@Preamble{
"\ifx \undefined \booktitle \def \booktitle #1{{{\em #1}}} \fi" #
"\ifx \undefined \circled \def \circled #1{(#1)} \fi" #
"\ifx \undefined \ocirc \def \ocirc #1{{\accent'27#1}} \fi" #
"\ifx \undefined \pkg \def \pkg #1{{{\tt #1}}} \fi" #
"\ifx \undefined \reg \def \reg {\circled{R}} \fi" #
"\ifx \undefined \r \let \r = \ocirc \fi"
}
@String{ack-nhfb = "Nelson H. F. Beebe,
University of Utah,
Department of Mathematics, 110 LCB,
155 S 1400 E RM 233,
Salt Lake City, UT 84112-0090, USA,
Tel: +1 801 581 5254,
FAX: +1 801 581 4148,
e-mail: \path|beebe@math.utah.edu|,
\path|beebe@acm.org|,
\path|beebe@computer.org| (Internet),
URL: \path|https://www.math.utah.edu/~beebe/|"}
@String{j-IEEE-SEC-PRIV = "IEEE Security \& Privacy"}
@String{pub-PEARSON-EDUCATION = "Pearson Education"}
@String{pub-PEARSON-EDUCATION:adr = "Upper Saddle River, NJ, USA"}
@String{pub-PHPTR = "Pren{\-}tice-Hall PTR"}
@String{pub-PHPTR:adr = "Upper Saddle River, NJ 07458, USA"}
@Article{Cybenko:2003:CNA,
author = "George Cybenko",
title = "A Critical Need, An Ambitious Mission, a New
Magazine",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "1",
pages = "5--9",
month = jan # "\slash " # feb,
year = "2003",
CODEN = "????",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Apr 3 18:46:48 MST 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://www.computer.org/security/j1005.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Miller:2003:LBL,
author = "Sandra Kay Miller",
title = "Legal Battle Looming for {Internet} Protections Acts",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "1",
pages = "10--12",
month = jan # "\slash " # feb,
year = "2003",
CODEN = "????",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Apr 3 18:46:48 MST 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://dlib.computer.org/sp/books/sp2003/pdf/j1010.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Andresen:2003:NDS,
author = "Scott L. Andresen",
title = "New Draft to Secure Cyberspace Leaked",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "1",
pages = "13--13",
month = jan # "\slash " # feb,
year = "2003",
CODEN = "????",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Apr 3 18:46:48 MST 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://dlib.computer.org/sp/books/sp2003/pdf/j1013.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Garfinkel:2003:RDP,
author = "Simson L. Garfinkel and Abhi Shelat",
title = "Remembrance of Data Passed: a Study of Disk
Sanitization Practices",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "1",
pages = "17--27",
month = jan # "\slash " # feb,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2003.1176992",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Apr 3 18:46:48 MST 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://dlib.computer.org/sp/books/sp2003/pdf/j1017.pdf;
http://www.computer.org/security/j1017abs.htm",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Petroni:2003:DMS,
author = "Nick L. {Petroni, Jr.} and William A. Arbaugh",
title = "The Dangers of Mitigating Security Design Flaws: a
Wireless Case Study",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "1",
pages = "28--36",
month = jan # "\slash " # feb,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2003.1176993",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Apr 3 18:46:48 MST 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://dlib.computer.org/sp/books/sp2003/pdf/j1028.pdf;
http://www.computer.org/security/j1028abs.htm",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Cowan:2003:SSO,
author = "Crispin Cowan",
title = "Software Security for Open-Source Systems",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "1",
pages = "38--45",
month = jan # "\slash " # feb,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2003.1176994",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Apr 3 18:46:48 MST 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://dlib.computer.org/sp/books/sp2003/pdf/j1038.pdf;
http://www.computer.org/security/j1038abs.htm",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Haines:2003:VSA,
author = "Joshua Haines and Dorene Kewley Ryder and Laura Tinnel
and Stephen Taylor",
title = "Validation of Sensor Alert Correlators",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "1",
pages = "46--56",
month = jan # "\slash " # feb,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2003.1176995",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Apr 3 18:46:48 MST 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://dlib.computer.org/sp/books/sp2003/pdf/j1046.pdf;
http://www.computer.org/security/j1046abs.htm",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Howard:2003:IWS,
author = "Michael Howard and Steve Lipner",
title = "Inside the {Windows} Security Push",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "1",
pages = "57--61",
month = jan # "\slash " # feb,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2003.1176996",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Apr 3 18:46:48 MST 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://dlib.computer.org/sp/books/sp2003/pdf/j1057.pdf;
http://www.computer.org/security/j1057abs.htm",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Donner:2003:ABM,
author = "Marc Donner",
title = "{AI} Bites Man?",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "1",
pages = "63--66",
month = jan # "\slash " # feb,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2003.1176997",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Apr 3 18:46:48 MST 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://dlib.computer.org/sp/books/sp2003/pdf/j1063.pdf;
http://www.computer.org/security/j1063abs.htm",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Bishop:2003:WCS,
author = "Matt Bishop",
title = "What Is Computer Security?",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "1",
pages = "67--69",
month = jan # "\slash " # feb,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2003.1176998",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Apr 3 18:46:48 MST 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://dlib.computer.org/sp/books/sp2003/pdf/j1067.pdf;
http://www.computer.org/security/j1067abs.htm",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Ryan:2003:TVS,
author = "Daniel J. Ryan",
title = "Two Views on Security Software Liability: Let the
Legal System Decide",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "1",
pages = "70--72",
month = jan # "\slash " # feb,
year = "2003",
CODEN = "????",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Apr 3 18:46:48 MST 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://dlib.computer.org/sp/books/sp2003/pdf/j1070.pdf;
http://www.computer.org/security/j1070abs.htm",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Heckman:2003:TVS,
author = "Carey Heckman",
title = "Two Views on Security Software Liability: Using the
Right Legal Tools",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "1",
pages = "73--75",
month = jan # "\slash " # feb,
year = "2003",
CODEN = "????",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Apr 3 18:46:48 MST 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://dlib.computer.org/sp/books/sp2003/pdf/j1073.pdf;
http://www.computer.org/security/j1073abs.htm",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Lesk:2003:CEE,
author = "Michael Lesk",
title = "Copyright Extension: {Eldred} v. {Ashcroft}",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "1",
pages = "76--78",
month = jan # "\slash " # feb,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2003.1177000",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Apr 3 18:46:48 MST 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://dlib.computer.org/sp/books/sp2003/pdf/j1076.pdf;
http://www.computer.org/security/j1076abs.htm",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Hearn:2003:IPC,
author = "Jim Hearn",
title = "International Participation: The Continuing March
Toward Security and Privacy",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "1",
pages = "79--81",
month = jan # "\slash " # feb,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2003.1177001",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Apr 3 18:46:48 MST 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://dlib.computer.org/sp/books/sp2003/pdf/j1079.pdf;
http://www.computer.org/security/j1079abs.htm",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Arce:2003:ASW,
author = "Iv{\'a}n Arce and Elias Levy",
title = "An Analysis of the {Slapper Worm}",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "1",
pages = "82--87",
month = jan # "\slash " # feb,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2003.1177002",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Apr 3 18:46:48 MST 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://dlib.computer.org/sp/books/sp2003/pdf/j1082.pdf;
http://www.computer.org/security/j1082abs.htm",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Smith:2003:FDS,
author = "S. W. Smith",
title = "Fairy Dust, Secrets, and the Real World",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "1",
pages = "89--93",
month = jan # "\slash " # feb,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2003.1177003",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Apr 3 18:46:48 MST 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://dlib.computer.org/sp/books/sp2003/pdf/j1089.pdf;
http://www.computer.org/security/j1089abs.htm",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Stytz:2003:SPS,
author = "Martin R. Stytz and James A. Whittaker",
title = "Software Protection: Security's Last Stand?",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "1",
pages = "95--98",
month = jan # "\slash " # feb,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2003.1177004",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Apr 3 18:46:48 MST 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://dlib.computer.org/sp/books/sp2003/pdf/j1095.pdf;
http://www.computer.org/security/j1095abs.htm",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Caloyannides:2003:PVI,
author = "Michael Caloyannides",
title = "Privacy vs. Information Technology",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "1",
pages = "100--103",
month = jan # "\slash " # feb,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2003.1177005",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Apr 3 18:46:48 MST 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://dlib.computer.org/sp/books/sp2003/pdf/j1100.pdf;
