Annual Index - IEEE Computer Society

advertisement
AUTHOR INDEX
A
Alexander, J., and J. Smith, "Disinformation: A Taxonomy," Jan./Feb., pp. 58-63.
Alves-Foss, J., see Weis, J., Nov./Dec. pp. 49-55.
Applegate, S., "Cybermilitias and Political Hackers: Use of Irregular Forces in Cyberwarfare,"
Sep./Oct., pp. 16-22.
Arbaugh, W., and D.A. Frincke, "Living with Insecurity," Nov./Dec., pp. 12-13.
Arkin, B., "Never Waste a Crisis," May/June, pp. 82-85.
Arkin, B., see Chess, B., Mar./Apr. pp. 89-92.
B
Babbitt, T., see Conti, G., May/June pp. 56-59.
Bailey, M., see Dittrich, D., July/Aug. pp. 32-40.
Barrera, D., and P. Van Oorschot, "Secure Software Installation on Smartphones," May/June,
pp. 42-48.
Bau, J., and J.C. Mitchell, "Security Modeling and Analysis," May/June, pp. 18-25.
Bayuk, J.L., "Systems Security Engineering," Mar./Apr., pp. 72-74.
Bejtlich, R., J. Steven, and G. Peterson, "Directions in Incident Detection and Response," Jan./
Feb., pp. 91-92.
Bellovin, S.M., "Clouds from Both Sides," May/June, pp. 88.
Bellovin, S.M., see Stolfo, S., May/June pp. 60-65.
Bellovin, S.M., "Security Think," Nov./Dec., pp. 88.
Berson, T.A., and D.E. Denning, "Cyberwarfare," Sep./Oct., pp. 13-15.
Beyah, R., and A. Venkataraman, "Rogue-Access-Point Detection: Challenges, Solutions, and
Future Directions," Sep./Oct., pp. 56-61.
Bishop, M., "Teaching Security Stealthily," Mar./Apr., pp. 69-71.
Bloomfield, R.E., "Resilient to the Unexpected," May/June, pp. 3-4.
Bravo-Lillo, C., L.F. Cranor, J. Downs, and S. Komanduri, "Bridging the Gap in Computer
Security Warnings: A Mental Model Approach," Mar./Apr., pp. 18-26.
C
Camp, L..J., see Liu, D., Nov./Dec. pp. 20-28.
Caroland, J., see Conti, G., July/Aug. pp. 48-51.
Cate, F.H., "A Transatlantic Convergence on Privacy?," Jan./Feb., pp. 76-79.
Chabanne, H., and M. Tibouchi, "Securing E-passports with Elliptic Curves," Mar./Apr., pp. 7578.
Chess, B., and B. Arkin, "Software Security in Practice," Mar./Apr., pp. 89-92.
Cheung, S., "Securing Collaborative Intrusion Detection Systems," Nov./Dec., pp. 36-42.
Chu, C., see han, s., Sep./Oct. pp. 62-69.
Conti, G., and J. Caroland, "Embracing the Kobayashi Maru: Why You Should Teach Your
Students to Cheat," July/Aug., pp. 48-51.
Conti, G., T. Babbitt, and J. Nelson, "Hacking Competitions and Their Untapped Potential for
Security Education," May/June, pp. 56-59.
Cova, M., see Stone-Gross, B., Jan./Feb. pp. 64-72.
Cox, L.P., "Truth in Crowdsourcing," Sep./Oct., pp. 74-76.
Cranor, L.F., see Bravo-Lillo, C., Mar./Apr. pp. 18-26.
D
Dale, O., see Fuglerud, K., Mar./Apr. pp. 27-34.
Datta, A., J. Franklin, D. Garg, L. Jia, and D. Kaynar, "On Adversary Models and
Compositional Security," May/June, pp. 26-32.
DeFigueiredo, D., "The Case for Mobile Two-Factor Authentication," Sep./Oct., pp. 81-85.
Degabriele, J.P., K. Paterson, and G. Watson, "Provable Security in the Real World," May/June,
pp. 33-41.
Denning, D.E., see Berson, T.A., Sep./Oct. pp. 13-15.
Dhillon, D., "Developer-Driven Threat Modeling: Lessons Learned in the Trenches," July/Aug.,
pp. 41-47.
