The Community for Technology Leaders
Green Image
Issue No. 05 - Sept.-Oct. (vol. 11)
ISSN: 1540-7993

Front Cover (PDF)

pp. c1

Table of Contents (PDF)

pp. 1-2

Open Assurance (PDF)

Robin Bloomfield , City University London
pp. 3-4

Masthead (PDF)

pp. 5

The Personal Data Store Approach to Personal Data Security (Abstract)

Tom Kirkham , Science and Technology Facilities Council
Sandra Winfield , University of Nottingham
Serge Ravet , Association de Préfiguration de l'Internet of Subjects
Sampo Kellomaki , Synergetics
pp. 12-19

Anonymous and Distributed Community Cyberincident Detection (Abstract)

Keith Harrison , University of Texas at San Antonio
Gregory B. White , University of Texas at San Antonio
pp. 20-27

Teaching an Old TPM New Tricks: Repurposing for Identity-Based Signatures (Abstract)

Weihan Goh , Nanyang Technological University, Singapore
Chai Kiat Yeo , Nanyang Technological University, Singapore
pp. 28-35

iOS Data Recovery Using Low-Level NAND Images (Abstract)

Wei-dong Qiu , Shanghai Jiao Tong University
Qian Su , Shanghai Jiao Tong University
Bo-zhong Liu , Shanghai Jiao Tong University
Yan Li , Institute of Forensic Science, Ministry of Justice, China
pp. 49-55

A Cyberoperations Program (Abstract)

Cynthia Irvine , US Naval Postgraduate School
pp. 66-69

The Known Unknowns (Abstract)

Jim Alves-Foss , University of Idaho
Paul Oman , University of Idaho
pp. 77-79

Circumvention of Security: Good Users Do Bad Things (Abstract)

Jim Blythe , University of Southern California
Ross Koppel , University of Pennsylvania
Sean W. Smith , Dartmouth College
pp. 80-83

Building Security In: A Road to Competency (Abstract)

Thomas B. Hilburn , Embry-Riddle Aeronautical University
Nancy R. Mead , Carnegie Mellon University Software Engineering Institute
pp. 89-92

Crime Science and the Internet Battlefield: Securing the Analog World from Digital Crime (Abstract)

Kacper Gradon , University of Warsaw and University College London
pp. 93-95
90 ms
(Ver 3.3 (11022016))