The Community for Technology Leaders
Green Image
Issue No. 05 - September/October (vol. 9)
ISSN: 1540-7993
From the Editors

Ten Years of Trustworthy Computing: Lessons Learned (HTML)

John Viega , Perimeter E-Security
pp. 3-4
News Briefs

News Briefs (HTML)

pp. 6-8
Guest Editors' Introduction

Cyberwarfare (HTML)

Thomas A. Berson , Anagram Laboratories
Dorothy E. Denning , Naval Postgraduate School
pp. 13-15

Cyberwar Thresholds and Effects (Abstract)

James A. Lewis , Center for Strategic and International Studies
pp. 23-29

Principles of Cyberwarfare (Abstract)

David P. Duggan , Sandia National Laboratories
Raymond C. Parks , Sandia National Laboratories
pp. 30-35

Deterring Strategic Cyberattack (Abstract)

David Elliott , Stanford University
pp. 36-40

Obfuscation: The Hidden Malware (Abstract)

Sakir Sezer , Centre for Secure Information Technologies, Queen's University Belfast
Kieran McLaughlin , Centre for Secure Information Technologies, Queen's University Belfast
Philip O'Kane , Centre for Secure Information Technologies, Queen's University Belfast
pp. 41-47
Access Control

Experience-Based Access Management: A Life-Cycle Framework for Identity and Access Management Systems (Abstract)

David M. Liebovitz , Northwestern University
Bradley Malin , Vanderbilt University
Carl A. Gunter , University of Illinois at Urbana-Champaign
pp. 48-55
Insider Attacks
Data Tampering

Tamper Detection in the EPC Network Using Digital Watermarking (Abstract)

Chao-Hsien Chu , Pennsylvania State University
ShuiHua Han , Xiamen University
Zongwei Luo , University of Hong Kong
pp. 62-69
Secure Systems

Truth in Crowdsourcing (Abstract)

Landon P. Cox , Duke University
pp. 74-76
Security & Privacy Economics

All Space Will Be Public Space (Abstract)

Jeffrey MacKie-Mason , University of Michigan
pp. 77-80
Building Security In
For Good Measure

When $80 Billion Is Not Enough (Abstract)

Peter Kuper , In-Q-Tel
pp. 86-87
45 ms
(Ver 3.3 (11022016))