Diamant, J., "Resilient Security Architecture: A Complementary Approach to Reducing
Vulnerabilities," July/Aug., pp. 80-84.
Dietrich, S., see Dittrich, D., July/Aug. pp. 32-40.
Dinolt, G., see Garfinkel, S.L., Nov./Dec. pp. 43-48.
Dittrich, D., M. Bailey, and S. Dietrich, "Building an Active Computer Security Ethics
Community," July/Aug., pp. 32-40.
Donner, M., "The Invisible Computers," Nov./Dec., pp. 3.
Donner, M., "Privacy and the System Life Cycle," Mar./Apr., pp. 3.
Downs, J., see Bravo-Lillo, C., Mar./Apr. pp. 18-26.
Du, W., "SEED: Hands-On Lab Exercises for Computer Security Education," Sep./Oct., pp. 7073.
Duggan, D.P., see Parks, R.C., Sep./Oct. pp. 30-35.
E
Ekelhart, A., see Fenz, S., Mar./Apr. pp. 58-65.
Elliott, D., "Deterring Strategic Cyberattack," Sep./Oct., pp. 36-40.
Evans, D., and S. Stolfo, "Guest Editors' Introduction: The Science of Security," May/June, pp.
16-17.
Evans, D., see Stolfo, S., May/June pp. 60-65.
F
Fenz, S., and A. Ekelhart, "Verification, Validation, and Evaluation in Information Security Risk
Management," Mar./Apr., pp. 58-65.
Ferguson-Boucher, K., "Cloud Computing: A Records and Information Management
Perspective," Nov./Dec., pp. 63-66.
Fidler, D.P., "Was Stuxnet an Act of War? Decoding a Cyberattack," July/Aug., pp. 56-59.
Fly, R., "Detecting Fraud on Websites," Nov./Dec., pp. 80-85.
Franklin, J., see Datta, A., May/June pp. 26-32.
Frincke, D.A., see Arbaugh, W., Nov./Dec. pp. 12-13.
Fuglerud, K., and O. Dale, "Secure and Inclusive Authentication with a Talking Mobile OneTime-Password Client," Mar./Apr., pp. 27-34.
G
Garber, L., "News Briefs," Nov./Dec., pp. 9-11.
Garfinkel, S.L., and G. Dinolt, "Operations with Degraded Security," Nov./Dec., pp. 43-48.
Garg, D., see Datta, A., May/June pp. 26-32.
Geer Jr., D.E., "Attack Surface Inflation," July/Aug., pp. 85-86.
Geer Jr., D.E., "Correlation Is Not Causation," Mar./Apr., pp. 93-94.
Geer Jr., D.E., "Does a Rising Tide Lift All Boats?," Jan./Feb., pp. 93-94.
Geer Jr., D.E., "Eisenhower Revisited," July/Aug., pp. 88, 87.
Geer Jr., D.E., "New Measures," May/June, pp. 86-87.
Geer Jr., D.E., "Small Is Beautiful, Big Is Inevitable," Nov./Dec., pp. 86-87.
Geer Jr., D.E., "A Time for Choosing," Jan./Feb., pp. 96, 95.
Geer Jr., D.E., and P. Kuper, "When $80 Billion Is Not Enough," Sep./Oct., pp. 86-87.
Ghosh, A., see Greamo, C., Mar./Apr. pp. 79-82.
Gilbert, B., see Stone-Gross, B., Jan./Feb. pp. 64-72.
Greamo, C., and A. Ghosh, "Sandboxing and Virtualization: Modern Tools for Combating
Malware," Mar./Apr., pp. 79-82.
Grigg, I., and P. Gutmann, "The Curse of Cryptographic Numerology," May/June, pp. 70-72.
Grobauer, B., T. Walloschek, and E. Stocker, "Understanding Cloud Computing
Vulnerabilities," Mar./Apr., pp. 50-57.
Guido, D., "A Case Study of Intelligence-Driven Defense," Nov./Dec., pp. 67-70.
Gunter, C., D. Liebovitz, and B. Malin, "Experience-Based Access Management: A Life-Cycle
Framework for Identity and Access Management Systems," Sep./Oct., pp. 48-55.
Gutmann, P., see Grigg, I., May/June pp. 70-72.