http://www.computer.org/security/j1100abs.htm",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Schneier:2003:WAS,
author = "Bruce Schneier",
title = "We Are All Security Consumers",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "1",
pages = "104--104",
month = jan # "\slash " # feb,
year = "2003",
CODEN = "????",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Apr 3 18:46:48 MST 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://dlib.computer.org/sp/books/sp2003/pdf/j1104.pdf;
http://www.computer.org/security/j1104abs.htm",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Cybenko:2003:ESS,
author = "George Cybenko",
title = "From the {Editor}: {Sapphire\slash Slammer} Redux",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "2",
pages = "6--6",
month = mar # "\slash " # apr,
year = "2003",
CODEN = "????",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Apr 3 19:00:16 MST 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://dlib.computer.org/sp/books/sp2003/pdf/j2006.pdf;
http://www.computer.org/security/j2006abs.htm",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Anonymous:2003:LEa,
author = "Anonymous",
title = "Letters to the {Editor}",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "2",
pages = "7--10",
month = mar # "\slash " # apr,
year = "2003",
CODEN = "????",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Apr 3 19:00:16 MST 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
note = "See erratum \cite{Anonymous:2003:EHV}.",
URL = "http://dlib.computer.org/sp/books/sp2003/pdf/j2007.pdf;
http://www.computer.org/security/j2007abs.htm",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Dern:2003:PC,
author = "Daniel P. Dern",
title = "Privacy Concerns",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "2",
pages = "11--13",
month = mar # "\slash " # apr,
year = "2003",
CODEN = "????",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Apr 3 19:00:16 MST 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://dlib.computer.org/sp/books/sp2003/pdf/j2011.pdf;
http://www.computer.org/security/j2011abs.htm",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Spitzner:2003:HPT,
author = "Lance Spitzner",
title = "The {Honeynet Project}: Trapping the Hackers",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "2",
pages = "15--23",
month = mar # "\slash " # apr,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2003.1193207",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Apr 3 19:00:16 MST 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://dlib.computer.org/sp/books/sp2003/pdf/j2015.pdf;
http://www.computer.org/security/j2015abs.htm",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Blaze:2003:RAM,
author = "Matt Blaze",
title = "Rights Amplification in Master-Keyed Mechanical
Locks",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "2",
pages = "24--32",
month = mar # "\slash " # apr,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2003.1193208",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Apr 3 19:00:16 MST 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://dlib.computer.org/sp/books/sp2003/pdf/j2024.pdf;
http://www.computer.org/security/j2024abs.htm",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Prabhakar:2003:BRS,
author = "Salil Prabhakar and Sharath Pankanti and Anil K.
Jain",
title = "Biometric Recognition: Security and Privacy Concerns",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "2",
pages = "33--42",
month = mar # "\slash " # apr,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2003.1193209",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Apr 3 19:00:16 MST 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://dlib.computer.org/sp/books/sp2003/pdf/j2033.pdf;
http://www.computer.org/security/j2033abs.htm",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Burr:2003:SAE,
author = "William E. Burr",
title = "Selecting the {Advanced Encryption Standard}",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "2",
pages = "43--52",
month = mar # "\slash " # apr,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2003.1193210",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Apr 3 19:00:16 MST 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://dlib.computer.org/sp/books/sp2003/pdf/j2043.pdf;
http://www.computer.org/security/j2043abs.htm",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Donner:2003:PAN,
author = "Marc Donner",
title = "Post-Apocalypse Now",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "2",
pages = "53--55",
month = mar # "\slash " # apr,
year = "2003",
CODEN = "????",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Apr 3 19:00:16 MST 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://dlib.computer.org/sp/books/sp2003/pdf/j2053.pdf;
http://www.computer.org/security/j2053abs.htm",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Davis:2003:TSD,
author = "Jim Davis and Melissa Dark",
title = "Teaching Students to Design Secure Systems",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "2",
pages = "56--58",
month = mar # "\slash " # apr,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2003.1193212",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Apr 3 19:00:16 MST 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://dlib.computer.org/sp/books/sp2003/pdf/j2056.pdf;
http://www.computer.org/security/j2056abs.htm",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{McGraw:2003:GDS,
author = "Gary McGraw",
title = "From the Ground Up: The {DIMACS Software Security
Workshop}",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "2",
pages = "59--66",
month = mar # "\slash " # apr,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2003.1193213",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Apr 3 19:00:16 MST 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
note = "See erratum \cite{Anonymous:2003:EHV}.",
URL = "http://dlib.computer.org/sp/books/sp2003/pdf/j2059.pdf;
http://www.computer.org/security/j2059abs.htm",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Lesk:2003:CEC,
author = "Michael Lesk",
title = "Copyright Enforcement or Censorship: New Uses for the
{DMCA}?",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "2",
pages = "67--69",
month = mar # "\slash " # apr,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2003.1193214",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Apr 3 19:00:16 MST 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://dlib.computer.org/sp/books/sp2003/pdf/j2067.pdf;
http://www.computer.org/security/j2067abs.htm",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Hearn:2003:MF,
author = "Jim Hearn",
title = "Moving Forward?",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "2",
pages = "70--71",
month = mar # "\slash " # apr,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2003.1193215",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Apr 3 19:00:16 MST 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://dlib.computer.org/sp/books/sp2003/pdf/j2070.pdf;
http://www.computer.org/security/j2070abs.htm",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Arce:2003:WLR,
author = "Iv{\'a}n Arce",
title = "The Weakest Link Revisited",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "2",
pages = "72--76",
month = mar # "\slash " # apr,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2003.1193216",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Apr 3 19:00:16 MST 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://dlib.computer.org/sp/books/sp2003/pdf/j2072.pdf;
http://www.computer.org/security/j2072abs.htm",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Ball:2003:PPE,
author = "Edward Ball and David W. Chadwick and Darren Mundy",
title = "Patient Privacy in Electronic Prescription Transfer",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "2",
pages = "77--80",
month = mar # "\slash " # apr,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2003.1193217",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Apr 3 19:00:16 MST 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://dlib.computer.org/sp/books/sp2003/pdf/j2077.pdf;
http://www.computer.org/security/j2077abs.htm",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Whittaker:2003:WSA,
author = "James Whittaker",
title = "Why Secure Applications Are Difficult to Write",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "2",
pages = "81--83",
month = mar # "\slash " # apr,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2003.1193218",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Apr 3 19:00:16 MST 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://dlib.computer.org/sp/books/sp2003/pdf/j2081.pdf;
http://www.computer.org/security/j2081abs.htm",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Caloyannides:2003:ESC,
author = "Michael A. Caloyannides",
title = "Engineering or Sloganeering? The Counterattack on
Privacy",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "2",
pages = "84--87",
month = mar # "\slash " # apr,
year = "2003",
CODEN = "????",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Apr 3 19:00:16 MST 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://dlib.computer.org/sp/books/sp2003/pdf/j2084.pdf;
http://www.computer.org/security/j2084abs.htm",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Schneier:2003:LFD,
author = "Bruce Schneier",
title = "Locks and Full Disclosure",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "2",
pages = "88--88",
month = mar # "\slash " # apr,
year = "2003",
CODEN = "????",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Apr 3 19:00:16 MST 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://dlib.computer.org/sp/books/sp2003/pdf/j2088.pdf;
http://www.computer.org/security/j2088abs.htm",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Donner:2003:TSO,
author = "Marc Donner",
title = "Toward a Security Ontology",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "3",
pages = "6--7",
month = may # "\slash " # jun,
year = "2003",
CODEN = "????",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Sat Jun 14 14:56:19 MDT 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://dlib.computer.org/sp/books/sp2003/pdf/j3006.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Anonymous:2003:EHV,
author = "Anonymous",
title = "Errata: {``On the Horizon'' (vol. 1, no. 2)} and
{``Interface'' (vol. 1, no. 2, p. 9)}",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "3",
