T.J., May/June, pp. 44–49.

Kuhn, R.,see Phillips, T., Nov./Dec., pp. 85–89.

Kuper, P., "The State of Security" [Industry Trends], Sept./Oct., pp. 51–53.

Kwok, Y.,see Cai, M., May/June, pp. 25–33.

L

Landau, S., M.R. Stytz, C.E. Landwehr, and F.B. Schneider, "Overview of Cyber Security: A Crisis of Prioritization" [PITAC Cybersecurity Report], May/June, pp. 9–11.

Landau, S., "Security, Wiretapping, and the Internet" [Under Surveillance], Nov./Dec., pp. 26–33.

Landwehr, C.E., "Changing the Puzzle Pieces" [From the Editors], Jan./Feb., pp. 3–4.

Landwehr, C.E.,see Landau, S., May/June, pp. 9–11.

Landwehr, C.E., "Green Computing" [From the Editors], Nov./Dec., p. 4.

Lekkas, D., and D. Spinellis, "Handling and Reporting Security Advisories: A Scorecard Approach" [Vulnerability Disclosure], July/Aug., pp. 32–41.

Lesk, M., "Salute the Broadcast Flag" [Digital Protection], May/June, pp. 84–87.

Levy, E., "Worm Propagation and Generic Attacks" [Attack Trends], Mar./Apr., pp. 63–65.

Libicki, M., "Are RFIDs Coming to Get You?" [Book Reviews], Nov./Dec., p. 6.

Linn, J., "Technology and Web User Data Privacy: A Survey of Risks and Countermeasures" [Data Privacy], Jan./Feb., pp. 52–58.

Lu, M.,see Senior, A., May/June, pp. 50–57.

M

Marin, G.A., "Network Security Basics" [Basic Training], Nov./Dec., pp. 68–72.

Maxion, R.A., and R.R.M. Roberts, "Methodological Foundations: Enabling the Next Generation of Security" [On the Horizon], Mar./Apr., pp. 54–57.

McGraw, G.,see Arkin, B., Jan./Feb., pp. 84–87.

McGraw, G.,see Barnum, S., Mar./Apr., pp. 74–78.

McGraw, G.,see Taylor, D., May/June, pp. 88–91.

McGraw, G.,see Mead, N.R., July/Aug., pp. 75–79.

McGraw, G.,see van Wyk, K.R., Sept./Oct., pp. 75–79.

McGraw, G.,see Tsipenyuk, K., Nov./Dec., pp. 81–84.

McLaughlin, L., "Holistic Security" [Interview with Tom Leighton], May/June, pp. 6–8.

McLaughlin, L., "From AWK to Google: Peter Weinberger Talks Search" [Interview], Sept./Oct., pp. 11–13.

McLaughlin, L., "Winning the Game of Risk: Neumann's Take on Sound Design" [Interview], Nov./Dec., pp. 9–12.

Mead, N.R., and G. McGraw, "A Portal for Software Security" [Building Security In], July/Aug., pp. 75–79.

Miller, A., "Trends in Process Control Systems Security" [On the Horizon], Sept./Oct., pp. 57–60.

Mulvenon, J., "Toward a Cyberconflict Studies Research Agenda" [On the Horizon], July/Aug., pp. 52–55.

N

Naccache, D.,see Gutmann, P., May/June, pp. 68–71.

Naccache, D., "Finding Faults" [Crypto Corner], Sept./Oct., pp. 61–65.

Nazario, J.,see Bailey, M., July/Aug., pp. 26–31.

Nicol, D.M., "Modeling and Simulation in Security Evaluation" [Secure Systems], Sept./Oct., pp. 71–74.

O

Oehlert, P., "Violating Assumptions with Fuzzing" [Basic Training], Mar./Apr., pp. 58–62.

Oppliger, R., and R. Rytz, "Does Trusted Computing Remedy Computer Security Problems?" [Trusted Computing], Mar./Apr., pp. 16–19.

