The Community for Technology Leaders
Green Image
TABLE OF CONTENTS
Issue No. 06 - November/December (vol. 6)
ISSN: 1540-7993
From the Editors

Are Governments Up to the Task? (HTML)

Bret Michael , Naval Postgraduate School
pp. 4-5
Interview
Spotlight
News
Guest Editors' Introduction

Process Control System Security: Bootstrapping a Legacy (HTML)

Ron Trellue , Trellue Consulting
Charles C. Palmer , IBM Research
pp. 22-23
Process Control Security

Security for Process Control Systems: An Overview (Abstract)

Markus Brändle , ABB Corporate Research
Martin Naedele , ABB Corporate Research
pp. 24-29

Usable Global Network Access Policy for Process Control Systems (Abstract)

Mouna Seri , University of Illinois at Urbana-Champaign
William H. Sanders , University of Illinois at Urbana-Champaign
David M. Nicol , University of Illinois at Urbana-Champaign
Sankalp Singh , University of Illinois at Urbana-Champaign
pp. 30-36

Vulnerability Assessment for Critical Infrastructure Control Systems (Abstract)

Edmond Rogers , North American Electric Reliability Corporation
Raymond C. Parks , Sandia National Laboratories
pp. 37-43

The Crutial Way of Critical Infrastructure Protection (Abstract)

Paulo Veríssimo , University of Lisbon
Alysson Neves Bessani , University of Lisbon
Miguel Correia , University of Lisbon
Nuno Ferreira Neves , University of Lisbon
Paulo Sousa , University of Lisbon
pp. 44-51
Voice over IP

SDRS: A Voice-over-IP Spam Detection and Reaction System (Abstract)

Saverio Niccolini , NEC Laboratories Europe
Dorgham Sisalem , Tekelec
Bertrand Mathieu , Orange Labs
pp. 52-59
Trusted Computing

Challenges for Trusted Computing (Abstract)

Kenneth G. Paterson , University of London
Shane Balfe , University of London
Eimear Gallery , Open Trusted Computing
Chris J. Mitchell , University of London
pp. 60-66
Education

Teaching for Conceptual Change in Security Awareness (Abstract)

Yuen-Yan Chan , The University of Hong Kong
Victor K. Wei , The Chinese University of Hong Kong
pp. 67-69
Privacy Interests

HIPAA Security Enforcement Is Here (Abstract)

Kirk J. Nahra , Wiley Rein LLP
pp. 70-72
Basic Training
Attack Trends
Building Security In

State of Application Assessment (Abstract)

John Steven , Cigital
pp. 82-85
For Good Measure

Security Is a Subset of Reliability (Abstract)

Daniel G. Conway , Augustana College
pp. 86-87
Clear Text
Annual Index

Annual Index (PDF)

pp. 0
81 ms
(Ver )