default search action
IEEE Security & Privacy, Volume 11
Volume 11, Number 1, January - February 2013
- Shari Lawrence Pfleeger:
Enlightened Security: Shedding Light on What Works and Why. 3-4 - Lee Garber:
Security, Privacy, Policy, and Dependability Roundup. 6-7 - Gary McGraw:
Silver Bullet Talks with Per-Olof Persson. 8-10 - Edward Amoroso, Hugh Thompson:
A View from the C-Suite. 11-12 - Dave Martin:
Implementing Effective Controls in a Mobile, Agile, Cloud-Enabled Enterprise. 13-14 - Eric Grosse, Mayank Upadhyay:
Authentication at Scale. 15-22 - Edward Amoroso:
From the Enterprise Perimeter to a Mobility-Enabled Secure Cloud. 23-31 - Hugh Thompson:
The Human Element of Information Security. 32-35 - Lukasz Kufel:
Security Event Monitoring in a Distributed Systems Environment. 36-43 - Khaled Salah, José M. Alcaraz Calero, Sherali Zeadally, Sameera Al-Mulla, Mohammed Alzaabi:
Using Cloud Computing to Implement a Security Overlay Network. 44-53 - Aditya K. Sood, Richard J. Enbody:
Targeted Cyberattacks: A Superset of Advanced Persistent Threats. 54-61 - Steven M. Bellovin, Matt Blaze, Sandy Clark, Susan Landau:
Going Bright: Wiretapping without Weakening Communications Infrastructure. 62-72 - Alec Yasinsac, Cynthia E. Irvine:
Help! Is There a Trustworthy-Systems Doctor in the House? 73-77 - Qing Li, Greg Clark:
Mobile Security: A Look Ahead. 78-81 - Frederik J. Zuiderveen Borgesius:
Behavioral Targeting: A European Legal Perspective. 82-85 - Matthew Green:
The Threat in the Cloud. 86-89 - Alexander Kott, Curtis Arnold:
The Promises and Challenges of Continuous Monitoring and Risk Scoring. 90-93 - Daniel E. Geer Jr., Daniel G. Conway:
The Times, They Are a Changin'. 94-95 - Daniel E. Geer Jr.:
Identity as Privacy. 96
Volume 11, Number 2, March - April 2013
- Fred B. Schneider:
Breaking-in Research. 3-4 - Lee Garber:
Security, Privacy, Policy, and Dependability Roundup. 6-7 - Gary McGraw:
Silver Bullet Talks with Steve Bellovin. 8-11 - Terry V. Benzel, Steve Lipner:
Crossing the Great Divide: Transferring Security Technology from Research to the Market. 12-13 - Douglas Maughan, David M. Balenson, Ulf Lindqvist, Zachary Tudor:
Crossing the "Valley of Death": Transitioning Cybersecurity Research into Practice. 14-23 - Anita D'Amico, Brianne O'Brien, Mark Larkin:
Building a Bridge across the Transition Chasm. 24-33 - Jostein Jensen, Martin Gilje Jaatun:
Federated Identity Management - We Built It; Why Won't They Come? 34-41 - Terry C. Vickers Benzel, Eric O'Brien, Robert Rodriguez, William Arbaugh, E. John Sebes:
Crossing the Great Divide: From Research to Market. 42-46 - Bart Coppens, Bjorn De Sutter, Koen De Bosschere:
Protecting Your Software Updates. 47-54 - Anastasios N. Bikos, Nicolas Sklavos:
LTE/SAE Security Issues on 4G Wireless Networks. 55-62 - Roland L. Trope, Stephen J. Humes:
By Executive Order: Delivery of Cyber Intelligence Imparts Cyber Responsibilities. 63-67 - Anatoliy Gorbenko, Alexander B. Romanovsky:
Time-Outing Internet Services. 68-71 - Ian Koss, Richard Ford:
Authorship Is Continuous: Managing Code Plagiarism. 72-74 - Arvind Narayanan:
What Happened to the Crypto Dream?, Part 1. 75-76 - Lorrie Faith Cranor, Norman M. Sadeh:
A Shortage of Privacy Engineers. 77-79 - Adrian Hayes:
Network Service Authentication Timing Attacks. 80-82 - Sergey Bratus, Anna Shubina:
Avoiding a War on Unauthorized Computation. 83-88 - Cormac Herley:
When Does Targeting Make Sense for an Attacker? 89-92 - Alessandro Acquisti:
Complementary Perspectives on Privacy and Security: Economics. 93-95 - Bruce Schneier:
