The Community for Technology Leaders
Green Image
Issue No. 04 - July/August (vol. 3)
ISSN: 1540-7993
From the Editors

The One-Eyed Man Is King (HTML)

George Cybenko , Editor in Chief
pp. 4-5
Book Reviews

A Closer Look at Viruses and Worms (HTML)

Nathanael Paul , University of Virginia
pp. 7
Software Development

Secure Software Development by Example (Abstract)

Axelle Apvrille , Ericsson Research Canada
Makan Pourzandi , Ericsson Research Canada
pp. 10-17
Attack Models

Toward an Automated Attack Model for Red Teams (Abstract)

Hariprasad R. Kantubhukta , Progressive Insurance
Helayne T. Ray , SI Government Solutions
Raghunath Vemuri , Motorola
pp. 18-25

The Blaster Worm: Then and Now (Abstract)

Farnam Jahanian , University of Michigan
Evan Cooke , University of Michigan
Michael Bailey , University of Michigan
David Watson , University of Michigan
Jose Nazario , Arbor Networks
pp. 26-31
Vulnerability Disclosure

Handling and Reporting Security Advisories: A Scorecard Approach (Abstract)

Diomidis Spinellis , Athens University of Economics and Business
Dimitrios Lekkas , University of the Aegean
pp. 32-41
Conference Reports

EICAR 2005 (Abstract)

pp. 45-48

A Human Endeavor: Lessons from Shakespeare and Beyond (Abstract)

Deborah Frincke , Pacific Northwest National Laboratories
Matt Bishop , University of California, Davis
pp. 49-51
On the Horizon
Crypto Corner

Security Usability (Abstract)

Ian Grigg , Systemics
Peter Gutmann , University of Auckland
pp. 56-58
Basic Training

Computer Forensics (Abstract)

William H. Allen , Florida Institute of Technology
pp. 59-62
Attack Trends

The Land of the Blind (Abstract)

Iv? Arce , Core Security Technologies
pp. 63-67
Secure Systems

The TIPPI Point: Toward Trustworthy Interfaces (Abstract)

S.W. Smith , Dartmouth College
Sara Sinclair , Dartmouth College
pp. 68-71
Digital Protection

Protecting Personal Privacy: Hauling Down the Jolly Roger (Abstract)

Martin R. Stytz , Institute for Defense Analyses
pp. 72-74
Building Security In

A Portal for Software Security (Abstract)

Gary McGraw , Cigital
Nancy R. Mead , Software Engineering Institute
pp. 75-79
112 ms
(Ver 3.1 (10032016))