
TABLE OF CONTENTS
Issue No. 02 - March/April (vol. 3)
ISSN: 1540-7993
From the Editors
News
Conference Reports
Book Reviews
Trusted Computing
Does Trusted Computing Remedy Computer Security Problems? (Abstract)
Rolf Oppliger , Swiss Federal Strategy Unit for Information Technology
Ruedi Rytz , Swiss Federal Strategy Unit for Information Technology
pp. 16-19
Protecting Client Privacy with Trusted Computing at the Server (Abstract)
Alexander Iliev , Dartmouth College
Sean W. Smith , Dartmouth College
pp. 20-28
Online Privacy
Sociotechnical Architecture for Online Privacy (Abstract)
Dawn N. Jutla , Saint Mary's University
Peter Bodorik , Dalhousie University
pp. 29-39
Spam Solutions
Canning Spam: Proposed Solutions to Unwanted Email (Abstract)
Shari Lawrence Pfleeger , The RAND Corporation
Gabrielle Bloom , The RAND Corporation
pp. 40-47
Education
Technology Education at the US Military Academy (Abstract)
Ron Dodge , US Military Academy, West Point
Dan Ragsdale , US Military Academy, West Point
pp. 49-53
On the Horizon
Methodological Foundations: Enabling the Next Generation of Security (Abstract)
Roy A. Maxion , Carnegie Mellon University
Rachel R.M. Roberts , Carnegie Mellon University
pp. 54-57
Basic Training
Attack Trends
Secure Systems
Turing is from Mars, Shannon is from Venus: Computer Science and Computer Engineering (Abstract)
S.W. Smith , Dartmouth College
pp. 66-69
Digital Protection
Averting Security Missteps in Outsourcing (Abstract)
E. Michael Power , Gowling Lafleur Henderson LLP
Roland L. Trope , Trope and Schramm LLP
pp. 70-73
Building Security In
Clear Text