pages = "7--7",
month = may # "\slash " # jun,
year = "2003",
CODEN = "????",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Sat Jun 14 14:56:19 MDT 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
note = "See \cite{McGraw:2003:GDS,Anonymous:2003:LEa}.",
URL = "http://dlib.computer.org/sp/books/sp2003/pdf/j3008.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Anonymous:2003:N,
author = "Anonymous",
title = "News",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "3",
pages = "8--13",
month = may # "\slash " # jun,
year = "2003",
CODEN = "????",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Sat Jun 14 14:56:19 MDT 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://dlib.computer.org/sp/books/sp2003/pdf/j3008.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Mead:2003:BF,
author = "Nancy R. Mead",
title = "Building a Foundation",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "3",
pages = "14--14",
month = may # "\slash " # jun,
year = "2003",
CODEN = "????",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Sat Jun 14 14:56:19 MDT 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://dlib.computer.org/sp/books/sp2003/pdf/j3014.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Ishitani:2003:MBA,
author = "Lucila Ishitani and Virgilio Almeida and Wagner
{Meira, Jr.}",
title = "Masks: Bringing Anonymity and Personalization
Together",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "3",
pages = "18--23",
month = may # "\slash " # jun,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2003.1203218",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Sat Jun 14 14:56:19 MDT 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://dlib.computer.org/sp/books/sp2003/pdf/j3018.pdf;
http://www.computer.org/security/j3018abs.htm",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Aljifri:2003:ITN,
author = "Hassan Aljifri",
title = "{IP} Traceback: a New Denial-of-Service Deterrent?",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "3",
pages = "24--31",
month = may # "\slash " # jun,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2003.1203219",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Sat Jun 14 14:56:19 MDT 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://dlib.computer.org/sp/books/sp2003/pdf/j3024.pdf;
http://www.computer.org/security/j3024abs.htm",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Provos:2003:HSI,
author = "Niels Provos and Peter Honeyman",
title = "Hide and Seek: An Introduction to Steganography",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "3",
pages = "32--44",
month = may # "\slash " # jun,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2003.1203220",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Sat Jun 14 14:56:19 MDT 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://dlib.computer.org/sp/books/sp2003/pdf/j3032.pdf;
http://www.computer.org/security/j3032abs.htm",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Matyas:2003:TRU,
author = "V{\'a}clav {Maty{\'a}s, Jr.} and Zdenek Riha",
title = "Toward Reliable User Authentication through
Biometrics",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "3",
pages = "45--49",
month = may # "\slash " # jun,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2003.1203221",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Sat Jun 14 14:56:19 MDT 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://dlib.computer.org/sp/books/sp2003/pdf/j3045.pdf;
http://www.computer.org/security/j3045abs.htm",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Donner:2003:HR,
author = "Marc Donner",
title = "Hey, Robot!",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "3",
pages = "51--55",
month = may # "\slash " # jun,
year = "2003",
CODEN = "????",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Sat Jun 14 14:56:19 MDT 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://dlib.computer.org/sp/books/sp2003/pdf/j3051.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Frincke:2003:WWS,
author = "Deborah Frincke",
title = "Who Watches the Security Educators?",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "3",
pages = "56--58",
month = may # "\slash " # jun,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2003.1203223",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Sat Jun 14 14:56:19 MDT 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://dlib.computer.org/sp/books/sp2003/pdf/j3056.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Felten:2003:UTC,
author = "Edward W. Felten",
title = "Understanding Trusted Computing: Will Its Benefits
Outweigh Its Drawbacks?",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "3",
pages = "60--62",
month = may # "\slash " # jun,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2003.1203224",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Sat Jun 14 14:56:19 MDT 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://dlib.computer.org/sp/books/sp2003/pdf/j3060.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Lesk:2003:GBU,
author = "Michael Lesk",
title = "The Good, the Bad, and the Ugly: What Might Change if
We Had Good {DRM}",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "3",
pages = "63--66",
month = may # "\slash " # jun,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2003.1203225",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Sat Jun 14 14:56:19 MDT 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://dlib.computer.org/sp/books/sp2003/pdf/j3063.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Hearn:2003:SD,
author = "Jim Hearn",
title = "Slow Dancing",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "3",
pages = "67--68",
month = may # "\slash " # jun,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2003.1203226",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Sat Jun 14 14:56:19 MDT 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://dlib.computer.org/sp/books/sp2003/pdf/j3067.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Levy:2003:PSS,
author = "Elias Levy",
title = "Poisoning the Software Supply Chain",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "3",
pages = "70--73",
month = may # "\slash " # jun,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2003.1203227",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Sat Jun 14 14:56:19 MDT 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://dlib.computer.org/sp/books/sp2003/pdf/j3070.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Smith:2003:HLH,
author = "S. W. Smith",
title = "Humans in the Loop: Human-Computer Interaction and
Security",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "3",
pages = "75--79",
month = may # "\slash " # jun,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2003.1203228",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Sat Jun 14 14:56:19 MDT 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://dlib.computer.org/sp/books/sp2003/pdf/j3075.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Stytz:2003:CSW,
author = "Martin R. Stytz",
title = "The Case for Software Warranties",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "3",
pages = "80--82",
month = may # "\slash " # jun,
year = "2003",
CODEN = "????",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Sat Jun 14 14:56:19 MDT 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://dlib.computer.org/sp/books/sp2003/pdf/j3080.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Caloyannides:2003:SCF,
author = "Michael A. Caloyannides",
title = "Society Cannot Function Without Privacy",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "3",
pages = "84--86",
month = may # "\slash " # jun,
year = "2003",
CODEN = "????",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Sat Jun 14 14:56:19 MDT 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://dlib.computer.org/sp/books/sp2003/pdf/j3084.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Schneier:2003:GUP,
author = "Bruce Schneier",
title = "Guilty Until Proven Innocent?",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "3",
pages = "88, 87",
month = may # "\slash " # jun,
year = "2003",
CODEN = "????",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Sat Jun 14 14:56:19 MDT 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://dlib.computer.org/sp/books/sp2003/pdf/j3088.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Landwehr:2003:ESC,
author = "Carl E. Landwehr",
title = "From the {Editor}: Security Cosmology: Moving from
{Big Bang} to Worlds in Collusion",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "5",
pages = "5--5",
month = sep # "\slash " # oct,
year = "2003",
CODEN = "????",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Oct 9 07:39:10 MDT 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2003/05/j5005.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Anonymous:2003:SPW,
author = "Anonymous",
title = "{Security and Privacy} Welcomes New {Editorial Board}
Members",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "5",
pages = "6--7",
month = sep # "\slash " # oct,
year = "2003",
CODEN = "????",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Oct 9 07:39:10 MDT 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2003/05/j5006.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Goth:2003:Na,
author = "Greg Goth and Sandra Kay Miller",
title = "News",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "5",
pages = "8--11",
month = sep # "\slash " # oct,
year = "2003",
CODEN = "????",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Oct 9 07:39:10 MDT 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2003/05/j5008.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Andresen:2003:NB,
author = "Scott L. Andresen",
title = "News Briefs",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "5",
pages = "12--13",
month = sep # "\slash " # oct,
year = "2003",
CODEN = "????",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Oct 9 07:39:10 MDT 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2003/05/j5012.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Anonymous:2003:LEb,
author = "Anonymous",
title = "Letters to the Editor",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "5",
pages = "14--14",
month = sep # "\slash " # oct,
year = "2003",
CODEN = "????",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Oct 9 07:39:10 MDT 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2003/05/j5014.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Campbell:2003:CSI,
