The Community for Technology Leaders
Green Image
Issue No. 02 - March-April (vol. 2)
ISSN: 1540-7993
From the Editor

Letters to the Editor (HTML)

pp. 6-7
Book Reviews

Book Reviews (HTML)

Martin R. Stytz , US Air Force Research Laboratory
pp. 8
Software Susceptibility

Susceptibility Matrix: A New Aid to Software Auditing (Abstract)

Marvin Zelkowitz , University of Maryland
Kanta Jiwnani , University of Maryland
pp. 16-21

Protecting Privacy in Continuous Location-Tracking Applications (Abstract)

Marco Gruteser , University of Colorado
Xuan Liu , IBM T.J. Watson Research Center
pp. 28-34

Financial Privacy Policies and the Need for Standardization (Abstract)

Julia B. Earp , North Carolina State University
Annie I. Ant? , North Carolina State University
Carlos Jensen , Georgia Institute of Technology
Qingfeng He , North Carolina State University
Davide Bolchini , University of Lugano
William Stufflebeam , North Carolina State University
pp. 36-45
Conference Reports

ACM Computer and Communication Security Conference (Abstract)

Ashish Popli , Architecture Technology Corporation, New York
pp. 46-47

RFID Privacy Workshop: Concerns, Consensus, and Questions (Abstract)

Stephen A. Weis , Massachusetts Institute of Technology
pp. 48-50
Biblio Tech

Teaching Robust Programming (Abstract)

Deb Frincke , Pacific Northwest National Laboratory
Matt Bishop , University of California, Davis
pp. 54-57
On the Horizon
Digital Rights
Attack Trends

Criminals Become Tech Savvy (Abstract)

Elias Levy , Symantec
pp. 65-68
Secure Systems
Application Security

A Warranty of Cyberworthiness (Abstract)

Roland L. Trope , Trope and Schramm LLP
pp. 73-76
The Honeynet Files

The Honeywall CD-ROM (Abstract)

George Chamales , The University of Texas at Austin
pp. 77-79
Building Security in

Software Security (Abstract)

Gary McGraw , Cigital
pp. 80-83
Privacy Matters
90 ms
(Ver 3.1 (10032016))