H
han, s., C. Chu, and z. luo, "Tamper Detection in the EPC Network Using Digital
Watermarking," Sep./Oct., pp. 62-69.
Heckle, R.R., "Security Dilemma: Healthcare Clinicians at Work," Nov./Dec., pp. 14-19.
Heelan, S., "Vulnerability Detection Systems: Think Cyborg, Not Robot," May/June, pp. 74-77.
Hively, L., F. Sheldon, and A.C. Squicciarini, "Toward Scalable Trustworthy Computing Using
the Human-Physiology-Immunity Metaphor," July/Aug., pp. 14-23.
I
Irvine, C., and J.R. Rao, "Guest Editors' Introduction: Engineering Secure Systems," Jan./Feb.,
pp. 18-21.
Irvine, C., "The Value of Capture-the-Flag Exercises in Education: An Interview with Chris
Eagle," Nov./Dec., pp. 58-60.
J
Jaeger, T., see Schiffman, J., Jan./Feb. pp. 40-48.
Jia, L., see Datta, A., May/June pp. 26-32.
Johnson, M..E., and S. Pfleeger, "Addressing Information Risk in Turbulent Times," Jan./Feb.,
pp. 49-57.
Johnson, M..E., and N. Willey, "Usability Failures and Healthcare Data Hemorrhages," Mar./
Apr., pp. 35-42.
K
Kaaniche, M., and A. van Moorsel, "It All Depends, and Increasingly So," Nov./Dec., pp. 56-57.
Karger, P., S. McIntosh, E. Palmer, D. Toll, and S. Weber, "Lessons Learned Building the
Caernarvon High-Assurance Operating System," Jan./Feb., pp. 22-30.
Kaufman, L.M., "How Private Is the Internet?," Jan./Feb., pp. 73-75.
Kaynar, D., see Datta, A., May/June pp. 26-32.
Kemmerer, R., see Stone-Gross, B., Jan./Feb. pp. 64-72.
Komanduri, S., see Bravo-Lillo, C., Mar./Apr. pp. 18-26.
Kruegel, C., see Stone-Gross, B., Jan./Feb. pp. 64-72.
Kuper, P., see Geer Jr., D.E., Sep./Oct. pp. 86-87.
L
Langner, R., "Stuxnet: Dissecting a Cyberwarfare Weapon," May/June, pp. 49-51.
Lesk, M., "Cybersecurity and Economics," Nov./Dec., pp. 76-79.
Lesk, M., "Reading: From Paper to Pixels," July/Aug., pp. 76-79.
Lesk, M., "Salmon, Songs, and Blankets: Creativity on the Northwest Coast," May/June, pp. 7881.
Lesk, M., "What Is Information Worth?," Jan./Feb., pp. 88-90.
Levin, T., see Weissman, C., Jan./Feb. pp. 31-39.
Lewis, J., "Cyberwar Thresholds and Effects," Sep./Oct., pp. 23-29.
Li, N., see Liu, D., Nov./Dec. pp. 20-28.
Liebovitz, D., see Gunter, C., Sep./Oct. pp. 48-55.
Little, M.C., see Locasto, M.E., July/Aug. pp. 71-75.
Liu, D., N. Li, X. Wang, and L..J. Camp, "Security Risk Management Using Incentives," Nov./
Dec., pp. 20-28.
Locasto, M.E., and M.C. Little, "A Failure-Based Discipline of Trustworthy Information
Systems," July/Aug., pp. 71-75.
luo, z., see han, s., Sep./Oct. pp. 62-69.
M
MacKie-Mason, J., "All Space Will Be Public Space," Sep./Oct., pp. 77-80.
Malin, B., see Gunter, C., Sep./Oct. pp. 48-55.
McDaniel, P., "Data Provenance and Security," Mar./Apr., pp. 83-85.
McDaniel, P., see Schiffman, J., Jan./Feb. pp. 40-48.
McGraw, G., "Silver Bullet Talks with David Rice," Mar./Apr., pp. 8-11.
McGraw, G., "Silver Bullet Talks with Elinor Mills," Sep./Oct., pp. 9-12.
McGraw, G., "Silver Bullet Talks with Halvar Flake," Nov./Dec., pp. 5-8.
