The Community for Technology Leaders
Green Image
TABLE OF CONTENTS
Issue No. 06 - November/December (vol. 7)
ISSN: 1540-7993
From the Editors

Labeling-in Security (HTML)

Fred B. Schneider , Cornell University
pp. 3
Interview
News Briefs

News Briefs (HTML)

pp. 8-9
Guest Editors' Introduction

Addressing the Insider Threat (HTML)

Shari Lawrence Pfleeger , RAND Corporation
Salvatore J. Stolfo , Columbia University
pp. 10-13
Insider Threats

Detecting Insider Theft of Trade Secrets (Abstract)

Deanna Caputo , The MITRE Corporation, McLean
Marcus Maloof , Georgetown University, Washington
Gregory Stephens , The MITRE Corporation, McLean
pp. 14-21

Building A System For Insider Security (Abstract)

David P. Duggan , SANDIA NATIONAL LABORATORIES, ALBUQUERQUE
Edward Bruce Held , SANDIA NATIONAL LABORATORIES, ALBUQUERQUE
Stephen H. Conrad , SANDIA NATIONAL LABORATORIES, ALBUQUERQUE
Gregory N. Conrad , SANDIA NATIONAL LABORATORIES, ALBUQUERQUE
Felicia Duran , SANDIA NATIONAL LABORATORIES, ALBUQUERQUE
pp. 30-38

Designing Host and Network Sensors to Mitigate the Insider Threat (Abstract)

Salvatore Stolfo , Columbia University, New York City
Angelos Keromytis , Columbia University, New York City
Malek Ben Salem , Columbia University, New York City
Brian Bowen , Columbia University, New York
Shlomo Hershkop , Columbia University, New York
pp. 22-29
Tamper-Proofing

Failures of Tamper-Proofing in PIN Entry Devices (Abstract)

Saar Drimer , University of Cambridge
Steven J. Murdoch , University of Cambridge
Ross Anderson , University of Cambridge
pp. 39-45
Access Control

The Rules of Redaction: Identify, Protect, Review (and Repeat) (Abstract)

Eric Bier , Palo Alto Research Center
Philippe Golle , Palo Alto Research Center
Jessica Staddon , Palo Alto Research Center
Richard Chow , Palo Alto Research Center
pp. 46-53
It All Depends

High Time for Trusted Computing (Abstract)

Bruce Potter , The Shmoo Group
pp. 54-56
Education
On the Horizon

A Tale of Three Cyber-Defense Workshops (Abstract)

O. Sami Saydjari , Cyber Defense Agency
Cynthia E. Irvine , Naval Postgraduate School
pp. 60-64
Crypto Corner
Basic Training

Malware Shall Greatly Increase ... (Abstract)

William H. Allen , Florida Institute of Technology
Richard Ford , Florida Institute of Technology
pp. 69-71
Attack Trends

Frightened by Links (Abstract)

Marco Ramilli , University of Bologna, Italy
Franco Callegati , University of Bologna, Italy
pp. 72-76
Secure Systems

Bickering In-Depth: Rethinking the Composition of Competing Security Systems (Abstract)

Michael E. Locasto , George Mason University
Sergey Bratus , Dartmouth College
Brian Schulte , The College of New Jersey
pp. 77-81
Security & Privacy Economics
For Good Measure

Patch Grief with Proverbs (Abstract)

Daniel G. Conway , Augustana College
pp. 86-87
Clear Text
Annual Index

Annual Index (PDF)

pp. 1
88 ms
(Ver )