P

Palmer, C.C.,see Gutmann, P., May/June, pp. 68–71.

Pankanti, S.,see Senior, A., May/June, pp. 50–57.

Pappu, R.,see Garfinkel, S.L., May/June, pp. 34–43.

Paul, N., "A Closer Look at Viruses and Worms" [Book Reviews], July/Aug., p. 7.

Pfleeger, S.L., and G. Bloom, "Canning Spam: Proposed Solutions to Unwanted Email" [Spam Solutions], Mar./Apr., pp. 40–47.

Phillips, T., T. Karygiannis, and R. Kuhn, "Security Standards for the RFID Market" [Emerging Standards], Nov./Dec., pp. 85–89.

Pourzandi, M.,see Apvrille, A., July/Aug., pp. 10–17.

Power, E.M., and R.L. Trope, "Averting Security Missteps in Outsourcing" [Digital Protection], Mar./Apr., pp. 70–73.

Power, E.M., and R.L. Trope, "Acting Responsibly with Geospatial Data" [Digital Protection], Nov./Dec., pp. 77–80.

R

Ragsdale, D.,see Dodge, R., Mar./Apr., pp. 49–53.

Ragsdale, D.,see Hoffman, L.J., Sept./Oct., pp. 27–33.

Ray, H.T., R. Vemuri, and H.R. Kantubhukta, "Toward an Automated Attack Model for Red Teams" [Attack Models], July/Aug., pp. 18–25.

Reeder, R.W., and F. Arshad, "Soups 2005" [Conference Reports], Sept./Oct., pp. 47–50.

Rescorla, E., "Is Finding Security Holes a Good Idea?" [Economics of Information Security], Jan./Feb., pp. 14–19.

Roberts, R.R.M.,see Maxion, R.A., Mar./Apr., pp. 54–57.

Rosenberg, T.,see Hoffman, L.J., Sept./Oct., pp. 27–33.

Rytz, R.,see Oppliger, R., Mar./Apr., pp. 16–19.

S

Sahinoglu, M., "Security Meter: A Practical Decision-Tree Model to Quantify Risk" [Infrastructure Security], May/June, pp. 18–24.

Schechter, S.E., "Toward Econometric Models of the Security Risk from Remote Attack" [Economics of Information Security], Jan./Feb., pp. 40–44.

Schneider, F.B., "It Depends on What You Pay" [From the Editors], May/June, p. 3.

Schneider, F.B.,see Landau, S., May/June, pp. 9–11.

Schneider, F.B., and L. Zhou, "Implementing Trustworthy Services Using Replicated State Machines" [Distributed Trust], Sept./Oct., pp. 34–43.

Schneier, B.,see Anderson, R., Jan./Feb., pp. 12–13.

Schneier, B., "Authentication and Expiration" [Clear Text], Jan./Feb., p. 88.

Schneier, B., "The Zotob Storm" [Clear Text], Nov./Dec., p. 96.

Senior, A., S. Pankanti, A. Hampapur, L. Brown, Y. Tian, A. Ekin, J. Connell, C. Fe Shu, and M. Lu, "Enabling Video Privacy through Computer Vision" [Video Privacy], May/June, pp. 50–57.

Sheoran, P.,O. Friesen, and B.J. Huffman de Belón, "Developing and Sustaining Information Assurance: The Role of Community Colleges (Part 1)" [Education], Nov./Dec., pp. 61–63.

Sherr, M., E. Cronin, S. Clark, and M. Blaze, "Signaling Vulnerabilities in Wiretapping Systems" [Under Surveillance], Nov./Dec., pp. 13–25.

Shu, C. Fe,see Senior, A., May/June, pp. 50–57.

Sidiroglou, S., and A.D. Keromytis, "Countering Network Worms through Automatic Patch Generation" [Network Worms], Nov./Dec., pp. 41–49.

Sinclair, S., and S. Smith, "The TIPPI Point: Toward Trustworthy Interfaces" [Secure Systems], July/Aug., pp. 68–71.

