The Community for Technology Leaders
Green Image
TABLE OF CONTENTS
Issue No. 01 - January/February (vol. 8)
ISSN: 1540-7993
From the Editors

Drawing the Line (HTML)

Carl E. Landwehr , University of Maryland
pp. 3-4
News Briefs

News Briefs (HTML)

pp. 6-7
Interview
Exploiting In-Home Data

Inferring Personal Information from Demand-Response Systems (Abstract)

Stephen B. Wicker , Cornell University
Deirdre K. Mulligan , University of California, Berkeley
Mikhail A. Lisovich , Cornell University
pp. 11-20
Internet Privacy

How Internet Users' Privacy Concerns Have Evolved since 2002 (Abstract)

Jessica D. Young , North Carolina State University
Julia B. Earp , North Carolina State University
Annie I. Antón , North Carolina State University
pp. 21-27
Role-Based Access Control

Scenario-Driven Role Engineering (Abstract)

Mark Strembeck , Vienna University of Economics and Business
pp. 28-35
Security Costs

How Internet Security Breaches Harm Market Value (Abstract)

Francis Kofi Andoh-Baidoo , University of Texas-Pan American
Kweku-Muata Osei-Bryson , Virginia Commonwealth University
Kwasi Amoako-Gyampah , University of North Carolina at Greensboro
pp. 36-42
Architectural Modeling

Architectural Modeling to Verify Security and Nonfunctional Behavior (Abstract)

Lutz Wrage , Software Engineering Institute, Carnegie Mellon University
Jérôme Hugues , Institut Telecom, ParisTech, France
Peter H. Feiler , Software Engineering Institute, Carnegie Mellon University
Jörgen Hansson , Software Engineering Institute, Carnegie Mellon University
John Morley , Software Engineering Institute, Carnegie Mellon University
Bruce Lewis , Software Engineering Institute, Carnegie Mellon University
pp. 43-49
It All Depends
Security & Privacy Economics

The Iterated Weakest Link (Abstract)

Rainer Böhme , International Computer Science Institute
Tyler Moore , Harvard University
pp. 53-55
Education

Call in the Cyber National Guard! (Abstract)

Cynthia E. Irvine , Naval Postgraduate School
pp. 56-59
On the Horizon

The Smarter Grid (Abstract)

Fred Cohen , California Sciences Institute
pp. 60-63
Crypto Corner

Opportunities in White-Box Cryptography (Abstract)

Wil Michiels , Philips Research Laboratories
pp. 64-67
Basic Training

Building a Better Boot Camp (Abstract)

Richard Ford , Florida Institute of Technology
Deborah A. Frincke , Pacific Northwest National Laboratory
pp. 68-71
Attack Trends

No Grid Left Behind (Abstract)

Michael Assante , North American Electric Reliability Corporation (NERC)
Mark Fabro , Lofty Perch
Tim Roxey , North American Electric Reliability Corporation (NERC)
pp. 72-76
Secure Systems

Outlook: Cloudy with a Chance of Security Challenges and Improvements (Abstract)

Joshua Schiffman , The Pennsylvania State University
Trent Jaeger , The Pennsylvania State University
pp. 77-80
Building Security In

Smart-Grid Security Issues (Abstract)

Mark Hadley , Pacific Northwest National Laboratory
Himanshu Khurana , University of Illinois at Urbana-Champaign
Ning Lu , Pacific Northwest National Laboratory
Deborah A. Frincke , Pacific Northwest National Laboratory
pp. 81-85
For Good Measure

A Life Is Short, a Half-Life Is Forever (Abstract)

Daniel G. Conway , Augustana College
pp. 86-87
ClearText
106 ms
(Ver )