


default search action
IEEE Security & Privacy, Volume 8
Volume 8, Number 1, January/February 2010
- Carl E. Landwehr:
Drawing the Line. 3-4 - James Figueroa:
News Briefs. 6-7 - Gary McGraw:
Silver Bullet Talks with Christofer Hoff. 8-10 - Mikhail A. Lisovich, Deirdre K. Mulligan, Stephen B. Wicker:
Inferring Personal Information from Demand-Response Systems. 11-20 - Annie I. Antón, Julia Brande Earp, Jessica D. Young:
How Internet Users' Privacy Concerns Have Evolved since 2002. 21-27 - Mark Strembeck:
Scenario-Driven Role Engineering. 28-35 - Francis Kofi Andoh-Baidoo, Kwasi Amoako-Gyampah, Kweku-Muata Osei-Bryson:
How Internet Security Breaches Harm Market Value. 36-42 - Jörgen Hansson, Lutz Wrage, Peter H. Feiler, John Morley, Bruce A. Lewis, Jérôme Hugues:
Architectural Modeling to Verify Security and Nonfunctional Behavior. 43-49 - Lori M. Kaufman:
Can a Trusted Environment Provide Security?. 50-52 - Rainer Böhme, Tyler Moore
:
The Iterated Weakest Link. 53-55 - Cynthia E. Irvine, Charles C. Palmer:
Call in the Cyber National Guard! 56-59 - Fred Cohen:
The Smarter Grid. 60-63 - Wil Michiels:
Opportunities in White-Box Cryptography. 64-67 - Richard Ford, Deborah A. Frincke:
Building a Better Boot Camp. 68-71 - Mark Fabro, Tim Roxey, Michael J. Assante:
No Grid Left Behind. 72-76 - Trent Jaeger, Joshua Schiffman:
Outlook: Cloudy with a Chance of Security Challenges and Improvements. 77-80 - Himanshu Khurana, Mark Hadley, Ning Lu
, Deborah A. Frincke:
Smart-Grid Security Issues. 81-85 - Daniel E. Geer Jr., Daniel G. Conway:
A Life Is Short, a Half-Life Is Forever. 86-87 - Bruce Schneier:
Security and Function Creep. 88
Volume 8, Number 2, March/April 2010
- Marc Donner:
International Blues. 3 - Gary McGraw:
Silver Bullet Talks with Gillian Hayes. 5-7 - James Figueroa:
News Briefs. 8-10 - John Viega, Bret Michael:
Guest Editors' Introduction: Mobile Device Security. 11-12 - Ricardo Ribalda, Guillermo González de Rivera
, Angel de Castro
, Javier Garrido Salas
:
A Mobile Biometric System-on-Token System for Signing Digital Transactions. 13-19 - John Paul Dunning:
Taming the Blue Beast: A Survey of Bluetooth Based Threats. 20-27 - HongQian Karen Lu, Asad M. Ali:
Making Smart Cards Truly Portable. 28-34 - Asaf Shabtai, Yuval Fledel, Uri Kanonov, Yuval Elovici, Shlomi Dolev
, Chanan Glezer
:
Google Android: A Comprehensive Security Assessment. 35-44 - Christoph Sorge, Saverio Niccolini, Jan Seedorf:
The Legal Ramifications of Call-Filtering Solutions. 45-50 - Bruce Potter:
My Information, Your Code. 51-53 - Matt Bishop
:
A Clinic for "Secure" Programming. 54-56 - Marjory S. Blumenthal:
Hide and Seek in the Cloud. 57-58 - Fred H. Cate:
The Limits of Notice and Choice. 59-62 - Charles P. Pfleeger:
Crypto: Not Just for the Defensive Team. 63-66 - Andrea M. Matwyshyn, Ang Cui, Angelos D. Keromytis, Salvatore J. Stolfo:
Ethics in Security Vulnerability Research. 67-72 - Marco Ramilli, Marco Prandini
:
Always the Same, Never the Same. 73-75 - Angelos D. Keromytis:
Voice-over-IP Security: Research and Practice. 76-78 - J. Alex Halderman:
To Strengthen Security, Change Developers' Incentives. 79-82 - James McGovern, Gunnar Peterson:
10 Quick, Dirty, and Cheap Things to Improve Enterprise Security. 83-85 - Daniel E. Geer Jr., Daniel G. Conway:
Nothing Ventured, Nothing Gained. 86-87 - Steven M. Bellovin:
Identity and Security. 88
Volume 8, Number 3, May - June 2010
- Bret Michael:
Balancing Liberty, Stability, and Security. 3 - Gary McGraw:
Silver Bullet Talks with Steven Kent. 5-9 - Linda Dailey Paulson:
News Briefs. 11-13 - Laurie A. Williams, Andrew Meneely, Grant Shipley:
Protection Poker: The New Software Security "Game";. 14-20 - Kjell Jørgen Hole, Lars-Helge Netland:
Toward Risk Assessment of Large-Impact and Rare Events. 21-27 - Ian P. Cook, Shari Lawrence Pfleeger:
Security Decision Support Challenges in Data Collection and Use. 28-35 - Asaf Shabtai, Yuval Fledel, Yuval Elovici:
Securing Android-Powered Mobile Devices Using SELinux. 36-44 - Nir Kshetri:
The Economics of Click Fraud. 45-53 - Lori M. Kaufman, Bruce Potter:
Thinking Operationally. 54-55 - Edward B. Talbot, Deborah A. Frincke, Matt Bishop
:
Demythifying Cybersecurity. 56-59 - Fred Cohen:
The Virtualization Solution. 60-63 - Khaled El Emam:
Risk-Based De-Identification of Health Data. 64-67 - Luther Martin:
XTS: A Mode of AES for Encrypting Hard Disks. 68-69 - Tom Kellerman:
Cyber-Threat Proliferation: Today's Truly Pervasive Global Epidemic. 70-73 - Jon Giffin:
The Next Malware Battleground: Recovery After Unknown Infection. 74-76 - Michael Lesk:
Son of Carterfone: Network Neutrality or Regulation? 77-82 - John Steven:
Threat Modeling Perhaps It's Time. 83-86 - Daniel E. Geer Jr.:
Fratricide. 88
Volume 8, Number 4, July - August 2010
- Fred B. Schneider:
Fumbling the Future, Again. 3 - Gary McGraw:
Silver Bullet Talks with Richard Clarke. 5-11 - Linda Dailey Paulson:
News Briefs. 12-14 - Salvatore J. Stolfo, Gene Tsudik:
Privacy-Preserving Sharing of Sensitive Information. 16-17 - Emiliano De Cristofaro, Jihye Kim:
Some Like It Private: Sharing Confidential Information Based on Oblivious Authorization. 18-24 - Lalana Kagal, Joe Pato:
Preserving Privacy Based on Semantic Policy Tools. 25-30 - Erin E. Kenneally, kc claffy
:
Dialing Privacy and Utility: A Proposed Data-Sharing Framework to Advance Internet Research. 31-39 - Tal Moran, Tyler Moore
:
The Phish-Market Protocol: Secure Sharing Between Competitors. 40-45 - Shari Lawrence Pfleeger, Robert K. Cunningham:
Why Measuring Security Is Hard. 46-54 - Lori M. Kaufman:
Can Public-Cloud Security Meet Its Unique Challenges? 55-57 - Cynthia E. Irvine, Thuy D. Nguyen:
Educating the Systems Security Engineer's Apprentice. 58-61 - Vijay Varadharajan
:
Internet Filtering Issues and Challenges. 62-65 - Christian Cachin, Jan Camenisch:
Encrypting Keys Securely. 66-69 - Daniel Bilar
:
Degradation and Subversion through Subsystem Attacks. 70-73 - Sara Sinclair, Sean W. Smith:
What's Wrong with Access Control in the Real World? 74-77 - Benjamin Edelman:
Least-Cost Avoiders in Online Fraud and Abuse. 78-81 - Anton Chuvakin, Gunnar Peterson:
How to Do Application Logging Right. 82-85 - Daniel E. Geer Jr.:
A Time to Rethink. 86-87 - Bruce Schneier:
A Taxonomy of Social Networking Data. 88
Volume 8, Number 5, September - October 2010
- Marc Donner:
Phagocytes in Cyberspace. 3-4 - Gary McGraw:
Silver Bullet Talks with Greg Morrisett. 6-9 - George Lawton:
News Briefs. 10-11 - Ram Chillarege, Jeffrey M. Voas:
Guest Editors' Introduction: Reliability of Embedded and Cyber-Physical Systems. 12-13 - Hui Jun Wu:
Kernel Service Protection for Client Security. 14-19 - J. Ryan Kenny, Craig Robinson:
Embedded Software Assurance for Configuring Secure Hardware. 20-26 - Sean Barnum, Shankar Sastry, John A. Stankovic:
Roundtable: Reliability of Embedded and Cyber-Physical Systems. 27-32 - Kevin R. B. Butler
, Stephen E. McLaughlin, Thomas Moyer, Patrick D. McDaniel:
New Security Architectures Based on Emerging Disk Functionality. 34-41 - Saeed Abu-Nimeh, Thomas M. Chen
:
Proliferation and Detection of Blog Spam. 42-47 - Corrado Aaron Visaggio
:
Session Management Vulnerabilities in Today's Web. 48-56 - Bruce Potter:
Necessary but Not Sufficient. 57-58 - Gregory B. White, Dwayne Williams, Keith Harrison:
The CyberPatriot National High School Cyber Defense Competition. 59-61 - Fred Cohen:
Automated Control System Security. 62-63 - Paula J. Bruening, K. Krasnow Waterman:
Data Tagging for New Information Governance Models. 64-68 - Teddy Furon, Gwenaël J. Doërr
:
Tracing Pirated Content on the Internet: Unwinding Ariadne's Thread. 69-71 - Matt Bishop
:
Technology, Training, and Transformation. 72-75 - Patrick D. McDaniel, William Enck:
Not So Great Expectations: Why Application Markets Haven't Failed Security. 76-78 - Michael Lesk:
Do the Luddites Ever Win? 79-82 - Gunnar Peterson:
Don't Trust. And Verify: A Security Architecture Stack for the Cloud. 83-86 - Steven M. Bellovin:
Perceptions and Reality. 88
Volume 8, Number 6, November - December 2010
- Carl E. Landwehr:
Sailing Away! 3-4 - George Lawton:
News Briefs. 7-8 - Gary McGraw:
Silver Bullet Talks with Iván Arce. 9-13 - Anup Ghosh, Iván Arce:
Guest Editors' Introduction: In Cloud Computing We Trust - But Should We? 14-16 - Eric Grosse, John Howie, James Ransome, Jim Reavis, Steve Schmidt:
Cloud Computing Roundtable. 17-23 - Hassan Takabi, James B. D. Joshi, Gail-Joon Ahn
:
Security and Privacy Challenges in Cloud Computing Environments. 24-31 - Wayne Pauley:
Cloud Provider Transparency: An Empirical Evaluation. 32-39 - Danny Harnik, Benny Pinkas, Alexandra Shulman-Peleg:
Side Channels in Cloud Services: Deduplication in Cloud Storage. 40-47 - José M. Alcaraz Calero
, Nigel Edwards, Johannes Kirschnick, Lawrence Wilcock, Mike Wray:
Toward a Multi-Tenancy Authorization System for Cloud Services. 48-55 - Qian Liu, Chuliang Weng, Minglu Li, Yuan Luo:
An In-VM Measuring Framework for Increasing Virtual Machine Security in Clouds. 56-62 - Paul C. Clark, Glenn R. Cook, Edward L. Fisher, John D. Fulp, Valerie Linhoff, Cynthia E. Irvine:
New Pathways in Identity Management. 64-67 - Fred H. Cate:
Government Access to Private-Sector Data. 68-71 - Joan Daemen, Vincent Rijmen
:
The First 10 Years of Advanced Encryption. 72-74 - Liam M. Mayron:
Secure Multimedia Communications. 76-79 - Marco Prandini
, Marco Ramilli, Walter Cerroni
, Franco Callegati
:
Splitting the HTTPS Stream to Attack Secure Web Connections. 80-84 - Anupam Datta:
Logical Methods in Security and Privacy. 86-89 - L. Jean Camp:
Identity Management's Misaligned Incentives. 90-94 - Daniel E. Geer Jr.:
An Index of Cybersecurity. 96

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.