Skalka, C., "Programming Languages and Systems Security" [Secure Systems], May/June, pp. 80–83.

Smith, S.W.,see Iliev, A., Mar./Apr., pp. 20–28.

Smith, S.W., "Turing Is from Mars, Shannon Is from Venus: Computer Science and Computer Engineering" [Secure Systems], Mar./Apr., pp. 66–69.

Smith, S.W.,see Sinclair, S., July/Aug., pp. 68–71.

Smith, S.W., "Pretending that Systems Are Secure" [Secure Systems], Nov./Dec., pp. 73–76.

Snow, B., "Four Ways to Improve Security" [On the Horizon], May/June, pp. 65–67.

Song, S.,see Cai, M., May/June, pp. 25–33.

Spinellis, D.,see Lekkas, D., July/Aug., pp. 32–41.

Stender, S.,see Arkin, B., Jan./Feb., pp. 84–87.

Stytz, M.R., "Studying Attacks to Improve Software Defense" [Book Reviews], Jan./Feb., p. 11.

Stytz, M.R., "Under the Black Hat" [Book Reviews], May/June, p. 5.

Stytz, M.R.,see Landau, S., May/June, pp. 9–11.

Stytz, M.R., "Protecting Personal Privacy: Hauling Down the Jolly Roger" [Digital Protection], July/Aug., pp. 72–74.

T

Taylor, D., and G. McGraw, "Adopting a Software Security Improvement Program" [Building Security In], May/June, pp. 88–91.

Telang, R.,see Arora, A., Jan./Feb., pp. 20–25.

Thompson, H.H., "Application Penetration Testing" [Basic Training], Jan./Feb., pp. 66–69.

Thompson, M.F.,see Irvine, C.E., May/June, pp. 61–64.

Tian, Y.,see Senior, A., May/June, pp. 50–57.

Torr, P., "Demystifying the Threat-Modeling Process" [Basic Training], Sept./Oct., pp. 66–70.

Trope, R.L., "Directors' Digital Fiduciary Duties" [Digital Protection], Jan./Feb., pp. 78–82.

Trope, R.L.,see Power, E.M., Mar./Apr., pp. 70–73.

Trope, R.L.,see Power, E.M., Nov./Dec., pp. 77–80.

Tsipenyuk, K., B. Chess, and G. McGraw, "Seven Pernicious Kingdoms: A Taxonomy of Software Security Errors" [Building Security In], Nov./Dec., pp. 81–84.

V

van Wyk, K.R., and G. McGraw, "Bridging the Gap between Software Development and Information Security" [Building Security In], Sept./Oct., pp. 75–79.

Varian, H., F. Wallenberg, and G. Woroch, "The Demographics of the Do-Not-Call List" [Economics of Information Security], Jan./Feb., pp. 34–39.

Vemuri, R.,see Ray, H.T., July/Aug., pp. 18–25.

W

Wallenberg, F.,see Varian, H., Jan./Feb., pp. 34–39.

Walsh, T.J., and D.R. Kuhn, "Challenges in Securing Voice over IP" [Voice over IP], May/June, pp. 44–49.

Watson, D.,see Bailey, M., July/Aug., pp. 26–31.

Webb, K.W., "Biometric Security Solutions" [Book Reviews], Sept./Oct., p. 7.

Weiss, S.A., "Crypto 2004" [Conference Reports], Mar./Apr., pp. 11–13.

Woroch, G.,see Varian, H., Jan./Feb., pp. 34–39.

Y

Yasinsac, A., and M. Burmester, "Centers of Academic Excellence: A Case Study" [Education], Jan./Feb., pp. 62–65.

Z

Zhou, L.,see Schneider, F.B., Sept./Oct., pp. 34–43.

Subject Index

Attack Models

"The Blaster Worm: Then and Now," M. Bailey et al., July/Aug., pp. 26–31.