McGraw, G., "Silver Bullet Talks with John Savage," July/Aug., pp. 9-12.
McGraw, G., "Silver Bullet Talks with Paul Kocher," Jan./Feb., pp. 8-11.
McGraw, G., "Silver Bullet Talks with Ralph Langner," May/June, pp. 9-14.
McIntosh, S., see Karger, P., Jan./Feb. pp. 22-30.
McLaughlin, K., see O'Kane, P., Sep./Oct. pp. 41-47.
Miller, C., "Mobile Attacks and Defense," July/Aug., pp. 68-70.
Mitchell, J.C., see Bau, J., May/June pp. 18-25.
Moriarty, K.M., "Incident Coordination," Nov./Dec., pp. 71-75.
Moyer, T., see Schiffman, J., Jan./Feb. pp. 40-48.
Mulligan, D.K., see Schneider, F.B., July/Aug. pp. 3-4.
N
Nelson, J., see Conti, G., May/June pp. 56-59.
Nguyen, Q.L., and A. Sood, "A Comparison of Intrusion-Tolerant System Architectures," July/
Aug., pp. 24-31.
O
O'Kane, P., S. Sezer, and K. McLaughlin, "Obfuscation: The Hidden Malware," Sep./Oct., pp.
41-47.
P
Palmer, E., see Karger, P., Jan./Feb. pp. 22-30.
Parks, R.C., and D.P. Duggan, "Principles of Cyberwarfare," Sep./Oct., pp. 30-35.
Paterson, K., see Degabriele, J.P., May/June pp. 33-41.
Peterson, G., see Bejtlich, R., Jan./Feb. pp. 91-92.
Pfleeger, S.L., see Theofanos, M.F., Mar./Apr. pp. 12-17.
Pfleeger, S., see Johnson, M..E., Jan./Feb. pp. 49-57.
R
Rao, J.R., see Irvine, C., Jan./Feb. pp. 18-21.
Raskin, A., "Your Life Experiences, Brought to You by Budweiser," Mar./Apr., pp. 86-88.
Reeder, R., and S. Schechter, "When the Password Doesn't Work: Secondary Authentication for
Websites," Mar./Apr., pp. 43-49.
S
Schechter, S., see Reeder, R., Mar./Apr. pp. 43-49.
Schiffman, J., T. Moyer, T. Jaeger, and P. McDaniel, "Network-Based Root of Trust for
Installation," Jan./Feb., pp. 40-48.
Schneider, F.B., and D.K. Mulligan, "A Doctrinal Thesis," July/Aug., pp. 3-4.
Schneier, B., "Detecting Cheaters," Mar./Apr., pp. 96, 95.
Schneier, B., "Empathy and Security," Sep./Oct., pp. 88.
Schwartz, P.M., "Privacy, Ethics, and Analytics," May/June, pp. 66-69.
Seltzer, W., "Exposing the Flaws of Censorship by Domain Name," Jan./Feb., pp. 83-87.
Sezer, S., see O'Kane, P., Sep./Oct. pp. 41-47.
Sheldon, F., see Hively, L., July/Aug. pp. 14-23.
Smith, J., see Alexander, J., Jan./Feb. pp. 58-63.
Smith, S.W., "Room at the Bottom: Authenticated Encryption on Slow Legacy Networks," July/
Aug., pp. 60-63.
Sood, A., see Nguyen, Q.L., July/Aug. pp. 24-31.
Spring, J., "Monitoring Cloud Computing by Layer, Part 1," Mar./Apr., pp. 66-68.
Spring, J., "Monitoring Cloud Computing by Layer, Part 2," May/June, pp. 52-55.
Squicciarini, A.C., see Hively, L., July/Aug. pp. 14-23.
Steven, J., see Bejtlich, R., Jan./Feb. pp. 91-92.
Stevens, D., "Malicious PDF Documents Explained," Jan./Feb., pp. 80-82.
Stocker, E., see Grobauer, B., Mar./Apr. pp. 50-57.
Stolfo, S., see Evans, D., May/June pp. 16-17.
Stolfo, S., S.M. Bellovin, and D. Evans, "Measuring Security," May/June, pp. 60-65.