author = "Robert J. Campbell",
title = "Crime Scene Investigators: The Next Generation",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "5",
pages = "15--15",
month = sep # "\slash " # oct,
year = "2003",
CODEN = "????",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Oct 9 07:39:10 MDT 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2003/05/j5015.pdf;
http://csdl.computer.org/comp/mags/sp/2003/05/j5015abs.htm",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{McGrath:2003:MEP,
author = "Dennis McGrath",
title = "Measuring the 4:11 Effect: The Power Failure and the
{Internet}",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "5",
pages = "16--18",
month = sep # "\slash " # oct,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2003.1236230",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Oct 9 07:39:10 MDT 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2003/05/j5016abs.htm;
http://csdl.computer.org/dl/mags/sp/2003/05/j5016.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Amin:2003:NAE,
author = "Massoud Amin",
title = "{North America}'s Electricity Infrastructure: Are We
Ready for More Perfect Storms?",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "5",
pages = "19--25",
month = sep # "\slash " # oct,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2003.1236231",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Oct 9 07:39:10 MDT 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2003/05/j5019abs.htm;
http://csdl.computer.org/dl/mags/sp/2003/05/j5019.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Capek:2003:MCE,
author = "Peter G. Capek and David M. Chess and Steve R. White",
title = "{Merry Christma}: An Early Network Worm",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "5",
pages = "26--34",
month = sep # "\slash " # oct,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2003.1236232",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Oct 9 07:39:10 MDT 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2003/05/j5026abs.htm;
http://csdl.computer.org/dl/mags/sp/2003/05/j5026.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Orman:2003:MWF,
author = "Hilarie Orman",
title = "The {Morris} Worm: a Fifteen-Year Perspective",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "5",
pages = "35--43",
month = sep # "\slash " # oct,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2003.1236233",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Oct 9 07:39:10 MDT 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2003/05/j5035abs.htm;
http://csdl.computer.org/dl/mags/sp/2003/05/j5035.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Oppliger:2003:DED,
author = "Rolf Oppliger and Ruedi Rytz",
title = "Digital Evidence: Dream and Reality",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "5",
pages = "44--48",
month = sep # "\slash " # oct,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2003.1236234",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Oct 9 07:39:10 MDT 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2003/05/j5044abs.htm;
http://csdl.computer.org/dl/mags/sp/2003/05/j5044.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Hariri:2003:IAF,
author = "Salim Hariri and Guangzhi Qu and Tushneem Dharmagadda
and Modukuri Ramkishore and Cauligi S. Raghavendra",
title = "Impact Analysis of Faults and Attacks in Large-Scale
Networks",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "5",
pages = "49--54",
month = sep # "\slash " # oct,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2003.1236235",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Oct 9 07:39:10 MDT 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2003/05/j5049abs.htm;
http://csdl.computer.org/dl/mags/sp/2003/05/j5049.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Schneider:2003:LPM,
author = "Fred B. Schneider",
title = "Least Privilege and More",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "5",
pages = "55--59",
month = sep # "\slash " # oct,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2003.1236236",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Oct 9 07:39:10 MDT 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2003/05/j5055abs.htm;
http://csdl.computer.org/dl/mags/sp/2003/05/j5055.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Lenarcic:2003:DBT,
author = "John Lenarcic",
title = "The Dinosaur and the Butterfly: a Tale of Computer
Ethics",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "5",
pages = "61--63",
month = sep # "\slash " # oct,
year = "2003",
CODEN = "????",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Oct 9 07:39:10 MDT 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2003/05/j5061abs.htm;
http://csdl.computer.org/dl/mags/sp/2003/05/j5061.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Ragsdale:2003:IAW,
author = "Dan Ragsdale and Don Welch and Ron Dodge",
title = "Information Assurance the {West Point} Way",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "5",
pages = "64--67",
month = sep # "\slash " # oct,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2003.1236238",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Oct 9 07:39:10 MDT 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2003/05/j5064abs.htm;
http://csdl.computer.org/dl/mags/sp/2003/05/j5064.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Mead:2003:SFH,
author = "Nancy R. Mead",
title = "{SEHAS 2003}: The Future of High-Assurance Systems",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "5",
pages = "68--72",
month = sep # "\slash " # oct,
year = "2003",
CODEN = "????",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Oct 9 07:39:10 MDT 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2003/05/j5068abs.htm;
http://csdl.computer.org/dl/mags/sp/2003/05/j5068.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Lesk:2003:CLR,
author = "Michael Lesk",
title = "{Chicken Little} and the Recorded Music Crisis",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "5",
pages = "73--75",
month = sep # "\slash " # oct,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2003.1236239",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Oct 9 07:39:10 MDT 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2003/05/j5073abs.htm;
http://csdl.computer.org/dl/mags/sp/2003/05/j5073.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Hearn:2003:WW,
author = "Jim Hearn",
title = "What Works?",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "5",
pages = "76--77",
month = sep # "\slash " # oct,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2003.1236240",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Oct 9 07:39:10 MDT 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2003/05/j5076abs.htm;
http://csdl.computer.org/dl/mags/sp/2003/05/j5076.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Arce:2003:RG,
author = "Iv{\'a}n Arce",
title = "The Rise of the Gadgets",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "5",
pages = "78--81",
month = sep # "\slash " # oct,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2003.1236241",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Oct 9 07:39:10 MDT 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2003/05/j5078abs.htm;
http://csdl.computer.org/dl/mags/sp/2003/05/j5078.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Camp:2003:AD,
author = "Jean Camp",
title = "Access Denied",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "5",
pages = "82--85",
month = sep # "\slash " # oct,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2003.1236242",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Oct 9 07:39:10 MDT 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2003/05/j5082abs.htm;
http://csdl.computer.org/dl/mags/sp/2003/05/j5082.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Stytz:2003:CPC,
author = "Martin Stytz and James A. Whittaker",
title = "Caution: This Product Contains Security Code",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "5",
pages = "86--88",
month = sep # "\slash " # oct,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2003.1236243",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Oct 9 07:39:10 MDT 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2003/05/j5086abs.htm;
http://csdl.computer.org/dl/mags/sp/2003/05/j5086.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{McCarty:2003:AIT,
author = "Bill McCarty",
title = "Automated Identity Theft",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "5",
pages = "89--92",
month = sep # "\slash " # oct,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2003.1236244",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Oct 9 07:39:10 MDT 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2003/05/j5089abs.htm;
http://csdl.computer.org/dl/mags/sp/2003/05/j5089.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Caloyannides:2003:KOC,
author = "Michael Caloyannides",
title = "Keeping Offline Computer Usage Private",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "5",
pages = "93--95",
month = sep # "\slash " # oct,
year = "2003",
CODEN = "????",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Oct 9 07:39:10 MDT 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2003/05/j5093abs.htm;
http://csdl.computer.org/dl/mags/sp/2003/05/j5093.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Cybenko:2003:EPI,
author = "George Cybenko",
title = "From the {Editors}: Privacy Is the Issue",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "6",
pages = "5--7",
month = nov # "\slash " # dec,
year = "2003",
CODEN = "????",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jan 27 18:07:01 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2003/06/j6005.pdf;
http://csdl.computer.org/comp/mags/sp/2003/06/j6005abs.htm;
http://csdl.computer.org/dl/mags/sp/2003/06/j6005.htm",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Goth:2003:Nb,
author = "Greg Goth and Benjamin J. Alfonsi",
title = "News",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "6",
pages = "8--13",
month = nov # "\slash " # dec,
year = "2003",
CODEN = "????",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jan 27 18:07:01 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2003/06/j6008abs.htm;
http://csdl.computer.org/dl/mags/sp/2003/06/j6008.htm;
http://csdl.computer.org/dl/mags/sp/2003/06/j6008.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Geer:2003:M,
author = "Daniel E. {Geer, Jr.} and Dave Aucsmith and James A.
