The Community for Technology Leaders
Green Image
Issue No. 03 - May/June (vol. 9)
ISSN: 1540-7993
From the Editors

Resilient to the Unexpected (HTML)

Robin E. Bloomfield , City University London
pp. 3-4
News Briefs

News Briefs (HTML)

pp. 6-8
The Science of Security

Guest Editors' Introduction: The Science of Security (HTML)

Sal Stolfo , Columbia University
David Evans , University of Virginia
pp. 16-17

Security Modeling and Analysis (Abstract)

John C. Mitchell , Stanford University
Jason Bau , Stanford University
pp. 18-25

On Adversary Models and Compositional Security (Abstract)

Jason Franklin , Carnegie Mellon University
Deepak Garg , Carnegie Mellon University
Limin Jia , Carnegie Mellon University
Anupam Datta , Carnegie Mellon University
Dilsun Kaynar , Carnegie Mellon University
pp. 26-32

Provable Security in the Real World (Abstract)

Jean Paul Degabriele , Royal Holloway, University of London
Kenneth G. Paterson , Royal Holloway, University of London
Gaven J. Watson , University of Calgary
pp. 33-41
Smartphone Security

Secure Software Installation on Smartphones (Abstract)

Paul van Oorschot , Carleton University
David Barrera , Carleton University
pp. 42-48

Stuxnet: Dissecting a Cyberwarfare Weapon (Abstract)

Ralph Langner , Langner Communications
pp. 49-51
It All Depends

Monitoring Cloud Computing by Layer, Part 2 (Abstract)

Jonathan Spring , Software Engineering Institute
pp. 52-55

Hacking Competitions and Their Untapped Potential for Security Education (Abstract)

Gregory Conti , US Military Academy
Thomas Babbitt , US Military Academy
John Nelson , US Military Academy
pp. 56-59
On the Horizon

Measuring Security (Abstract)

Sal Stolfo , Columbia University
David Evans , University of Virginia
Steven M. Bellovin , Columbia University
pp. 60-65
Privacy Interests

Privacy, Ethics, and Analytics (Abstract)

Paul M. Schwartz , University of California, Berkeley
pp. 66-69
Crypto Corner

The Curse of Cryptographic Numerology (Abstract)

Peter Gutmann , University of Auckland
Ian Grigg , Financial Cryptographer
pp. 70-72
Attack Trends
Security & Privacy Economics
Building Security In

Never Waste a Crisis (Abstract)

Brad Arkin , Adobe Systems
pp. 82-85
For Good Measure

New Measures (Abstract)

pp. 86-87

Clouds from Both Sides (Abstract)

Steven M. Bellovin , Columbia University
pp. 88
93 ms
(Ver 3.1 (10032016))