IT for Oppression. 96
Volume 11, Number 3, May / June 2013
- Jeremy Epstein:
Are All Types of Internet Voting Unsafe? 3-4 - Lee Garber:
Security, Privacy, Policy, and Dependability Roundup. 6-7 - Gary McGraw:
Silver Bullet Talks with Thomas Rid. 8-10 - Susan Landau:
Politics, Love, and Death in a World of No Privacy. 11-13 - Balachander Krishnamurthy:
Privacy and Online Social Networks: Can Colorless Green Ideas Sleep Furiously? 14-20 - Norberto Nuno Gomes de Andrade, Aaron Martin, Shara Monteleone:
"All the Better to See You with, My Dear": Facial Recognition and Privacy in Online Social Networks. 21-28 - Eszter Hargittai, Eden Litt:
New Strategies for Employment? Internet Skills and Online Privacy Practices during People's Job Search. 38-45 - Indrajeet Singh, Michael Butkiewicz, Harsha V. Madhyastha, Srikanth V. Krishnamurthy, Sateesh Addepalli:
Twitsper: Tweeting Privately. 46-50 - Jonathan Anderson, Frank Stajano:
Must Social Networking Conflict with Privacy? 51-60 - Philip Koopman, Christopher Szilagyi:
Integrity in Embedded Control Networks. 61-63 - Mark A. Gondree, Zachary N. J. Peterson, Tamara Denning:
Security through Play. 64-67 - Arvind Narayanan:
What Happened to the Crypto Dream?, Part 2. 68-71 - Travis D. Breaux, David G. Gordon:
What Engineers Should Know about US Security and Privacy Law. 72-76 - Michael Lesk:
Privateers in Cyberspace: Aargh! 81-84 - Shari Lawrence Pfleeger:
Ramsey Theory: Learning about the Needle in the Haystack. 85-87 - Steven M. Bellovin:
Military Cybersomethings. 88
Volume 11, Number 4, July - August 2013
- Fred B. Schneider:
Cybersecurity Education in Universities. 3-4 - Lee Garber:
Security, Privacy, Policy, and Dependability Roundup. 6-7 - Gary McGraw:
Silver Bullet Talks with Gary Warzala. 8-10 - Robin E. Bloomfield, Jay Lala:
Safety-Critical Systems: The Next Generation. 11-13 - Homa Alemzadeh, Ravishankar K. Iyer, Zbigniew Kalbarczyk, Jai Raman:
Analysis of Safety-Critical Computer Failures in Medical Devices. 14-26 - Sayan Mitra, Tichakorn Wongpiromsarn, Richard M. Murray:
Verifying Cyber-Physical Interactions in Safety-Critical Systems. 28-37 - Domenico Cotroneo, Roberto Natella:
Fault Injection for Software Certification. 38-45 - Thiago Mattos Rosa, Altair Olivo Santin, Andreia Malucelli:
Mitigating XML Injection 0-Day Attacks through Strategy-Based Detection Systems. 46-53 - Susan Landau:
Making Sense from Snowden: What's Significant in the NSA Surveillance Revelations. 54-63 - Jeff Stein:
The End of National Security Reporting? 64-68 - Chris Eagle:
Computer Security Competitions: Expanding Educational Outcomes. 69-71 - Alessandro Acquisti, Idris Adjerid, Laura Brandimarte:
Gone in 15 Seconds: The Limits of Privacy Transparency and Control. 72-74 - Stefan Mangard:
Keeping Secrets on Low-Cost Chips. 75-77 - Rebecca G. Bace:
Pain Management for Entrepreneurs: Working with Venture Capital. 78-81 - Stephen E. McLaughlin:
Securing Control Systems from the Inside: A Case for Mediating Physical Behaviors. 82-84 - Michael Lesk:
Big Data, Big Brother, Big Money. 85-89 - Susan Dery:
Using Whitelisting to Combat Malware Attacks at Fannie Mae. 90-92 - Rafe Sagarin:
Bio-hacking: Tapping Life's Code to Deal with Unpredictable Risk. 93-95 - Daniel E. Geer Jr.:
On Abandonment. 96
Volume 11, Number 5, September - October 2013
- Robin Bloomfield:
Open Assurance. 3-4 - Lee Garber:
Security, Privacy, Policy, and Dependability Roundup. 6-7 - Gary McGraw:
Silver Bullet Talks with Wenyuan Xu. 8-10 - Tom Kirkham, Sandra Winfield, Serge Ravet, Sampo Kellomaki:
