The Community for Technology Leaders
Green Image
Issue No. 04 - July-Aug. (vol. 9)
ISSN: 1540-7993
From the Editors

A Doctrinal Thesis (Abstract)

Deirdre K. Mulligan , University of California, Berkeley
Fred B. Schneider , Cornell University
pp. 3-4
News Briefs

News Briefs (HTML)

pp. 6-8
Trustworthy Computing

Toward Scalable Trustworthy Computing Using the Human-Physiology-Immunity Metaphor (Abstract)

Frederick Sheldon , Oak Ridge National Laboratory
Lee Hively , Oak Ridge National Laboratory
Anna Cinzia Squicciarini , Pennsylvania State University
pp. 14-23
Intrusion-Tolerant Systems

A Comparison of Intrusion-Tolerant System Architectures (Abstract)

Arun Sood , George Mason University and SCIT Labs
Quyen L. Nguyen , US National Archives and Records Administration
pp. 24-31

Building an Active Computer Security Ethics Community (Abstract)

David Dittrich , University of Washington
Michael Bailey , University of Michigan
Sven Dietrich , Stevens Institute of Technology
pp. 32-40
Threat Modeling

Embracing the Kobayashi Maru: Why You Should Teach Your Students to Cheat (Abstract)

Gregory Conti , US Military Academy
James Caroland , University of Maryland
pp. 48-51
On the Horizon

Trust Management in the Pervasive Computing Era (Abstract)

Denis Trček , University of Ljubljana
pp. 52-55
Privacy Interests
Crypto Corner
Basic Training

Security as if People Mattered (Abstract)

Tara Whalen , Carleton University
pp. 64-67
Attack Trends

Mobile Attacks and Defense (Abstract)

Charlie Miller , Accuvant Labs
pp. 68-70
Secure Systems

A Failure-Based Discipline of Trustworthy Information Systems (Abstract)

Matthew C. Little , Virginia Tech Foundation
Michael E. Locasto , University of Calgary
pp. 71-75
Security & Privacy Economics

Reading: From Paper to Pixels (Abstract)

Michael Lesk , Rutgers University
pp. 76-79
Building Security In
For Good Measure

Attack Surface Inflation (Abstract)

pp. 85-86

Eisenhower Revisited (HTML)

pp. 88, 87
98 ms
(Ver 3.1 (10032016))