Advanced Search 
IEEE Security & Privacy
November/December 2009 (vol. 7 no. 6)
ISSN: 1540-7993
Table of Contents
From the Editors
Interview
News Briefs
Guest Editors' Introduction
Insider Threats
Deanna Caputo, The MITRE Corporation, McLean
Marcus Maloof, Georgetown University, Washington
Gregory Stephens, The MITRE Corporation, McLean
pp. 14-21
Felicia Duran, SANDIA NATIONAL LABORATORIES, ALBUQUERQUE
Stephen H. Conrad, SANDIA NATIONAL LABORATORIES, ALBUQUERQUE
Gregory N. Conrad, SANDIA NATIONAL LABORATORIES, ALBUQUERQUE
David P. Duggan, SANDIA NATIONAL LABORATORIES, ALBUQUERQUE
Edward Bruce Held, SANDIA NATIONAL LABORATORIES, ALBUQUERQUE
pp. 30-38
Brian Bowen, Columbia University, New York
Malek Ben Salem, Columbia University, New York City
Shlomo Hershkop, Columbia University, New York
Angelos Keromytis, Columbia University, New York City
Salvatore Stolfo, Columbia University, New York City
pp. 22-29
Tamper-Proofing
Saar Drimer, University of Cambridge
Steven J. Murdoch, University of Cambridge
Ross Anderson, University of Cambridge
pp. 39-45
Access Control
Eric Bier, Palo Alto Research Center
Richard Chow, Palo Alto Research Center
Philippe Golle, Palo Alto Research Center
Jessica Staddon, Palo Alto Research Center
pp. 46-53
It All Depends
Bruce Potter, The Shmoo Group
pp. 54-56
Education
On the Horizon
O. Sami Saydjari, Cyber Defense Agency
Cynthia E. Irvine, Naval Postgraduate School
pp. 60-64
Crypto Corner
Basic Training
Richard Ford, Florida Institute of Technology
William H. Allen, Florida Institute of Technology
pp. 69-71
Attack Trends
Frightened by Links (Abstract)
Franco Callegati, University of Bologna, Italy
Marco Ramilli, University of Bologna, Italy
pp. 72-76
Secure Systems
Michael E. Locasto, George Mason University
Sergey Bratus, Dartmouth College
Brian Schulte, The College of New Jersey
pp. 77-81
Security & Privacy Economics
For Good Measure
Daniel G. Conway, Augustana College
pp. 86-87
Clear Text
Annual Index
Usage of this product signifies your acceptance of the Terms of Use.