The Community for Technology Leaders
Green Image
TABLE OF CONTENTS
Issue No. 05 - September/October (vol. 8)
ISSN: 1540-7993
From the Editors

Phagocytes in Cyberspace (HTML)

Marc Donner , Google
pp. 3-4
Interview
News Briefs

News Briefs (HTML)

pp. 10-11
Embedded Systems Reliability

Guest Editors' Introduction: Reliability of Embedded and Cyber-Physical Systems (HTML)

Jeffrey Voas , National Institute of Standards and Technology
Ram Chillarege , Chillarege Inc.
pp. 12-13

Kernel Service Protection for Client Security (Abstract)

Hui Jun Wu , Lenovo Limited(Beijing),
pp. 14-19

Roundtable: Reliability of Embedded and Cyber-Physical Systems (Abstract)

Shankar Sastry , University of California, Berkeley
John A. Stankovic , University of Virginia
Sean Barnum , MITRE
pp. 27-32
System Security

New Security Architectures Based on Emerging Disk Functionality (Abstract)

Steve McLaughlin , Pennsylvania State University, State College
Patrick McDaniel , Pennsylvania State University , University Park
Thomas Moyer , Penn State University, University Park
Kevin Butler , Pennsylvania State University, State College
pp. 34-41
Spamming

Proliferation and Detection of Blog Spam (Abstract)

Saeed Abu-Nimeh , Websense, San Diego
Thomas Chen , Swansea University, Swansea
pp. 42-47
Session Management Attacks

Session Management Vulnerabilities in Today's Web (Abstract)

Corrado Visaggio , Univeristy of Sannio, Benevento
pp. 48-56
It All Depends

Necessary but Not Sufficient (Abstract)

Bruce Potter , The Shmoo Group
pp. 57-58
Education

The CyberPatriot National High School Cyber Defense Competition (Abstract)

Gregory B. White , University of Texas at San Antonio
Dwayne Williams , University of Texas at San Antonio
Keith Harrison , University of Texas at San Antonio
pp. 59-61
On The Horizon

Automated Control System Security (Abstract)

Fred Cohen , California Sciences Institute
pp. 62-63
Privacy Interests

Data Tagging for New Information Governance Models (Abstract)

K. Krasnow Waterman , Massachusetts Institute of Technology
Paula J. Bruening , Centre for Information Policy Leadership, Hunton & Williams
pp. 64-68
Crypto Corner
Basic Training

Technology, Training, and Transformation (Abstract)

Matt Bishop , University of California, Davis
pp. 72-75
Secure Systems

Not So Great Expectations: Why Application Markets Haven't Failed Security (Abstract)

William Enck , Pennsylvania State University
Patrick McDaniel , Pennsylvania State University
pp. 76-78
Security & Privacy Economics

Do the Luddites Ever Win? (Abstract)

Michael Lesk , Rutgers University
pp. 79-82
Building Security In
ClearText

Perceptions and Reality (Abstract)

Steven M. Bellovin , Columbia University
pp. 88, 87
98 ms
(Ver )