"Toward an Automated Attack Model for Red Teams," H.T. Ray et al., July/Aug., pp. 18–25.

Attack Trends

"A Short Visit to the Bot Zoo," T. Holz, May/June, pp. 76–79.

"Bad Peripherals," I. Arce, Jan./Feb., pp. 70–73.

"The Land of the Blind," I. Arce, July/Aug., pp. 63–67.

"Worm Propagation and Generic Attacks," E. Levy, Mar./Apr., pp. 63–65.

Basic Training

"Application Penetration Testing," H.H. Thompson, Jan./Feb., pp. 66–69.

"Computer Forensics," W.H. Allen, July/Aug., pp. 59–62.

"Demystifying the Threat-Modeling Process," P. Torr, Sept./Oct., pp. 66–70.

"Malcode Mysteries Revealed," R. Ford, May/June, pp. 72–75.

"Network Security Basics," G.A. Marin, Nov./Dec., pp. 68–72.

"Violating Assumptions with Fuzzing," P. Oehlert, Mar./Apr., pp. 58–62.

Biblio Tech

"A Young Geek's Fancy Turns to...Science Fiction?" M. Donner, May/June, pp. 58–60.

Book Reviews

"A Closer Look at Viruses and Worms," N. Paul, July/Aug., p. 7.

"A Framework to Consider," R. Iverson, Mar./Apr., p. 14.

"Are RFIDs Coming to Get You?" M. Libicki, Nov./Dec., p. 6.

"Biometric Security Solutions," K.W. Webb, Sept./Oct., p. 7.

"Studying Attacks to Improve Software Defense," M.R. Stytz, Jan./Feb., p. 11.

"Under the Black Hat," M.R. Stytz, May/June, p. 5.

Building Security In

"A Portal for Software Security," N.R. Mead et al., July/Aug., pp. 75–79.

"Adopting a Software Security Improvement Program," D. Taylor et al., May/June, pp. 88–91.

"Bridging the Gap between Software Development and Information Security," K.R. van Wyk et al., Sept./Oct., pp. 75–79.

"Knowledge for Software Security," S. Barnum et al., Mar./Apr., pp. 74–78.

"Seven Pernicious Kingdoms: A Taxonomy of Software Security Errors," K. Tsipenyuk et al., Nov./Dec., pp. 81–84.

"Software Penetration Testing," B. Arkin et al., Jan./Feb., pp. 84–87.

Clear Text

"Authentication and Expiration," B. Schneier, Jan./Feb., p. 88.

"Security and Privacy: Enemies or Allies?" S. Bellovin, May/June, p. 92.

"The Problem Statement Is the Problem," D. Geer Jr., Mar./Apr., p. 80.

"The Zotob Storm," B. Schneier, Nov./Dec., p. 96.

"When Is a Product a Security Product?" D. Geer Jr., Sept./Oct., p. 80.

Conference Reports

"Crypto 2004," S.A. Weiss, Mar./Apr., pp. 11–13.

"EICAR 2005," U.E. Gattiker, July/Aug., pp. 45–48.

"SecureWorld Expo 2005," F.M. Heikkila, Nov./Dec., pp. 57–60.

"Soups 2005," R.W. Reeder et al., Sept./Oct., pp. 47–50.

Crypto Corner

"Finding Faults," D. Naccache, Sept./Oct., pp. 61–65.

"Security Usability," P. Gutmann et al., July/Aug., pp. 56–58.

"When Hashes Collide," P. Gutmann et al., May/June, pp. 68–71.

Cyberexercises

"Exploring a National Cybersecurity Exercise for Universities," L.J. Hoffman et al., Sept./Oct., pp. 27–33.

Data Privacy

"Technology and Web User Data Privacy: A Survey of Risks and Countermeasures," J. Linn, Jan./Feb., pp. 52–58.

Denial of Information

"A Framework for Countering Denial-of-Information Attacks," G. Conti et al., Nov./Dec., pp. 50–56.