Whittaker",
title = "Monoculture",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "6",
pages = "14--17",
month = nov # "\slash " # dec,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2003.1253563",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jan 27 18:07:01 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2003/06/j6014abs.htm;
http://csdl.computer.org/dl/mags/sp/2003/06/j6014.htm;
http://csdl.computer.org/dl/mags/sp/2003/06/j6014.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Garfinkel:2003:EBI,
author = "Simson L. Garfinkel",
title = "Email-Based Identification and Authentication: An
Alternative to {PKI}?",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "6",
pages = "20--26",
month = nov # "\slash " # dec,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2003.1253564",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jan 27 18:07:01 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2003/06/j6020abs.htm;
http://csdl.computer.org/dl/mags/sp/2003/06/j6020.htm;
http://csdl.computer.org/dl/mags/sp/2003/06/j6020.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Agrawal:2003:MAD,
author = "Dakshi Agrawal and Dogan Kesdogan",
title = "Measuring Anonymity: The Disclosure Attack",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "6",
pages = "27--34",
month = nov # "\slash " # dec,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2003.1253565",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jan 27 18:07:01 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2003/06/j6027abs.htm;
http://csdl.computer.org/dl/mags/sp/2003/06/j6027.htm;
http://csdl.computer.org/dl/mags/sp/2003/06/j6027.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Seigneur:2003:PRD,
author = "Jean-Marc Seigneur and Christian Damsgaard Jensen",
title = "Privacy Recovery with Disposable Email Addresses",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "6",
pages = "35--39",
month = nov # "\slash " # dec,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2003.1253566",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jan 27 18:07:01 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2003/06/j6035abs.htm;
http://csdl.computer.org/dl/mags/sp/2003/06/j6035.htm;
http://csdl.computer.org/dl/mags/sp/2003/06/j6035.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Rezgui:2003:PWF,
author = "Abdelmounaam Rezgui and Athman Bouguettaya and Mohamed
Y. Eltoweissy",
title = "Privacy on the {Web}: Facts, Challenges, and
Solutions",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "6",
pages = "40--49",
month = nov # "\slash " # dec,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2003.1253567",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jan 27 18:07:01 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2003/06/j6040abs.htm;
http://csdl.computer.org/dl/mags/sp/2003/06/j6040.htm;
http://csdl.computer.org/dl/mags/sp/2003/06/j6040.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Cranor:2003:PMP,
author = "Lorrie Faith Cranor",
title = "{P3P}: Making Privacy Policies More Useful",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "6",
pages = "50--55",
month = nov # "\slash " # dec,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2003.1253568",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jan 27 18:07:01 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2003/06/j6050abs.htm;
http://csdl.computer.org/dl/mags/sp/2003/06/j6050.htm;
http://csdl.computer.org/dl/mags/sp/2003/06/j6050.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Quarterman:2003:UIG,
author = "John S. Quarterman",
title = "The Ultimate in Instant Gratification",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "6",
pages = "56--58",
month = nov # "\slash " # dec,
year = "2003",
CODEN = "????",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jan 27 18:07:01 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2003/06/j6056abs.htm;
http://csdl.computer.org/dl/mags/sp/2003/06/j6056.htm;
http://csdl.computer.org/dl/mags/sp/2003/06/j6056.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Irvine:2003:TCS,
author = "Cynthia E. Irvine",
title = "Teaching Constructive Security",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "6",
pages = "59--61",
month = nov # "\slash " # dec,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2003.1253570",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jan 27 18:07:01 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2003/06/j6059abs.htm;
http://csdl.computer.org/dl/mags/sp/2003/06/j6059.htm;
http://csdl.computer.org/dl/mags/sp/2003/06/j6059.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Wing:2003:CAL,
author = "Jeannette M. Wing",
title = "A Call to Action: Look Beyond the Horizon",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "6",
pages = "62--67",
month = nov # "\slash " # dec,
year = "2003",
CODEN = "????",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jan 27 18:07:01 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2003/06/j6062abs.htm;
http://csdl.computer.org/dl/mags/sp/2003/06/j6062.htm;
http://csdl.computer.org/dl/mags/sp/2003/06/j6062.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Lesk:2003:FFI,
author = "Michael Lesk",
title = "Feist and Facts: If Data Is Protected, Will It Be More
or Less Available?",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "6",
pages = "68--70",
month = nov # "\slash " # dec,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2003.1253572",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jan 27 18:07:01 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2003/06/j6068abs.htm;
http://csdl.computer.org/dl/mags/sp/2003/06/j6068.htm;
http://csdl.computer.org/dl/mags/sp/2003/06/j6068.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Levy:2003:COP,
author = "Elias Levy",
title = "Crossover: Online Pests Plaguing the Offline World",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "6",
pages = "71--73",
month = nov # "\slash " # dec,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2003.1253573",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jan 27 18:07:01 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2003/06/j6071abs.htm;
http://csdl.computer.org/dl/mags/sp/2003/06/j6071.htm;
http://csdl.computer.org/dl/mags/sp/2003/06/j6071.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Smith:2003:FTH,
author = "S. W. Smith and Jothy Rosenberg and Adam Golodner",
title = "A Funny Thing Happened on the Way to the Marketplace",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "6",
pages = "74--78",
month = nov # "\slash " # dec,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2003.1253574",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jan 27 18:07:01 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2003/06/j6074abs.htm;
http://csdl.computer.org/dl/mags/sp/2003/06/j6074.htm;
http://csdl.computer.org/dl/mags/sp/2003/06/j6074.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{McCarty:2003:HAR,
author = "Bill McCarty",
title = "The {Honeynet} Arms Race",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "6",
pages = "79--82",
month = nov # "\slash " # dec,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2003.1253575",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jan 27 18:07:01 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2003/06/j6079abs.htm;
http://csdl.computer.org/dl/mags/sp/2003/06/j6079.htm;
http://csdl.computer.org/dl/mags/sp/2003/06/j6079.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Anonymous:2003:AII,
author = "Anonymous",
title = "2003 Annual Index {IEEE Security \& Privacy Volume
1}",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "6",
pages = "83--88",
month = nov # "\slash " # dec,
year = "2003",
CODEN = "????",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jan 27 18:07:01 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2003/06/j6083.pdf;
http://csdl.computer.org/dl/mags/sp/2003/06/j6083.htm",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Caloyannides:2003:DER,
author = "Michael A. Caloyannides",
title = "Digital `Evidence' and Reasonable Doubt",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "6",
pages = "89--91",
month = nov # "\slash " # dec,
year = "2003",
CODEN = "????",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jan 27 18:07:01 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2003/06/j6089abs.htm;
http://csdl.computer.org/dl/mags/sp/2003/06/j6089.htm;
http://csdl.computer.org/dl/mags/sp/2003/06/j6089.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Schneier:2003:AH,
author = "Bruce Schneier",
title = "Airplane Hackers",
journal = j-IEEE-SEC-PRIV,
volume = "1",
number = "6",
pages = "92--92",
month = nov # "\slash " # dec,
year = "2003",
CODEN = "????",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jan 27 18:07:01 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2003/06/j6092abs.htm;
http://csdl.computer.org/dl/mags/sp/2003/06/j6092.htm;
http://csdl.computer.org/dl/mags/sp/2003/06/j6092.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Schneider:2004:END,
author = "Fred B. Schneider",
title = "From the {Editors}: The Next Digital Divide",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "1",
pages = "5--5",
month = jan # "\slash " # feb,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2004.1264838",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Feb 3 11:48:25 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2004/01/j1005.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Anonymous:2004:RT,
author = "Anonymous",
title = "Reviewer Thanks",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "1",
pages = "6--6",
month = jan # "\slash " # feb,
year = "2004",
CODEN = "????",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Feb 3 11:48:25 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2004/01/j1006.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Weber:2004:LED,
author = "Daniel Weber and Jean Camp and Tom {Van Vleck} and Bob
Bruen and James Whittaker",
title = "Letters to the {Editors}: Digital Rights Management;
Change the Game?; No Clear Answers",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "1",
pages = "7--9",
month = jan # "\slash " # feb,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2004.1264840",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Feb 3 11:48:25 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2004/01/j1007.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Palmer:2004:EBM,
author = "Charles C. Palmer",
title = "{Editorial Board} Member Profile: Can We Win the
Security Game?",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "1",
pages = "10--12",
month = jan # "\slash " # feb,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2004.1264842",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Feb 3 11:48:25 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2004/01/j1010abs.htm;
http://csdl.computer.org/dl/mags/sp/2004/01/j1010.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Goth:2004:NVS,
author = "Greg Goth and Pam Frost Gorder",
title = "News: {E}-Voting Security: The Electoral Dialect Gets
Hot; Balancing Video-Game Piracy Issues",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "1",
pages = "14--17",