Stone-Gross, B., M. Cova, B. Gilbert, R. Kemmerer, C. Kruegel, and G. Vigna, "Analysis of a
Botnet Takeover," Jan./Feb., pp. 64-72.
T
Theofanos, M.F., and S.L. Pfleeger, "Guest Editors' Introduction: Shouldn't All Security Be
Usable?," Mar./Apr., pp. 12-17.
Tibouchi, M., see Chabanne, H., Mar./Apr. pp. 75-78.
Toll, D., see Karger, P., Jan./Feb. pp. 22-30.
Trcek, D., "Trust Management in the Pervasive Computing Era," July/Aug., pp. 52-55.
V
van Moorsel, A., see Kaaniche, M., Nov./Dec. pp. 56-57.
Van Oorschot, P., see Barrera, D., May/June pp. 42-48.
Venkataraman, A., see Beyah, R., Sep./Oct. pp. 56-61.
Viega, J., "Reality Check," Jan./Feb., pp. 3-4.
Viega, J., "Ten Years of Trustworthy Computing: Lessons Learned," Sep./Oct., pp. 3-4.
Vigna, G., "The 2010 International Capture the Flag Competition," Jan./Feb., pp. 12-14.
Vigna, G., see Stone-Gross, B., Jan./Feb. pp. 64-72.
Villamor, A.M.F., and J.C. Yelmo, "Helping Users Deal with Digital Threats: The Online User
Supervision Architecture," Nov./Dec., pp. 29-35.
W
Walloschek, T., see Grobauer, B., Mar./Apr. pp. 50-57.
Wang, X., see Liu, D., Nov./Dec. pp. 20-28.
Watson, G., see Degabriele, J.P., May/June pp. 33-41.
Weber, S., see Karger, P., Jan./Feb. pp. 22-30.
Weis, J., and J. Alves-Foss, "Securing Database as a Service: Issues and Compromises," Nov./
Dec., pp. 49-55.
Weissman, C., and T. Levin, "Lessons Learned from Building a High-Assurance Crypto
Gateway," Jan./Feb., pp. 31-39.
Whalen, T., "Mobile Devices and Location Privacy: Where Do We Go from Here?," Nov./Dec.,
pp. 61-62.
Whalen, T., "Security as if People Mattered," July/Aug., pp. 64-67.
Willey, N., see Johnson, M..E., Mar./Apr. pp. 35-42.
Y
Yelmo, J.C., see Villamor, A.M.F., Nov./Dec. pp. 29-35.
Subject Index
A
Access Control
"Experience-Based Access Management: A Life-Cycle Framework for Identity and Access
Management Systems," C. Gunter, D. Liebovitz, and B. Malin, Sep./Oct., pp. 48-55.
Attack Trends
"A Case Study of Intelligence-Driven Defense," D. Guido, Nov./Dec., pp. 67-70.
"Malicious PDF Documents Explained," D. Stevens, Jan./Feb., pp. 80-82.
"Mobile Attacks and Defense," C. Miller, July/Aug., pp. 68-70.
"Vulnerability Detection Systems: Think Cyborg, Not Robot," S. Heelan, May/June, pp. 74-77.
B
Basic Training
"Cloud Computing: A Records and Information Management Perspective," K. Ferguson-Boucher,
Nov./Dec., pp. 63-66.
"Sandboxing and Virtualization: Modern Tools for Combating Malware," C. Greamo, and A. Ghosh,
Mar./Apr., pp. 79-82.
"Security as if People Mattered," T. Whalen, July/Aug., pp. 64-67.
Building Security In
"The Case for Mobile Two-Factor Authentication," D. DeFigueiredo, Sep./Oct., pp. 81-85.
"Detecting Fraud on Websites," R. Fly, Nov./Dec., pp. 80-85.
"Directions in Incident Detection and Response," R. Bejtlich, J. Steven, and G. Peterson, Jan./Feb.,
pp. 91-92.
"Never Waste a Crisis," B. Arkin, May/June, pp. 82-85.
"Resilient Security Architecture: A Complementary Approach to Reducing Vulnerabilities," J.
Diamant, July/Aug., pp. 80-84.
"Software Security in Practice," B. Chess, and B. Arkin, Mar./Apr., pp. 89-92.
C
ClearText
"Clouds from Both Sides," S.M. Bellovin, May/June, pp. 88.
