


default search action
IEEE Security & Privacy, Volume 9
Volume 9, Number 1, January - February 2011
- John Viega:

Reality Check. 3-4 - Gary McGraw:

Silver Bullet Talks with Paul Kocher. 8-11 - Giovanni Vigna:

The 2010 International Capture the Flag Competition. 12-14 - Lee Garber:

News Briefs. 15-17 - Cynthia E. Irvine, Josyula R. Rao:

Guest Editors' Introduction: Engineering Secure Systems. 18-21 - Paul A. Karger, Suzanne McIntosh

, Elaine R. Palmer, David C. Toll, Samuel Weber:
Lessons Learned: Building the Caernarvon High-Assurance Operating System. 22-30 - Clark Weissman, Timothy E. Levin:

Lessons Learned from Building a High-Assurance Crypto Gateway. 31-39 - Joshua Schiffman, Thomas Moyer, Trent Jaeger, Patrick D. McDaniel:

Network-Based Root of Trust for Installation. 40-48 - M. Eric Johnson, Shari Lawrence Pfleeger:

Addressing Information Risk in Turbulent Times. 49-57 - James Alexander, Jonathan M. Smith:

Disinformation: A Taxonomy. 58-63 - Brett Stone-Gross, Marco Cova, Bob Gilbert, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna:

Analysis of a Botnet Takeover. 64-72 - Lori M. Kaufman:

How Private Is the Internet? 73-75 - Fred H. Cate:

A Transatlantic Convergence on Privacy? 76-79 - Didier Stevens:

Malicious PDF Documents Explained. 80-82 - Wendy Seltzer:

Exposing the Flaws of Censorship by Domain Name. 83-87 - Michael Lesk:

What Is Information Worth? 88-90 - Richard Bejtlich, John Steven, Gunnar Peterson:

Directions in Incident Detection and Response. 91-92 - Daniel E. Geer Jr.:

Does a Rising Tide Lift All Boats? 93-94 - Daniel E. Geer Jr.:

A Time for Choosing. 96
Volume 9, Number 2, March - April 2011
- Marc Donner:

Privacy and the System Life Cycle. 3 - Lee Garber:

News Briefs. 5-7 - Gary McGraw:

Silver Bullet Talks with David Rice. 8-11 - Mary Frances Theofanos, Shari Lawrence Pfleeger:

Guest Editors' Introduction: Shouldn't All Security Be Usable? 12-17 - Cristian Bravo-Lillo

, Lorrie Faith Cranor
, Julie S. Downs
, Saranga Komanduri:
Bridging the Gap in Computer Security Warnings: A Mental Model Approach. 18-26 - Kristin Fuglerud

, Øystein Dale:
Secure and Inclusive Authentication with a Talking Mobile One-Time-Password Client. 27-34 - M. Eric Johnson, Nicholas D. Willey:

Usability Failures and Healthcare Data Hemorrhages. 35-42 - Robert W. Reeder, Stuart E. Schechter:

When the Password Doesn't Work: Secondary Authentication for Websites. 43-49 - Bernd Grobauer

, Tobias Walloschek, Elmar Stöcker:
Understanding Cloud Computing Vulnerabilities. 50-57 - Stefan Fenz, Andreas Ekelhart

:
Verification, Validation, and Evaluation in Information Security Risk Management. 58-65 - Jonathan Spring:

Monitoring Cloud Computing by Layer, Part 1. 66-68 - Matt Bishop

:
Teaching Security Stealthily. 69-71 - Jennifer L. Bayuk

:
Systems Security Engineering. 72-74 - Hervé Chabanne, Mehdi Tibouchi

:
Securing E-passports with Elliptic Curves. 75-78 - Chris Greamo, Anup Ghosh:

Sandboxing and Virtualization: Modern Tools for Combating Malware. 79-82 - Patrick D. McDaniel:

Data Provenance and Security. 83-85 - Aza Raskin:

Your Life Experiences, Brought to You by Budweiser. 86-88 - Brian Chess, Brad Arkin:

