Advanced Search 
IEEE Security & Privacy
May/June 2010 (vol. 8 no. 3)
ISSN: 1540-7993
Table of Contents
From the Editors
News Briefs
Assessing Risk
Laurie Williams, North Carolina State University
Andrew Meneely, North Carolina State University
Grant Shipley, Red Hat
pp. 14-20
Kjell Hole, University of Bergen
Lars-Helge Netland, Netland Bouvet ASA
pp. 21-27
Data Collection
Mobile Computing
Asaf Shabtai, Ben-Gurion University
Yuval Fledel, Ben-Gurion University
Yuval Elovici, Ben-Gurion University
pp. 36-44
Security Costs
Nir Kshetri, University of North Carolina, Greensboro
pp. 45-53
It All Depends
Bruce Potter, Shmoo Group
pp. 54-55
Edward B. Talbot, Sandia National Laboratories, California
Deborah Frincke, the Pacific Northwest National Laboratory
Matt Bishop, University of California, Davis
pp. 56-59
On the Horizon
Fred Cohen, California Sciences Institute
pp. 60-63
Privacy Interests
Khaled El Emam, Children's Hospital of Eastern Ontario
pp. 64-67
Crypto Corner
Attack Trends
Secure Systems
Security & Privacy Economics
Building Security In
Threat Modeling (Abstract)
John Steven, Cigital
pp. 83-86
Fratricide (Abstract)
pp. 88, 87
Usage of this product signifies your acceptance of the Terms of Use.