Advanced Search 
IEEE Security & Privacy
September/October 2008 (vol. 6 no. 5)
ISSN: 1540-7993
Table of Contents
From the Editors
BookReviews
Martin R. Stytz, Institute for Defense Analyses
pp. 5
Interview
News Briefs
Guest Editors' Introduction
Virtualization
Paul A. Karger, IBM's T.J. Watson Research Center
David R. Safford, IBM's T.J. Watson Research Center
pp. 16-23
Ronald Perez, IBM T.J. Watson Research Center
Leendert van Doorn, Advanced Micro Devices
Reiner Sailer, IBM T.J. Watson Research Center
pp. 24-31
Kara Nance, University of Alaska, Fairbanks
Matt Bishop, University of California, Davis
Brian Hay, University of Alaska, Fairbanks
pp. 32-37
Risk Management
Data Privacy
Panayiotis Kotzanikolaou, Hellenic Authority for the Assurance of the Communications Security and Privacy (ADAE)
pp. 46-52
Education
Matt Bishop, University of California, Davis
Deborah A. Frincke, Pacific Northwest National Laboratory
pp. 54-57
Privacy Interests
Crypto Corner
Basic Training
Wei Yan, Trend Micro
Zheng Zhang, McAfee
Nirwan Ansari, New Jersey Institute of Technology
pp. 65-69
Attack Trends
Secure Systems
Digital Protection
Roland L. Trope, Trope and Schramm, LLP
William J. Adams, US Military Academy, West Point
pp. 77-81
Building Security In
For Good Measure
Clear Text
Usage of this product signifies your acceptance of the Terms of Use.