The Community for Technology Leaders
Green Image
TABLE OF CONTENTS
Issue No. 01 - January/February (vol. 6)
ISSN: 1540-7993
From the Editors
News Briefs

News Briefs (HTML)

Brandi Ortega , Staff editor
pp. 6-8
In Memoriam
Interview
Virtual Roundtable

Information Assurance Technology Forecast 2008 (Abstract)

Terry V. Benzel , University of Southern California
Bob Blakley , the Burton Group
Steven M. Bellovin , Columbia University
Jeremy Epstein , Software AG
Whitfield Diffie , Sun Microsystems
Paulo Verissimo , University of Lisboa
Dorothy E. Denning , Naval Postgraduate School
pp. 16-23
Communications Security

Risking Communications Security: Potential Hazards of the Protect America Act (Abstract)

Jennifer Rexford , Princeton University
Susan Landau , Sun Microsystems
Whitfield Diffie , Sun Microsystems
Steven M. Bellovin , Columbia University
Matt Blaze , University of Pennsylvania
Peter G. Neumann , SRI International
pp. 24-33
Securing Information

Securing Information Transfer in Distributed Computing Environments (Abstract)

Marco Casassa-Mont , Hewlett-Packard Labs
Siani Pearson , Hewlett-Packard Labs
Manny Novoa , Hewlett-Packard Labs
pp. 34-42
Grid Computing

Grid Computing Security: A Taxonomy (Abstract)

Anish Damodaran , Infosys Technologies
Anirban Chakrabarti , Infosys Technologies
Shubhashis Sengupta , Infosys Technologies
pp. 44-51
Security Metrics

Estimating a System's Mean Time-to-Compromise (Abstract)

Eric James Byres , BCIT Critical Infrastructure Security Center
David John Leversage , British Columbia Institute of Technology
pp. 52-60
Education

Combating the Insider Cyber Threat (Abstract)

Frank L. Greitzer , Pacific Northwest National Laboratory
Lynn A. Carroll , Karta Technologies
Dee H. Andrews , Air Force Research Laboratory
Andrew P. Moore , Carnegie Mellon University
Thomas D. Hull , Oak Ridge Institute for Science and Education
Dawn M. Cappelli , Carnegie Mellon University
pp. 61-64
On the Horizon

Taming Virtualization (Abstract)

Martim Carbone , Georgia Institute of Technology
Wenke Lee , Georgia Institute of Technology
Diego Zamboni , IBM Zurich Research Laboratory
pp. 65-67
Crypto Corner

CAPTCHAs: Humans vs. Bots (Abstract)

Aleksey Kolupaev , OCR Research Team
Juriy Ogijenko , OCR Research Team
pp. 68-70
Basic Training

Becoming a Security Expert (Abstract)

Michael Howard , Microsoft
pp. 71-73
Attack Trends

The Confused Deputy and the Domain Hijacker (Abstract)

Dave Ahmad , Bombardier Aerospace
pp. 74-77
Digital Protection

Forum Shopping on the Internet (Abstract)

Michael Lesk , Rutgers University
pp. 78-80
Building Security In
Emerging Standards

An RBAC Implementation and Interoperability Standard: The INCITS Cyber Security 1.1 Model (Abstract)

Tim Weil , Booz-Allen-Hamilton
Ed Coyne , Science Applications International Corporation (SAIC)
pp. 84-87
For Good Measure

What We Got for Christmas (Abstract)

Daniel Conway , Team Cymru
Dan Geer , Verdasys
pp. 88
90 ms
(Ver )