The Community for Technology Leaders
Green Image
Issue No. 01 - January/February (vol. 6)
ISSN: 1540-7993
From the Editors
News Briefs

News Briefs (HTML)

Brandi Ortega , Staff editor
pp. 6-8
In Memoriam
Virtual Roundtable

Information Assurance Technology Forecast 2008 (Abstract)

Steven M. Bellovin , Columbia University
Terry V. Benzel , University of Southern California
Bob Blakley , the Burton Group
Dorothy E. Denning , Naval Postgraduate School
Whitfield Diffie , Sun Microsystems
Jeremy Epstein , Software AG
Paulo Verissimo , University of Lisboa
pp. 16-23
Communications Security

Risking Communications Security: Potential Hazards of the Protect America Act (Abstract)

Steven M. Bellovin , Columbia University
Matt Blaze , University of Pennsylvania
Whitfield Diffie , Sun Microsystems
Susan Landau , Sun Microsystems
Peter G. Neumann , SRI International
Jennifer Rexford , Princeton University
pp. 24-33
Securing Information

Securing Information Transfer in Distributed Computing Environments (Abstract)

Siani Pearson , Hewlett-Packard Labs
Marco Casassa-Mont , Hewlett-Packard Labs
Manny Novoa , Hewlett-Packard Labs
pp. 34-42
Grid Computing

Grid Computing Security: A Taxonomy (Abstract)

Anirban Chakrabarti , Infosys Technologies
Anish Damodaran , Infosys Technologies
Shubhashis Sengupta , Infosys Technologies
pp. 44-51
Security Metrics

Estimating a System's Mean Time-to-Compromise (Abstract)

David John Leversage , British Columbia Institute of Technology
Eric James Byres , BCIT Critical Infrastructure Security Center
pp. 52-60

Combating the Insider Cyber Threat (Abstract)

Frank L. Greitzer , Pacific Northwest National Laboratory
Andrew P. Moore , Carnegie Mellon University
Dawn M. Cappelli , Carnegie Mellon University
Dee H. Andrews , Air Force Research Laboratory
Lynn A. Carroll , Karta Technologies
Thomas D. Hull , Oak Ridge Institute for Science and Education
pp. 61-64
On the Horizon

Taming Virtualization (Abstract)

Martim Carbone , Georgia Institute of Technology
Diego Zamboni , IBM Zurich Research Laboratory
Wenke Lee , Georgia Institute of Technology
pp. 65-67
Crypto Corner

CAPTCHAs: Humans vs. Bots (Abstract)

Aleksey Kolupaev , OCR Research Team
Juriy Ogijenko , OCR Research Team
pp. 68-70
Basic Training

Becoming a Security Expert (Abstract)

Michael Howard , Microsoft
pp. 71-73
Attack Trends

The Confused Deputy and the Domain Hijacker (Abstract)

Dave Ahmad , Bombardier Aerospace
pp. 74-77
Digital Protection

Forum Shopping on the Internet (Abstract)

Michael Lesk , Rutgers University
pp. 78-80
Building Security In
Emerging Standards

An RBAC Implementation and Interoperability Standard: The INCITS Cyber Security 1.1 Model (Abstract)

Ed Coyne , Science Applications International Corporation (SAIC)
Tim Weil , Booz-Allen-Hamilton
pp. 84-87
For Good Measure

What We Got for Christmas (Abstract)

Dan Geer , Verdasys
Daniel Conway , Team Cymru
pp. 88
87 ms
(Ver 3.3 (11022016))