"Detecting Cheaters," B. Schneier, Mar./Apr., pp. 96, 95.
"Eisenhower Revisited," D.E. Geer Jr., July/Aug., pp. 88, 87.
"Empathy and Security," B. Schneier, Sep./Oct., pp. 88.
"Security Think," S.M. Bellovin, Nov./Dec., pp. 88.
"A Time for Choosing," D.E. Geer Jr., Jan./Feb., pp. 96, 95.
Cloud Computing
"Understanding Cloud Computing Vulnerabilities," B. Grobauer, T. Walloschek, and E. Stocker,
Mar./Apr., pp. 50-57.
Crypto Corner
"The Curse of Cryptographic Numerology," I. Grigg, and P. Gutmann, May/June, pp. 70-72.
"Room at the Bottom: Authenticated Encryption on Slow Legacy Networks," S.W. Smith, July/
Aug., pp. 60-63.
"Securing E-passports with Elliptic Curves," H. Chabanne, and M. Tibouchi, Mar./Apr., pp. 75-78.
Cyberwarfare
"Cybermilitias and Political Hackers: Use of Irregular Forces in Cyberwarfare," S. Applegate, Sep./
Oct., pp. 16-22.
"Cyberwar Thresholds and Effects," J. Lewis, Sep./Oct., pp. 23-29.
"Deterring Strategic Cyberattack," D. Elliott, Sep./Oct., pp. 36-40.
"Principles of Cyberwarfare," R.C. Parks, and D.P. Duggan, Sep./Oct., pp. 30-35.
D
Data Tampering
"Tamper Detection in the EPC Network Using Digital Watermarking," s. han, C. Chu, and z. luo,
Sep./Oct., pp. 62-69.
Deception and Surveillance
"Disinformation: A Taxonomy," J. Alexander, and J. Smith, Jan./Feb., pp. 58-63.
E
Education
"Embracing the Kobayashi Maru: Why You Should Teach Your Students to Cheat," G. Conti, and J.
Caroland, July/Aug., pp. 48-51.
"Hacking Competitions and Their Untapped Potential for Security Education," G. Conti, T. Babbitt,
and J. Nelson, May/June, pp. 56-59.
"SEED: Hands-On Lab Exercises for Computer Security Education," W. Du, Sep./Oct., pp. 70-73.
"Teaching Security Stealthily," M. Bishop, Mar./Apr., pp. 69-71.
"The Value of Capture-the-Flag Exercises in Education: An Interview with Chris Eagle," C. Irvine,
Nov./Dec., pp. 58-60.
Engineering Secure Systems
"Guest Editors' Introduction: Engineering Secure Systems," C. Irvine, and J.R. Rao, Jan./Feb., pp.
18-21.
"Lessons Learned Building the Caernarvon High-Assurance Operating System," P. Karger, S.
McIntosh, E. Palmer, D. Toll, and S. Weber, Jan./Feb., pp. 22-30.
"Lessons Learned from Building a High-Assurance Crypto Gateway," C. Weissman, and T. Levin,
Jan./Feb., pp. 31-39.
"Network-Based Root of Trust for Installation," J. Schiffman, T. Moyer, T. Jaeger, and P. McDaniel,
Jan./Feb., pp. 40-48.
Ethics
"Building an Active Computer Security Ethics Community," D. Dittrich, M. Bailey, and S. Dietrich,
July/Aug., pp. 32-40.
F
Focus
"The 2010 International Capture the Flag Competition," G. Vigna, Jan./Feb., pp. 12-14.
"Stuxnet: Dissecting a Cyberwarfare Weapon," R. Langner, May/June, pp. 49-51.
For Good Measure
"Attack Surface Inflation," D.E. Geer Jr., July/Aug., pp. 85-86.
"Correlation Is Not Causation," D.E. Geer Jr., Mar./Apr., pp. 93-94.
"Does a Rising Tide Lift All Boats?," D.E. Geer Jr., Jan./Feb., pp. 93-94.
"New Measures," D.E. Geer Jr., May/June, pp. 86-87.
"Small Is Beautiful, Big Is Inevitable," D.E. Geer Jr., Nov./Dec., pp. 86-87.
"When $80 Billion Is Not Enough," D.E. Geer Jr., and P. Kuper, Sep./Oct., pp. 86-87.
