The Community for Technology Leaders
Green Image
Issue No. 04 - July/August (vol. 8)
ISSN: 1540-7993
From the Editors

Fumbling the Future, Again (HTML)

Fred B. Schneider , Cornell University
pp. 3
News Briefs
Guest Editors' Introduction

Privacy-Preserving Sharing of Sensitive Information (HTML)

Salvatore J. Stolfo , Columbia University
Gene Tsudik , University of California, Irvine
pp. 16-17
Sharing Sensitive Data

Some Like It Private: Sharing Confidential Information Based on Oblivious Authorization (Abstract)

Jihye Kim , Seoul National University,,
Emiliano De Cristofaro , University of California, Irvine, Irvine
pp. 18-24

Preserving Privacy Based on Semantic Policy Tools (Abstract)

Lalana Kagal , MIT, Cambridge
Joe Pato , HP Labs, Cambridge
pp. 25-30

Dialing Privacy and Utility: A Proposed Data-Sharing Framework to Advance Internet Research (Abstract)

Erin Kenneally , Univeristy of California, San Diego, Mail Code 0505, La Jolla
Kc Claffy , University of California , La Jolla
pp. 31-39

The Phish-Market Protocol: Secure Sharing Between Competitors (Abstract)

Tal Moran , Harvard University
Tyler Moore , Harvard University
pp. 40-45
Security Metrics

Why Measuring Security Is Hard (Abstract)

Shari Pfleeger , RAND Corporation , Arlington
Robert Cunningham , MIT Lincoln Laboratory, Lexington
pp. 46-54
It All Depends

Educating the Systems Security Engineer's Apprentice (Abstract)

Cynthia Irvine , Naval Postgraduate School
Thuy D. Nguyen , Naval Postgraduate School
pp. 58-61
On the Horizon

Internet Filtering (Abstract)

Vijay Varadharajan , Macquarie University
pp. 62-65
Crypto Corner

Encrypting Keys Securely (Abstract)

Jan Camenisch , IBM Research
Christian Cachin , IBM Research
pp. 66-69
Attack Trends

Degradation and Subversion through Subsystem Attacks (Abstract)

Daniel Bilar , University of New Orleans
pp. 70-73
Secure Systems

What's Wrong with Access Control in the Real World? (Abstract)

Sara Sinclair , Dartmouth College
Sean W. Smith , Dartmouth College
pp. 74-77
Security & Privacy Economics

Least-Cost Avoiders in Online Fraud and Abuse (Abstract)

Benjamin Edelman , Harvard Business School
pp. 78-81
Building Security In
For Good Measure

A Time to Rethink (Abstract)

pp. 86-87
105 ms
(Ver 3.1 (10032016))