The Community for Technology Leaders
Green Image
Issue No. 02 - March/April (vol. 9)
ISSN: 1540-7993
From the Editors
News Briefs

News Briefs (HTML)

pp. 5-7
Usability of Security

Guest Editors' Introduction: Shouldn't All Security Be Usable? (HTML)

Mary Frances Theofanos , National Institute of Standards and Technology
Shari Lawrence Pfleeger , Dartmouth College
pp. 12-17

Bridging the Gap in Computer Security Warnings: A Mental Model Approach (Abstract)

Cristian Bravo-Lillo , Carnegie Mellon University
Lorrie Faith Cranor , Carnegie Mellon University
Julie Downs , Carnegie Mellon University
Saranga Komanduri , Carnegie Mellon University
pp. 18-26

Secure and Inclusive Authentication with a Talking Mobile One-Time-Password Client (Abstract)

Kristin Fuglerud , The Norwegian Computing Centre
Øystein Dale , The Norwegian Computing Centre
pp. 27-34

Usability Failures and Healthcare Data Hemorrhages (Abstract)

M. Eric Johnson , Dartmouth College
Nicholas D. Willey , Dartmouth College
pp. 35-42

When the Password Doesn't Work: Secondary Authentication for Websites (Abstract)

Robert W. Reeder , Microsoft Trustworthy Computing
Stuart Schechter , Microsoft Research
pp. 43-49
Cloud Computing
Information Security Risk Management
It All Depends

Monitoring Cloud Computing by Layer, Part 1 (Abstract)

Jonathan Spring , Software Engineering Institute
pp. 66-68

Teaching Security Stealthily (Abstract)

Matt Bishop , University of California, Davis
pp. 69-71
On the Horizon

Systems Security Engineering (Abstract)

Jennifer L. Bayuk , Stevens Institute of Technology
pp. 72-74
Secure Systems

Data Provenance and Security (Abstract)

Patrick McDaniel , Pennsylvania State University
pp. 83-85
Security & Privacy Economics
Crypto Corner

Securing E-passports with Elliptic Curves (Abstract)

Mehdi Tibouchi , Ecole Normale Super., Paris, France
pp. 75-78
For Good Measure

Detecting Cheaters (Abstract)

pp. 96, 95
Building Security In
84 ms
(Ver 3.3 (11022016))