The Community for Technology Leaders
Green Image
Issue No. 05 - September-October (vol. 1)
ISSN: 1540-7993
From the Editor

News Briefs (Abstract)

pp. 12-13

Letters to the Editor (HTML)

pp. 14
Book Reviews
Blackout 2003
Christma Worm

Merry Christma: An Early Network Worm (Abstract)

Steve R. White , IBM T.J. Watson Research Center
David M. Chess , IBM T.J. Watson Research Center
Peter G. Capek , IBM T.J. Watson Research Center
pp. 26-34
The Morris Worm
Information Security
Impact Analysis

Impact Analysis of Faults and Attacks in Large-Scale Networks (Abstract)

Guangzhi Qu , University of Arizona, Tucson
Cauligi S. Raghavendra , University of Southern California
Tushneem Dharmagadda , University of Arizona, Tucson
Salim Hariri , University of Arizona, Tucson
Modukuri Ramkishore , University of Arizona, Tucson
pp. 49-54
Least Privilege

Least Privilege and More (Abstract)

Fred B. Schneider , Cornell University
pp. 55-59
Biblio Tech

Information Assurance the West Point Way (Abstract)

Ron Dodge , US Military Academy, West Point
Dan Ragsdale , US Military Academy, West Point
Don Welch , US Military Academy, West Point
pp. 64-67
On the Horizon

SEHAS 2003: The Future of High-Assurance Systems (Abstract)

Nancy R. Mead , Software Engineering Institute, Carnegie Mellon University
pp. 68-72
Digital Rights

Chicken Little and the Recorded Music Crisis (Abstract)

Michael Lesk , Rutgers University
pp. 73-75
Global Perspectives

What Works? (Abstract)

pp. 76-77
Attack Trends

The Rise of the Gadgets (Abstract)

Iv? Arce , Core Security Technologies
pp. 78-81
Secure Systems

Access Denied (Abstract)

Jean Camp , Harvard University
pp. 82-85
Application Security

Caution: This Product Contains Security Code (Abstract)

Martin Stytz , US Air Force Research Laboratory
James A. Whittaker , Florida Tech
pp. 86-88
The Honeynet Files

Automated Identity Theft (Abstract)

Bill McCarty , Azusa Pacific University
pp. 89-92
Privacy Matters
99 ms
(Ver 3.1 (10032016))