Digital Protection

"Acting Responsibly with Geospatial Data," E.M. Power et al., Nov./Dec., pp. 77–80.

"Averting Security Missteps in Outsourcing," E.M. Power et al., Mar./Apr., pp. 70–73.

"Directors' Digital Fiduciary Duties," R.L. Trope, Jan./Feb., pp. 78–82.

"Protecting Personal Privacy: Hauling Down the Jolly Roger," M.R. Stytz, July/Aug., pp. 72–74.

"Salute the Broadcast Flag," M. Lesk, May/June, pp. 84–87.

Distributed Trust

"Implementing Trustworthy Services Using Replicated State Machines," F.B. Schneider et al., Sept./Oct., pp. 34–43.

Economics of Information Security

"Economics of Software Vulnerability Disclosure," A. Arora et al., Jan./Feb., pp. 20–25.

"Guest Editors' Introduction: Economics of Information Security," R. Anderson et al., Jan./Feb., pp. 12–13.

"Is Finding Security Holes a Good Idea?" E. Rescorla, Jan./Feb., pp. 14–19.

"Privacy and Rationality in Individual Decision Making," A. Acquisti et al., Jan./Feb., pp. 26–33.

"The Demographics of the Do-Not-Call List," H. Varian et al., Jan./Feb., pp. 34–39.

"The Economics of Resisting Censorship," G. Danezis et al., Jan./Feb., pp. 45–50.

"Toward Econometric Models of the Security Risk from Remote Attack," S.E. Schechter, Jan./Feb., pp. 40–44.

Education

"A Human Endeavor: Lessons from Shakespeare and Beyond," M. Bishop et al., July/Aug., pp. 49–51.

"Centers of Academic Excellence: A Case Study," A. Yasinsac et al., Jan./Feb., pp. 62–65.

"CyberCIEGE: Gaming for Information Assurance," C.E. Irvine et al., May/June, pp. 61–64.

"Developing and Sustaining Information Assurance: The Role of Community Colleges (Part 1)," P. Sheoran et al., Nov./Dec., pp. 61–63.

"Teaching Secure Programming," M. Bishop et al., Sept./Oct., pp. 54–56.

"Technology Education at the US Military Academy," R. Dodge et al., Mar./Apr., pp. 49–53.

Emerging Standards

"Security Standards for the RFID Market," T. Phillips et al., pp. 85–89.

From the Editors

"Changing the Puzzle Pieces," C.E. Landwehr, Jan./Feb., pp. 3–4.

"Green Computing," C.E. Landwehr, Nov./Dec., p. 4.

"It Depends on What You Pay," F.B. Schneider, May/June, p. 3.

"The One-Eyed Man Is King," G. Cybenko, July/Aug., pp. 4–5.

"There Ain't No Inside, There Ain't No Outside...," M. Donner, Sept./Oct., pp. 4–5.

"What's in a Name?" M. Donner, Mar./Apr., pp. 4–5.

Industry Trends

"The State of Security," P. Kuper, Sept./Oct., pp. 51–53.

Infrastructure Security

"Collaborative Internet Worm Containment," M. Cai et al., May/June, pp. 25–33.

"Guest Editor's Introduction: Infrastructure Security—Reliability and Dependability of Critical Systems," M. Amin, May/June, pp. 15–17.

"Security Meter: A Practical Decision-Tree Model to Quantify Risk," M. Sahinoglu, May/June, pp. 18–24.

Interview

"From AWK to Google: Peter Weinberger Talks Search," L. McLaughlin, Sept./Oct., pp. 11–13.

"Holistic Security," L. McLaughlin, May/June, pp. 6–8.

"Winning the Game of Risk: Neumann's Take on Sound Design," L. McLaughlin, Nov./Dec., pp. 9–12.

Network Worms

"Countering Network Worms through Automatic Patch Generation," S. Sidiroglou et al., Nov./Dec., pp. 41–49.

News

"Alliance Addresses VoIP Security," B. Alfonsi, July/Aug., p. 8.

