The Community for Technology Leaders
Green Image
Issue No. 02 - March/April (vol. 3)
ISSN: 1540-7993
From the Editors
Conference Reports

Crypto 2004 (Abstract)

Stephen A. Weiss , Massachusetts Institute of Technology
pp. 11-13
Book Reviews

A Framework to Consider (HTML)

Roy Iverson , Xacta Corporation
pp. 14
Trusted Computing

Does Trusted Computing Remedy Computer Security Problems? (Abstract)

Rolf Oppliger , Swiss Federal Strategy Unit for Information Technology
Ruedi Rytz , Swiss Federal Strategy Unit for Information Technology
pp. 16-19
Online Privacy

Sociotechnical Architecture for Online Privacy (Abstract)

Dawn N. Jutla , Saint Mary's University
Peter Bodorik , Dalhousie University
pp. 29-39
Spam Solutions

Canning Spam: Proposed Solutions to Unwanted Email (Abstract)

Shari Lawrence Pfleeger , The RAND Corporation
Gabrielle Bloom , The RAND Corporation
pp. 40-47

Technology Education at the US Military Academy (Abstract)

Ron Dodge , US Military Academy, West Point
Dan Ragsdale , US Military Academy, West Point
pp. 49-53
On the Horizon

Methodological Foundations: Enabling the Next Generation of Security (Abstract)

Roy A. Maxion , Carnegie Mellon University
Rachel R.M. Roberts , Carnegie Mellon University
pp. 54-57
Basic Training
Attack Trends
Secure Systems
Digital Protection

Averting Security Missteps in Outsourcing (Abstract)

E. Michael Power , Gowling Lafleur Henderson LLP
Roland L. Trope , Trope and Schramm LLP
pp. 70-73
Building Security In

Knowledge for Software Security (Abstract)

Sean Barnum , Cigital
Gary McGraw , Cigital
pp. 74-78
Clear Text
85 ms
(Ver 3.3 (11022016))