month = jan # "\slash " # feb,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2004.1264844",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Feb 3 11:48:25 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2004/01/j1014abs.htm;
http://csdl.computer.org/dl/mags/sp/2004/01/j1014.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Andresen:2004:NBP,
author = "Scott L. Andresen",
title = "News Briefs: Policy; Privacy; Security",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "1",
pages = "18--19",
month = jan # "\slash " # feb,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2004.1264846",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Feb 3 11:48:25 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2004/01/j1020abs.htm;
http://csdl.computer.org/dl/mags/sp/2004/01/j1020.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Stytz:2004:BRW,
author = "Martin R. Stytz",
title = "Book Reviews: Wireless World Order [{{\em How Secure
Is Your Wireless Network? Safeguarding Your Wi-Fi LAN}
by Lee Barken}]; No Need to Fear [{{\em Beyond Fear:
Thinking Sensibly About Security in an Uncertain
World}, by Bruce Schneier}]",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "1",
pages = "20--21",
month = jan # "\slash " # feb,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2004.1264847",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Feb 3 11:48:25 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2004/01/j1020abs.htm;
http://csdl.computer.org/dl/mags/sp/2004/01/j1020.pdf",
acknowledgement = ack-nhfb,
doi-1 = "https://doi.org/10.1109/MSECP.2004.1264848",
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Dill:2004:GEI,
author = "David L. Dill and Aviel D. Rubin",
title = "{Guest Editors}' Introduction: {E}-Voting Security",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "1",
pages = "22--23",
month = jan # "\slash " # feb,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2004.1264849",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Feb 3 11:48:25 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2004/01/j1022.pdf;
http://csdl.computer.org/comp/mags/sp/2004/01/j1022abs.htm",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Evans:2004:VES,
author = "David Evans and Nathanael Paul",
title = "{E}-Voting: Election Security: Perception and
Reality",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "1",
pages = "24--31",
month = jan # "\slash " # feb,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2004.1264850",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Feb 3 11:48:25 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2004/01/j1024abs.htm;
http://csdl.computer.org/dl/mags/sp/2004/01/j1024.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Bannet:2004:VHV,
author = "Jonathan Bannet and David W. Price and Algis Rudys and
Justin Singer and Dan S. Wallach",
title = "{E}-Voting: Hack-a-Vote: Security Issues with
Electronic Voting Systems",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "1",
pages = "32--37",
month = jan # "\slash " # feb,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2004.1264851",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Feb 3 11:48:25 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2004/01/j1032abs.htm;
http://csdl.computer.org/dl/mags/sp/2004/01/j1032.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Chaum:2004:VSB,
author = "David Chaum",
title = "{E}-Voting: Secret-Ballot Receipts: True
Voter-Verifiable Elections",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "1",
pages = "38--47",
month = jan # "\slash " # feb,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2004.1264852",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Feb 3 11:48:25 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2004/01/j1038abs.htm;
http://csdl.computer.org/dl/mags/sp/2004/01/j1038.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Sklavos:2004:CRC,
author = "Nicolas Sklavos and Nikolay Moldovyan and Vladimir
Gorodetsky and Odysseas Koufopavlou",
title = "Conference Reports: Computer Network Security: Report
from {MMM-ACNS}",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "1",
pages = "49--52",
month = jan # "\slash " # feb,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2004.1264853",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Feb 3 11:48:25 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2004/01/j1049abs.htm;
http://csdl.computer.org/dl/mags/sp/2004/01/j1049.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Donner:2004:BTG,
author = "Marc Donner",
title = "Biblio Tech: {Die Gedanken Sind Frei}",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "1",
pages = "53--55",
month = jan # "\slash " # feb,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2004.1264854",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Feb 3 11:48:25 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2004/01/j1053abs.htm;
http://csdl.computer.org/dl/mags/sp/2004/01/j1053.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Grimaila:2004:EMB,
author = "Michael Russell Grimaila",
title = "Education: Maximizing Business Information Security's
Educational Value",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "1",
pages = "56--60",
month = jan # "\slash " # feb,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2004.1264855",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Feb 3 11:48:25 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2004/01/j1056abs.htm;
http://csdl.computer.org/dl/mags/sp/2004/01/j1056.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Lesk:2004:DRM,
author = "Michael Lesk",
title = "Digital Rights: Micropayments: An Idea Whose Time Has
Passed Twice?",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "1",
pages = "61--63",
month = jan # "\slash " # feb,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2004.1264856",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Feb 3 11:48:25 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2004/01/j1061abs.htm;
http://csdl.computer.org/dl/mags/sp/2004/01/j1061.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Hearn:2004:GPD,
author = "Jim Hearn",
title = "Global Perspectives: Does the Common Criteria Paradigm
Have a Future?",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "1",
pages = "64--65",
month = jan # "\slash " # feb,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2004.1264857",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Feb 3 11:48:25 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2004/01/j1064abs.htm;
http://csdl.computer.org/dl/mags/sp/2004/01/j1064.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Arce:2004:ATM,
author = "Iv{\'a}n Arce",
title = "Attack Trends: More Bang For the Bug: An Account of
2003's Attack Trends",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "1",
pages = "66--68",
month = jan # "\slash " # feb,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2004.1264858",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Feb 3 11:48:25 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2004/01/j1066abs.htm;
http://csdl.computer.org/dl/mags/sp/2004/01/j1066.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Smith:2004:SSG,
author = "Sean W. Smith and Eugene H. Spafford",
title = "Secure Systems: Grand Challenges in Information
Security: Process and Output",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "1",
pages = "69--71",
month = jan # "\slash " # feb,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2004.1264859",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Feb 3 11:48:25 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2004/01/j1069abs.htm;
http://csdl.computer.org/dl/mags/sp/2004/01/j1069.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Stytz:2004:CDD,
author = "Martin R. Stytz",
title = "Considering Defense in Depth for Software
Applications",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "1",
pages = "72--75",
month = jan # "\slash " # feb,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2004.1264860",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Feb 3 11:48:25 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2004/01/j1072abs.htm;
http://csdl.computer.org/dl/mags/sp/2004/01/j1072.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Krawetz:2004:HFA,
author = "Neal Krawetz",
title = "The {Honeynet} Files: Anti-Honeypot Technology",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "1",
pages = "76--79",
month = jan # "\slash " # feb,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2004.1264861",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Feb 3 11:48:25 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2004/01/j1076abs.htm;
http://csdl.computer.org/dl/mags/sp/2004/01/j1076.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Caloyannides:2004:PMO,
author = "Michael A. Caloyannides",
title = "Privacy Matters: Online Monitoring: Security or Social
Control?",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "1",
pages = "81--83",
month = jan # "\slash " # feb,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2004.1264862",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Feb 3 11:48:25 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2004/01/j1081abs.htm;
http://csdl.computer.org/dl/mags/sp/2004/01/j1081.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Schneier:2004:CTV,
author = "Bruce Schneier",
title = "Clear Text: Voting Security and Technology",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "1",
pages = "84--84",
month = jan # "\slash " # feb,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2004.1264863",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Feb 3 11:48:25 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2004/01/j1084abs.htm;
http://csdl.computer.org/dl/mags/sp/2004/01/j1084.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Cybenko:2004:EDB,
author = "George Cybenko",
title = "From the Editors: Don't Bring a Knife to a Gunfight",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "2",
pages = "5--5",
month = mar # "\slash " # apr,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2004.1281233",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Apr 8 08:08:03 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2004/02/j2005.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Fischmann:2004:LEE,
author = "Matthias Fischmann and Matthias Bauer and Simson
Garfinkel",
title = "Letters to the Editor: {EBIA} vs. {PKI}",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "2",
pages = "6--7",
month = mar # "\slash " # apr,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2004.1281234",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Apr 8 08:08:03 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2004/02/j2006.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Stytz:2004:BRH,
author = "Martin R. Stytz",
title = "Book Reviews: Hacking for Understanding: {{\em
Hacking: The Art of Exploitation}, by Jon Erickson}",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "2",
pages = "8--8",
month = mar # "\slash " # apr,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2004.1281235",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Apr 8 08:08:03 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2004/02/j2008.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Goth:2004:NHU,
author = "Greg Goth and Benjamin J. Alfonsi and Scott L.