Software Security in Practice. 89-92 - Daniel E. Geer Jr.:

Correlation Is Not Causation. 93-94 - Bruce Schneier:

Detecting Cheaters. 96
Volume 9, Number 3, May - June 2011
- Robin E. Bloomfield:

Resilient to the Unexpected. 3-4 - Lee Garber:

News Briefs. 6-8 - Gary McGraw:

Silver Bullet Talks with Ralph Langner. 9-14 - David Evans

, Salvatore J. Stolfo:
Guest Editors' Introduction: The Science of Security. 16-17 - Jason Bau, John C. Mitchell

:
Security Modeling and Analysis. 18-25 - Anupam Datta, Jason Franklin, Deepak Garg, Limin Jia

, Dilsun Kirli Kaynar:
On Adversary Models and Compositional Security. 26-32 - Jean Paul Degabriele, Kenneth G. Paterson, Gaven J. Watson:

Provable Security in the Real World. 33-41 - David Barrera, Paul C. van Oorschot

:
Secure Software Installation on Smartphones. 42-48 - Ralph Langner:

Stuxnet: Dissecting a Cyberwarfare Weapon. 49-51 - Jonathan Spring:

Monitoring Cloud Computing by Layer, Part 2. 52-55 - Gregory J. Conti, Thomas A. Babbitt, John Nelson:

Hacking Competitions and Their Untapped Potential for Security Education. 56-59 - Salvatore J. Stolfo, Steven M. Bellovin, David Evans

:
Measuring Security. 60-65 - Paul M. Schwartz:

Privacy, Ethics, and Analytics. 66-69 - Ian Grigg, Peter Gutmann:

The Curse of Cryptographic Numerology. 70-72 - Sean Heelan:

Vulnerability Detection Systems: Think Cyborg, Not Robot. 74-77 - Michael Lesk:

Salmon, Songs, and Blankets: Creativity on the Northwest Coast. 78-81 - Brad Arkin:

Never Waste a Crisis. 82-85 - Daniel E. Geer Jr.:

New Measures. 86-87 - Steven M. Bellovin:

Clouds from Both Sides. 88
Volume 9, Number 4, July - August 2011
- Fred B. Schneider, Deirdre K. Mulligan:

A Doctrinal Thesis. 3-4 - Lee Garber:

News Briefs. 6-8 - Gary McGraw:

Silver Bullet Talks with John Savage. 9-12 - Lee M. Hively, Frederick T. Sheldon

, Anna Cinzia Squicciarini
:
Toward Scalable Trustworthy Computing Using the Human-Physiology-Immunity Metaphor. 14-23 - Quyen L. Nguyen, Arun Sood:

A Comparison of Intrusion-Tolerant System Architectures. 24-31 - David Dittrich, Michael D. Bailey, Sven Dietrich

:
Building an Active Computer Security Ethics Community. 32-40 - Danny Dhillon:

Developer-Driven Threat Modeling: Lessons Learned in the Trenches. 41-47 - Gregory J. Conti, James Caroland:

Embracing the Kobayashi Maru: Why You Should Teach Your Students to Cheat. 48-51 - Denis Trcek:

Trust Management in the Pervasive Computing Era. 52-55 - David P. Fidler:

Was Stuxnet an Act of War? Decoding a Cyberattack. 56-59 - Sean W. Smith:

Room at the Bottom: Authenticated Encryption on Slow Legacy Networks. 60-63 - Tara Whalen:

Security as if People Mattered. 64-67 - Charlie Miller:

Mobile Attacks and Defense. 68-70 - Michael E. Locasto, Matthew C. Little:

A Failure-Based Discipline of Trustworthy Information Systems. 71-75 - Michael Lesk:

Reading: From Paper to Pixels. 76-79 - John Diamant:

Resilient Security Architecture: A Complementary Approach to Reducing Vulnerabilities. 80-84 - Daniel E. Geer Jr.:

Attack Surface Inflation. 85-86 - Daniel E. Geer Jr.:

Eisenhower Revisited. 88
Volume 9, Number 5, September - October 2011
- John Viega:

Ten Years of Trustworthy Computing: Lessons Learned. 3-4 - Lee Garber:

News Briefs. 6-8 - Gary McGraw:

Silver Bullet Talks with Elinor Mills. 9-12 - Thomas A. Berson, Dorothy E. Denning:

Cyberwarfare. 13-15 - Scott D. Applegate:

Cybermilitias and Political Hackers: Use of Irregular Forces in Cyberwarfare. 16-22 - James A. Lewis:

Cyberwar Thresholds and Effects. 23-29 - Raymond C. Parks, David P. Duggan:

Principles of Cyberwarfare. 30-35 - David Elliott:

Deterring Strategic Cyberattack. 36-40 - Philip O'Kane, Sakir Sezer, Kieran McLaughlin:

Obfuscation: The Hidden Malware. 41-47 - Carl A. Gunter, David M. Liebovitz

, Bradley A. Malin
:
Experience-Based Access Management: A Life-Cycle Framework for Identity and Access Management Systems. 48-55 - Raheem A. Beyah

, Aravind Venkataraman:
Rogue-Access-Point Detection: Challenges, Solutions, and Future Directions. 56-61 - Shuihua Han, Stephen Leung, Zongwei Luo

:
Tamper Detection in the EPC Network Using Digital Watermarking. 62-69 - Wenliang Du:

SEED: Hands-On Lab Exercises for Computer Security Education. 70-73 - Landon P. Cox:

Truth in Crowdsourcing. 74-76 - Jeffrey K. MacKie-Mason

:
All Space Will Be Public Space. 77-80 - Dimitri do B. DeFigueiredo:

The Case for Mobile Two-Factor Authentication. 81-85 - Daniel E. Geer Jr., Peter Kuper:

When $80 Billion Is Not Enough. 86-87 - Bruce Schneier:

Empathy and Security. 88
Volume 9, Number 6, November - December 2011
- Marc Donner:

The Invisible Computers. 3 - Gary McGraw:

Silver Bullet Talks with Halvar Flake. 5-8 - Lee Garber:

News Briefs. 9-11 - William A. Arbaugh, Deborah A. Frincke:

Living with Insecurity. 12-13 - Rosa R. Heckle:

Security Dilemma: Healthcare Clinicians at Work. 14-19 - Debin Liu, Ninghui Li, XiaoFeng Wang, L. Jean Camp:

Security Risk Management Using Incentives. 20-28 - Antonio Manuel Fernandez Villamor, Juan Carlos Yelmo Garcia

:
Helping Users Deal with Digital Threats: The Online User Supervision Architecture. 29-35 - Steven Cheung:

Securing Collaborative Intrusion Detection Systems. 36-42 - Simson L. Garfinkel

, George W. Dinolt:
Operations with Degraded Security. 43-48 - Joel Weis, Jim Alves-Foss:

Securing Database as a Service: Issues and Compromises. 49-55 - Mohamed Kaâniche, Aad P. A. van Moorsel:

It All Depends, and Increasingly So. 56-57 - Cynthia E. Irvine:

The Value of Capture-the-Flag Exercises in Education: An Interview with Chris Eagle. 58-60 - Tara Whalen:

Mobile Devices and Location Privacy: Where Do We Go from Here? 61-62 - Kirsten Ferguson-Boucher:

Cloud Computing: A Records and Information Management Perspective. 63-66 - Dan Guido:

A Case Study of Intelligence-Driven Defense. 67-70 - Kathleen M. Moriarty:

Incident Coordination. 71-75 - Michael Lesk:

Cybersecurity and Economics. 76-79 - Robert Fly:

Detecting Fraud on Websites. 80-85 - Daniel E. Geer Jr.:

Small Is Beautiful, Big Is Inevitable. 86-87 - Steven M. Bellovin:

Security Think. 88

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














