The Community for Technology Leaders
Green Image
Issue No. 05 - September/October (vol. 6)
ISSN: 1540-7993
From the Editors

The Shape of Crimeware to Come (HTML)

Martin R. Stytz , Institute for Defense Analyses
pp. 5
News Briefs

News Briefs (HTML)

pp. 12-13
Guest Editors' Introduction

Virtualization and Security: Back to the Future (HTML)

Samuel T. King , University of Illinois
Sean W. Smith , Dartmouth College
pp. 15

I/O for Virtual Machine Monitors: Security and Performance Issues (Abstract)

Paul A. Karger , IBM's T.J. Watson Research Center
David R. Safford , IBM's T.J. Watson Research Center
pp. 16-23

Virtualization and Hardware-Based Security (Abstract)

Ronald Perez , IBM T.J. Watson Research Center
Leendert van Doorn , Advanced Micro Devices
Reiner Sailer , IBM T.J. Watson Research Center
pp. 24-31

Virtual Machine Introspection: Observation or Interference? (Abstract)

Kara Nance , University of Alaska, Fairbanks
Matt Bishop , University of California, Davis
Brian Hay , University of Alaska, Fairbanks
pp. 32-37
Risk Management

Performance Metrics for Information Security Risk Management (Abstract)

Julie J.C.H. Ryan , George Washington University
Daniel J. Ryan , National Defense University
pp. 38-44
Data Privacy

Data Retention and Privacy in Electronic Communications (Abstract)

Panayiotis Kotzanikolaou , Hellenic Authority for the Assurance of the Communications Security and Privacy (ADAE)
pp. 46-52

Information Assurance Education: A Work In Progress (Abstract)

Matt Bishop , University of California, Davis
Deborah A. Frincke , Pacific Northwest National Laboratory
pp. 54-57
Privacy Interests
Crypto Corner

Identity-Based Encryption and Beyond (Abstract)

Luther Martin , Voltage Security
pp. 62-64
Basic Training

Revealing Packed Malware (Abstract)

Wei Yan , Trend Micro
Zheng Zhang , McAfee
Nirwan Ansari , New Jersey Institute of Technology
pp. 65-69
Attack Trends
Secure Systems

A Life or Death InfoSec Subversion (Abstract)

Camilo Viecco , Indiana University
Jean Camp , Indiana University
pp. 74-76
Digital Protection

Hardening the Target (Abstract)

Roland L. Trope , Trope and Schramm, LLP
William J. Adams , US Military Academy, West Point
pp. 77-81
Building Security In
For Good Measure

Type II Reverse Engineering (Abstract)

Daniel G. Conway , Augustana College
pp. 86-87
Clear Text

The Puzzle of Privacy (Abstract)

Steven M. Bellovin , Columbia University
pp. 88
90 ms
(Ver 3.3 (11022016))