Andresen",
title = "News: How Useful Are Attack Trend Resources?",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "2",
pages = "9--11",
month = mar # "\slash " # apr,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2004.1281236",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Apr 8 08:08:03 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/02/j2009.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Jiwnani:2004:SMN,
author = "Kanta Jiwnani and Marvin Zelkowitz",
title = "Susceptibility Matrix: a New Aid to Software
Auditing",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "2",
pages = "16--21",
month = mar # "\slash " # apr,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2004.1281240",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Apr 8 08:08:03 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2004/02/j2016abs.htm;
http://csdl.computer.org/dl/mags/sp/2004/02/j2016.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Byers:2004:ILC,
author = "Simon Byers",
title = "Information Leakage Caused by Hidden Data in Published
Documents",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "2",
pages = "23--27",
month = mar # "\slash " # apr,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2004.1281241",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Apr 8 08:08:03 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2004/02/j2023abs.htm;
http://csdl.computer.org/dl/mags/sp/2004/02/j2023.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Gruteser:2004:PPC,
author = "Marco Gruteser and Xuan Liu",
title = "Protecting Privacy in Continuous Location-Tracking
Applications",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "2",
pages = "28--34",
month = mar # "\slash " # apr,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2004.1281242",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Apr 8 08:08:03 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2004/02/j2028abs.htm;
http://csdl.computer.org/dl/mags/sp/2004/02/j2028.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Anton:2004:FPP,
author = "Annie I. Ant{\'o}n and Julia B. Earp and Qingfeng He
and William Stufflebeam and Davide Bolchini and
University of Lugano and Carlos Jensen",
title = "Financial Privacy Policies and the Need for
Standardization",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "2",
pages = "36--45",
month = mar # "\slash " # apr,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2004.1281243",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Apr 8 08:08:03 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2004/02/j2036abs.htm;
http://csdl.computer.org/dl/mags/sp/2004/02/j2036.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Popli:2004:ACC,
author = "Ashish Popli",
title = "{ACM Computer and Communication Security Conference}",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "2",
pages = "46--47",
month = mar # "\slash " # apr,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2004.1281244",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Apr 8 08:08:03 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2004/02/j2046abs.htm;
http://csdl.computer.org/dl/mags/sp/2004/02/j2046.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Weis:2004:RPW,
author = "Stephen A. Weis",
title = "{RFID} Privacy Workshop: Concerns, Consensus, and
Questions",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "2",
pages = "48--50",
month = mar # "\slash " # apr,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2004.1281245",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Apr 8 08:08:03 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2004/02/j2048abs.htm;
http://csdl.computer.org/dl/mags/sp/2004/02/j2048.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Donner:2004:HBS,
author = "Marc Donner",
title = "Hacking the Best-Seller List",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "2",
pages = "51--53",
month = mar # "\slash " # apr,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2004.1281246",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Apr 8 08:08:03 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2004/02/j2051abs.htm;
http://csdl.computer.org/dl/mags/sp/2004/02/j2051.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Bishop:2004:TRP,
author = "Matt Bishop and Deb Frincke",
title = "Teaching Robust Programming",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "2",
pages = "54--57",
month = mar # "\slash " # apr,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2004.1281247",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Apr 8 08:08:03 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2004/02/j2054abs.htm;
http://csdl.computer.org/dl/mags/sp/2004/02/j2054.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Payne:2004:RIS,
author = "Jeffery E. Payne",
title = "Regulation and Information Security: Can {Y2K} Lessons
Help Us?",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "2",
pages = "58--61",
month = mar # "\slash " # apr,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2004.1281248",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Apr 8 08:08:03 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2004/02/j2058abs.htm;
http://csdl.computer.org/dl/mags/sp/2004/02/j2058.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Lesk:2004:SLC,
author = "Michael Lesk",
title = "Shedding Light on Creativity: The History of
Photography",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "2",
pages = "62--64",
month = mar # "\slash " # apr,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2004.1281249",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Apr 8 08:08:03 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2004/02/j2062abs.htm;
http://csdl.computer.org/dl/mags/sp/2004/02/j2062.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Levy:2004:CBT,
author = "Elias Levy",
title = "Criminals Become Tech Savvy",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "2",
pages = "65--68",
month = mar # "\slash " # apr,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2004.1281250",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Apr 8 08:08:03 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2004/02/j2065abs.htm;
http://csdl.computer.org/dl/mags/sp/2004/02/j2065.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Wayner:2004:PCC,
author = "Peter Wayner",
title = "The Power of Candy-Coated Bits",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "2",
pages = "69--72",
month = mar # "\slash " # apr,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2004.1281251",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Apr 8 08:08:03 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2004/02/j2069abs.htm;
http://csdl.computer.org/dl/mags/sp/2004/02/j2069.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Trope:2004:WC,
author = "Roland L. Trope",
title = "A Warranty of Cyberworthiness",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "2",
pages = "73--76",
month = mar # "\slash " # apr,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2004.1281252",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Apr 8 08:08:03 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2004/02/j2073abs.htm;
http://csdl.computer.org/dl/mags/sp/2004/02/j2073.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Chamales:2004:HCR,
author = "George Chamales",
title = "The {Honeywall CD-ROM}",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "2",
pages = "77--79",
month = mar # "\slash " # apr,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2004.1281253",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Apr 8 08:08:03 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2004/02/j2077abs.htm;
http://csdl.computer.org/dl/mags/sp/2004/02/j2077.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{McGraw:2004:SS,
author = "Gary McGraw",
title = "Software Security",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "2",
pages = "80--83",
month = mar # "\slash " # apr,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2004.1281254",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Apr 8 08:08:03 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2004/02/j2080abs.htm;
http://csdl.computer.org/dl/mags/sp/2004/02/j2080.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Caloyannides:2004:CCF,
author = "Michael A. Caloyannides",
title = "The Cost of Convenience: a {Faustian} Deal",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "2",
pages = "84--87",
month = mar # "\slash " # apr,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2004.1281255",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Apr 8 08:08:03 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2004/02/j2084abs.htm;
http://csdl.computer.org/dl/mags/sp/2004/02/j2084.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Donner:2004:EWD,
author = "Marc Donner",
title = "From the Editors: Whose Data Are These, Anyway?",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "3",
pages = "5--6",
month = may # "\slash " # jun,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.12",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 4 07:44:23 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/03/j3005.htm",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Pfleeger:2004:BRG,
author = "Shari Lawrence Pfleeger",
title = "Book Reviews: a Gift of Impact: {{\em A Gift of Fire:
The Social, Legal, and Ethical Issues for Computers and
the Internet}, by Sara Baase (Prentice-Hall 2002, ISBN
0-13-008215-5)}",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "3",
pages = "7--7",
month = may # "\slash " # jun,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.5",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 4 07:44:23 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/03/j3007.htm",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Li:2004:LEI,
author = "Hong-Lok Li and Stan Bush",
title = "Letters to the Editor: Interface: Usability,
efficiency --- or privacy?; Does piracy increase
sales?",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "3",
pages = "8--9",
month = may # "\slash " # jun,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.15",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 4 07:44:23 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/03/j3008.htm;
j3008.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Goth:2004:NRC,
author = "Greg Goth and Scott L. Andresen",
title = "News: {Richard Clarke} Talks Cybersecurity and
{JELL-O}",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "3",
pages = "11--15",
month = may # "\slash " # jun,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.18",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 4 07:44:23 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/03/j3011.htm;
http://csdl.computer.org/dl/mags/sp/2004/03/j3011.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Davis:2004:PPS,
author = "Noopur Davis and Watts Humphrey and Samuel T.