The Personal Data Store Approach to Personal Data Security. 12-19 - Keith Harrison, Gregory B. White:
Anonymous and Distributed Community Cyberincident Detection. 20-27 - Weihan Goh, Chai Kiat Yeo:
Teaching an Old TPM New Tricks: Repurposing for Identity-Based Signatures. 28-35 - Eleanor Birrell, Fred B. Schneider:
Federated Identity Management Systems: A Privacy-Based Characterization. 36-48 - Weidong Qiu, Qian Su, Bozhong Liu, Yan Li:
iOS Data Recovery Using Low-Level NAND Images. 49-55 - Gary T. Marx:
The Public as Partner? Technology Can Make Us Auxiliaries as Well as Vigilantes. 56-61 - Boudewijn R. Haverkort:
The Dependable Systems-of-Systems Design Challenge. 62-65 - Cynthia E. Irvine:
A Cyberoperations Program. 66-69 - Ryan Calo:
Tiny Salespeople: Mediated Transactions and the Internet of Things. 70-72 - Vashek Matyas, Jirí Kur:
Conflicts between Intrusion Detection and Privacy Mechanisms for Wireless Sensor Networks. 73-76 - Jim Alves-Foss, Paul W. Oman:
The Known Unknowns. 77-79 - Jim Blythe, Ross Koppel, Sean W. Smith:
Circumvention of Security: Good Users Do Bad Things. 80-83 - Nicole B. Ellison, Jeffrey T. Hancock:
Profile as Promise: Honest and Deceptive Signals in Online Dating. 84-88 - Thomas B. Hilburn, Nancy R. Mead:
Building Security In: A Road to Competency. 89-92 - Kacper T. Gradon:
Crime Science and the Internet Battlefield: Securing the Analog World from Digital Crime. 93-95 - Bruce Schneier:
Trust in Man/Machine Security Systems. 96
Volume 11, Number 6, November - December 2013
- Shari Lawrence Pfleeger:
Focus on Policy. 3 - Gary McGraw:
Silver Bullet Talks with W. Hord Tipton. 5-7 - Lee Garber:
Security, Privacy, Policy, and Dependability Roundup. 8-9 - Kelly Caine, Michael Lesk:
Security and Privacy in Health IT. 10-11 - Mark H. Chignell, Mahsa Rouzbahman, Ryan Kealey, Reza Samavi, Erin Yu, Tammy Sieminowski:
Nonconfidential Patient Types in Emergency Clinical Decision Support. 12-18 - Michael Lesk:
Electronic Medical Records: Confidentiality, Care, and Epidemiology. 19-24 - Denise L. Anthony, Andrew T. Campbell, Thomas Candon, Andrew Gettinger, David Kotz, Lisa A. Marsch, Andres Molina-Markham, Karen Page, Sean W. Smith, Carl A. Gunter, M. Eric Johnson:
Securing Information Technology in Healthcare. 25-33 - Ginés Dólera Tormo, Félix Gómez Mármol, João Girão, Gregorio Martínez Pérez:
Identity Management-In Privacy We Trust: Bridging the Trust Gap in eHealth Environments. 34-41 - Deborah C. Peel, Deven McGraw:
Point/Counterpoint. 42-44 - Abdulghani Ali Ahmed, Aman Jantan, Tat Chee Wan:
Real-Time Detection of Intrusive Traffic in QoS Network Domains. 45-53 - Sanmeet Kaur, Maninder Singh:
Automatic Attack Signature Generation Systems: A Review. 54-61 - Paulo Jorge Esteves Veríssimo, Alysson Neves Bessani:
E-biobanking: What Have You Done to My Cell Samples? 62-65 - Andrew D. McGettrick:
Toward Effective Cybersecurity Education. 66-68 - Heather Dewey-Hagborg:
Stranger Visions: A Provocation. 69-70 - Jean-Michel Cioranesco, Houda Ferradi, David Naccache:
Communicating Covertly through CPU Monitoring. 71-73 - Alvaro A. Cárdenas, Pratyusa K. Manadhata, Sreeranga P. Rajan:
Big Data Analytics for Security. 74-76 - Michael Lesk:
The Old Is New Again. 77-79 - Nancy R. Mead, Thomas B. Hilburn:
Building Security In: Preparing for a Software Security Career. 80-83 - Harvey Molotch:
Everyday Security: Default to Decency. 84-87 - Steven M. Bellovin:
Walls and Gates. 88
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.