"FBI's Virtual Case File Living in Limbo," B. Alfonsi, Mar./Apr., p. 7.

"News Briefs," E. Goetz et al., Jan./Feb., pp. 9–10.

"News Briefs," E. Goetz et al., Mar./Apr., pp. 8–10.

"News Briefs," G. Jones et al., May/June, pp. 12–14.

"News Briefs," H. Drinan et al., Sept./Oct., pp. 8–10.

"News Briefs," H. Drinan et al., Nov./Dec., pp. 7–8.

"Phishing Attacks Rising, But Dollar Losses Down," G. Goth, Jan./Feb., p. 8.

On the Horizon

"Economically Complex Cyberattacks," S. Borg, Nov./Dec., pp. 64–67.

"Four Ways to Improve Security," B. Snow, May/June, pp. 65–67.

"Methodological Foundations: Enabling the Next Generation of Security," R.A. Maxion et al., Mar./Apr., pp. 54–57.

"Toward a Cyberconflict Studies Research Agenda," J. Mulvenon, July/Aug., pp. 52–55.

"Trends in Process Control Systems Security," A. Miller, Sept./Oct., pp. 57–60.

Online Privacy

"Sociotechnical Architecture for Online Privacy," D.N. Jutla et al., Mar./Apr., pp. 29–39.

PITAC Cybersecurity Report

"Overview of Cyber Security: A Crisis of Prioritization," S. Landau et al., May/June, pp. 9–11.

Radio Frequency Identification

"RFID Privacy: An Overview of Problems and Proposed Solutions," S.L. Garfinkel et al., May/June, pp. 34–43.

Secure Systems

"Building Secure Web-Based Environments: Understanding Research Interrelationships through a Construction Metaphor," C. Adams, Jan./Feb., pp. 74–77.

"Modeling and Simulation in Security Evaluation," D.M. Nicol, Sept./Oct., pp. 71–74.

"Pretending that Systems Are Secure," S.W. Smith, Nov./Dec., pp. 73–76.

"Programming Languages and Systems Security," C. Skalka, May/June, pp. 80–83.

"The TIPPI Point: Toward Trustworthy Interfaces," S. Sinclair et al., July/Aug., pp. 68–71.

"Turing Is from Mars, Shannon Is from Venus: Computer Science and Computer Engineering," S.W. Smith, Mar./Apr., pp. 66–69.

Software Development

"Secure Software Development by Example," A. Apvrille et al., July/Aug., pp. 10–17.

Spam Solutions

"Canning Spam: Proposed Solutions to Unwanted Email," S.L. Pfleeger et al., Mar./Apr., pp. 40–47.

System Defense

"The Denial-of-Service Dance," P.L. Campbell, Nov./Dec., pp. 34–40.

The Value of Privacy

"Exploring Privacy Issues in Web Services Discovery Agencies," B. Carminati et al., Sept./Oct., pp. 14–21.

"Valuating Privacy," B.A. Huberman et al., Sept./Oct., pp. 22–25.

Trusted Computing

"Does Trusted Computing Remedy Computer Security Problems?" R. Oppliger et al., Mar./Apr., pp. 16–19.

"Protecting Client Privacy with Trusted Computing at the Server," A. Iliev et al., Mar./Apr., pp. 20–28.

Under Surveillance

"Security, Wiretapping, and the Internet," S. Landau, Nov./Dec., pp. 26–33.

"Signaling Vulnerabilities in Wiretapping Systems," M. Sherr et al., Nov./Dec., pp. 13–25.

Video Privacy

"Enabling Video Privacy through Computer Vision," A. Senior et al., May/June, pp. 50–57.

Voice over IP

"Challenges in Securing Voice over IP," T.J. Walsh et al., May/June, pp. 44–49.

Vulnerability Disclosure

"Handling and Reporting Security Advisories: A Scorecard Approach," D. Lekkas et al., July/Aug., pp. 32–41.

14 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool