
TABLE OF CONTENTS
Issue No. 06 - November/December (vol. 8)
ISSN: 1540-7993
From the Editors
In Memoriam
In Memoriam: Paul Karger (HTML)
Roger Schell , AESEC
Steve Lipner , Microsoft
Mary Ellen Zurko , IBM
Elaine R. Palmer , IBM
David Safford , IBM
Charles C. Palmer , IBM
Carl E. Landwehr , University of Maryland
pp. 5
News Briefs
Interview
Cloud Computing
Guest Editors' Introduction: In Cloud Computing We Trust - But Should We? (HTML)
Anup Ghosh , Invincea
Iván Arce , Core Security Technologies
pp. 14-16
Cloud Computing Roundtable (Abstract)
Eric Grosse , Google
John Howie , Microsoft
James Ransome , Cisco
Jim Reavis , Cloud Security Alliance
Steve Schmidt , Amazon Web Services
pp. 17-23
Security and Privacy Challenges in Cloud Computing Environments (Abstract)
Hassan Takabi , University of Pittsburgh
James B.D. Joshi , University of Pittsburgh
Gail-Joon Ahn , Arizona State University
pp. 24-31
Cloud Provider Transparency: An Empirical Evaluation (Abstract)
Wayne Pauley , EMC Corporation, Hopkinton
pp. 32-39
Side Channels in Cloud Services: Deduplication in Cloud Storage (Abstract)
Danny Harnik , IBM Haifa Research Lab
Benny Pinkas , Bar Ilan University
Alexandra Shulman-Peleg , IBM Haifa Research Lab
pp. 40-47
Toward a Multi-Tenancy Authorization System for Cloud Services (Abstract)
Jose M. Alcaraz Calero , Hewlett-Packard Labs and the University of Murcia
Nigel Edwards , Hewlett-Packard Labs
Johannes Kirschnick , Hewlett-Packard Labs
Lawrence Wilcock , Hewlett-Packard Labs
Mike Wray , Hewlett-Packard Labs
pp. 48-55
Education
New Pathways in Identity Management (Abstract)
Paul C. Clark , Naval Postgraduate School
Glenn R. Cook , Naval Postgraduate School
Edward L. Fisher , Naval Postgraduate School
John D. Fulp , Naval Postgraduate School
Valerie Linhoff , Naval Postgraduate School
Cynthia E. Irvine , Naval Postgraduate School
pp. 64-67
Privacy Interests
Crypto Corner
The First 10 Years of Advanced Encryption (Abstract)
Joan Daemen , STMicroelectronics
Vincent Rijmen , Katholieke Universiteit Leuven
pp. 72-74
Basic Training
Attack Trends
Splitting the HTTPS Stream to Attack Secure Web Connections (Abstract)
Marco Prandini , University of Bologna
Marco Ramilli , University of Bologna
Walter Cerroni , University of Bologna
Franco Callegati , University of Bologna
pp. 80-84
Secure Systems
Logical Methods in Security and Privacy (Abstract)
Anupam Datta , Carnegie Mellon University
pp. 86-89
Security & Privacy Economics
For Good Measure