From the Editors
"A Doctrinal Thesis," F.B. Schneider, and D.K. Mulligan, July/Aug., pp. 3-4.
"The Invisible Computers," M. Donner, Nov./Dec., pp. 3.
"Privacy and the System Life Cycle," M. Donner, Mar./Apr., pp. 3.
"Reality Check," J. Viega, Jan./Feb., pp. 3-4.
"Resilient to the Unexpected," R.E. Bloomfield, May/June, pp. 3-4.
"Ten Years of Trustworthy Computing: Lessons Learned," J. Viega, Sep./Oct., pp. 3-4.
G
Guest Editors' Introduction
"Cyberwarfare," T.A. Berson, and D.E. Denning, Sep./Oct., pp. 13-15.
"Living with Insecurity," W. Arbaugh, and D.A. Frincke, Nov./Dec., pp. 12-13.
I
Information Security Risk Management
"Verification, Validation, and Evaluation in Information Security Risk Management," S. Fenz, and
A. Ekelhart, Mar./Apr., pp. 58-65.
Insider Attacks
"Rogue-Access-Point Detection: Challenges, Solutions, and Future Directions," R. Beyah, and A.
Venkataraman, Sep./Oct., pp. 56-61.
Interview
"Silver Bullet Talks with David Rice," G. McGraw, Mar./Apr., pp. 8-11.
"Silver Bullet Talks with Elinor Mills," G. McGraw, Sep./Oct., pp. 9-12.
"Silver Bullet Talks with Halvar Flake," G. McGraw, Nov./Dec., pp. 5-8.
"Silver Bullet Talks with John Savage," G. McGraw, July/Aug., pp. 9-12.
"Silver Bullet Talks with Paul Kocher," G. McGraw, Jan./Feb., pp. 8-11.
"Silver Bullet Talks with Ralph Langner," G. McGraw, May/June, pp. 9-14.
Intrusion-Tolerant Systems
"A Comparison of Intrusion-Tolerant System Architectures," Q.L. Nguyen, and A. Sood, July/Aug.,
pp. 24-31.
It All Depends
"How Private Is the Internet?," L.M. Kaufman, Jan./Feb., pp. 73-75.
"It All Depends, and Increasingly So," M. Kaaniche, and A. van Moorsel, Nov./Dec., pp. 56-57.
"Monitoring Cloud Computing by Layer, Part 1," J. Spring, Mar./Apr., pp. 66-68.
"Monitoring Cloud Computing by Layer, Part 2," J. Spring, May/June, pp. 52-55.
L
Living with Insecurity
"Helping Users Deal with Digital Threats: The Online User Supervision Architecture," A.M.F.
Villamor, and J.C. Yelmo, Nov./Dec., pp. 29-35.
"Operations with Degraded Security," S.L. Garfinkel, and G. Dinolt, Nov./Dec., pp. 43-48.
"Securing Collaborative Intrusion Detection Systems," S. Cheung, Nov./Dec., pp. 36-42.
"Securing Database as a Service: Issues and Compromises," J. Weis, and J. Alves-Foss, Nov./Dec.,
pp. 49-55.
"Security Dilemma: Healthcare Clinicians at Work," R.R. Heckle, Nov./Dec., pp. 14-19.
"Security Risk Management Using Incentives," D. Liu, N. Li, X. Wang, and L..J. Camp, Nov./Dec.,
pp. 20-28.
M
Malware Analysis
"Analysis of a Botnet Takeover," B. Stone-Gross, M. Cova, B. Gilbert, R. Kemmerer, C. Kruegel,
and G. Vigna, Jan./Feb., pp. 64-72.
Malware
"Obfuscation: The Hidden Malware," P. O'Kane, S. Sezer, and K. McLaughlin, Sep./Oct., pp. 41-47.
N
News Briefs
"News Briefs," L. Garber, Jan./Feb., pp. 15-17.
"News Briefs," L. Garber, Mar./Apr., pp. 5-7.
"News Briefs," L. Garber, May/June, pp. 6-8.
"News Briefs," L. Garber, July/Aug., pp. 6-8.
"News Briefs," L. Garber, Sep./Oct., pp. 6-8.
"News Briefs," L. Garber, Nov./Dec., pp. 9-11.
O
On the Horizon
"Measuring Security," S. Stolfo, S.M. Bellovin, and D. Evans, May/June, pp. 60-65.
"Systems Security Engineering," J.L. Bayuk, Mar./Apr., pp. 72-74.
"Trust Management in the Pervasive Computing Era," D. Trcek, July/Aug., pp. 52-55.
P
Privacy Interests
"Mobile Devices and Location Privacy: Where Do We Go from Here?," T. Whalen, Nov./Dec., pp.
61-62.
"Privacy, Ethics, and Analytics," P.M. Schwartz, May/June, pp. 66-69.
"A Transatlantic Convergence on Privacy?," F.H. Cate, Jan./Feb., pp. 76-79.
"Was Stuxnet an Act of War? Decoding a Cyberattack," D.P. Fidler, July/Aug., pp. 56-59.
R
Risk Assessment
"Addressing Information Risk in Turbulent Times," M..E. Johnson, and S. Pfleeger, Jan./Feb., pp.
49-57.
S
Secure Systems
"Data Provenance and Security," P. McDaniel, Mar./Apr., pp. 83-85.
"Exposing the Flaws of Censorship by Domain Name," W. Seltzer, Jan./Feb., pp. 83-87.
"A Failure-Based Discipline of Trustworthy Information Systems," M.E. Locasto, and M.C. Little,
July/Aug., pp. 71-75.
"Incident Coordination," K.M. Moriarty, Nov./Dec., pp. 71-75.
"Truth in Crowdsourcing," L.P. Cox, Sep./Oct., pp. 74-76.
Security & Privacy Economics
"Your Life Experiences, Brought to You by Budweiser," A. Raskin, Mar./Apr., pp. 86-88.
Security & Privacy Economics
"Reading: From Paper to Pixels," M. Lesk, July/Aug., pp. 76-79.
Security & Privacy Economics
"All Space Will Be Public Space," J. MacKie-Mason, Sep./Oct., pp. 77-80.
"Cybersecurity and Economics," M. Lesk, Nov./Dec., pp. 76-79.
"Salmon, Songs, and Blankets: Creativity on the Northwest Coast," M. Lesk, May/June, pp. 78-81.
"What Is Information Worth?," M. Lesk, Jan./Feb., pp. 88-90.
Smartphone Security
"Secure Software Installation on Smartphones," D. Barrera, and P. Van Oorschot, May/June, pp. 4248.
T
The Science of Security
"Guest Editors' Introduction: The Science of Security," D. Evans, and S. Stolfo, May/June, pp. 16-17.
"On Adversary Models and Compositional Security," A. Datta, J. Franklin, D. Garg, L. Jia, and D.
Kaynar, May/June, pp. 26-32.
"Provable Security in the Real World," J.P. Degabriele, K. Paterson, and G. Watson, May/June, pp.
33-41.
"Security Modeling and Analysis," J. Bau, and J.C. Mitchell, May/June, pp. 18-25.
Threat Modeling
"Developer-Driven Threat Modeling: Lessons Learned in the Trenches," D. Dhillon, July/Aug., pp.
41-47.
Trustworthy Computing
"Toward Scalable Trustworthy Computing Using the Human-Physiology-Immunity Metaphor," L.
Hively, F. Sheldon, and A.C. Squicciarini, July/Aug., pp. 14-23.
U
Usability of Security
"Bridging the Gap in Computer Security Warnings: A Mental Model Approach," C. Bravo-Lillo, L.
F. Cranor, J. Downs, and S. Komanduri, Mar./Apr., pp. 18-26.
"Guest Editors' Introduction: Shouldn't All Security Be Usable?," M.F. Theofanos, and S.L.
Pfleeger, Mar./Apr., pp. 12-17.
"Secure and Inclusive Authentication with a Talking Mobile One-Time-Password Client," K.
Fuglerud, and O. Dale, Mar./Apr., pp. 27-34.
"Usability Failures and Healthcare Data Hemorrhages," M..E. Johnson, and N. Willey, Mar./Apr.,
pp. 35-42.
"When the Password Doesn't Work: Secondary Authentication for Websites," R. Reeder, and S.
Schechter, Mar./Apr., pp. 43-49.
Download