{Redwine, Jr.} and Gerlinde Zibulski and Gary McGraw",
title = "Processes for Producing Secure Software: Summary of
{US National Cybersecurity Summit Subgroup Report}",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "3",
pages = "18--25",
month = may # "\slash " # jun,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.21",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 4 07:44:23 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/03/j3018.htm;
http://csdl.computer.org/dl/mags/sp/2004/03/j3018.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Arbaugh:2004:GEI,
author = "William A. Arbaugh",
title = "{Guest Editor}'s Introduction: Wired on Wireless",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "3",
pages = "26--27",
month = may # "\slash " # jun,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.14",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 4 07:44:23 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/03/j3026.htm",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Hu:2004:SSW,
author = "Yih-Chun Hu and Adrian Perrig",
title = "A Survey of Secure Wireless Ad Hoc Routing",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "3",
pages = "28--39",
month = may # "\slash " # jun,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.1",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 4 07:44:23 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/03/j3028.htm;
http://csdl.computer.org/dl/mags/sp/2004/03/j3028.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Johnston:2004:OIS,
author = "David Johnston and Jesse Walker",
title = "Overview of {IEEE 802.16} Security",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "3",
pages = "40--48",
month = may # "\slash " # jun,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.20",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 4 07:44:23 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/03/j3040.htm;
http://csdl.computer.org/dl/mags/sp/2004/03/j3040.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Hubaux:2004:SPS,
author = "Jean-Pierre Hubaux and Srdjan Capkun and Jun Luo",
title = "The Security and Privacy of Smart Vehicles",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "3",
pages = "49--55",
month = may # "\slash " # jun,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.26",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 4 07:44:23 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/03/j3049.htm;
http://csdl.computer.org/dl/mags/sp/2004/03/j3049.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Branch:2004:AWL,
author = "Joel W. Branch and Nick L. {Petroni, Jr.} and Leendert
{Van Doorn} and David Safford",
title = "Autonomic 802.11 Wireless {LAN} Security Auditing",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "3",
pages = "56--65",
month = may # "\slash " # jun,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.4",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 4 07:44:23 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/03/j3056.htm;
http://csdl.computer.org/dl/mags/sp/2004/03/j3056.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Donner:2004:CC,
author = "Marc Donner",
title = "Cult Classics",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "3",
pages = "66--68",
month = may # "\slash " # jun,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.11",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 4 07:44:23 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/03/j3066.htm;
http://csdl.computer.org/dl/mags/sp/2004/03/j3066.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Frincke:2004:GCK,
author = "Deborah A. Frincke and Matt Bishop",
title = "Guarding the Castle Keep: Teaching with the Fortress
Metaphor",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "3",
pages = "69--72",
month = may # "\slash " # jun,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.13",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 4 07:44:23 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/03/j3069.htm;
http://csdl.computer.org/dl/mags/sp/2004/03/j3069.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Stolfo:2004:WAE,
author = "Salvatore J. Stolfo",
title = "Worm and Attack Early Warning",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "3",
pages = "73--75",
month = may # "\slash " # jun,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.28",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 4 07:44:23 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/03/j3073.htm;
http://csdl.computer.org/dl/mags/sp/2004/03/j3073.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Lesk:2004:DRC,
author = "Michael Lesk",
title = "Digital Rights: Copyright and Creativity",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "3",
pages = "76--78",
month = may # "\slash " # jun,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.6",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 4 07:44:23 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/03/j3076.htm;
http://csdl.computer.org/dl/mags/sp/2004/03/j3076.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Arce:2004:KC,
author = "Iva{\'a}n Arce",
title = "The Kernel Craze",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "3",
pages = "79--81",
month = may # "\slash " # jun,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.25",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 4 07:44:23 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/03/j3079.htm;
http://csdl.computer.org/dl/mags/sp/2004/03/j3079.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Vilardo:2004:OIS,
author = "Mark F. Vilardo",
title = "Online Impersonation in Securities Scams",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "3",
pages = "82--85",
month = may # "\slash " # jun,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.19",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 4 07:44:23 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/03/j3082.htm;
http://csdl.computer.org/dl/mags/sp/2004/03/j3082.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Ford:2004:WS,
author = "Richard Ford",
title = "The Wrong Stuff?",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "3",
pages = "86--89",
month = may # "\slash " # jun,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.27",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 4 07:44:23 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/03/j3086.htm;
http://csdl.computer.org/dl/mags/sp/2004/03/j3086.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Hope:2004:MAC,
author = "Paco Hope and Gary McGraw and Annie I. Ant{\'o}n",
title = "Misuse and Abuse Cases: Getting Past the Positive",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "3",
pages = "90--92",
month = may # "\slash " # jun,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.17",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 4 07:44:23 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/03/j3090.htm;
http://csdl.computer.org/dl/mags/sp/2004/03/j3090.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Caloyannides:2004:SC,
author = "Michael A. Caloyannides",
title = "Security or Cosmetology?",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "3",
pages = "93--95",
month = may # "\slash " # jun,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.23",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 4 07:44:23 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/03/j3093.htm;
http://csdl.computer.org/dl/mags/sp/2004/03/j3093.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Schneier:2004:SC,
author = "Bruce Schneier",
title = "Security and Compliance",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "3",
pages = "96--96",
month = may # "\slash " # jun,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.22",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 4 07:44:23 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/03/j3096.htm;
http://csdl.computer.org/dl/mags/sp/2004/03/j3096.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Donner:2004:EWL,
author = "Marc Donner",
title = "From the Editors: a Witty Lesson",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "4",
pages = "5--5",
month = jul # "\slash " # aug,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.44",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 4 07:44:24 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/04/j4005.htm",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Spencer:2004:LEI,
author = "Brad Spencer and Michael A. Caloyannides",
title = "Letters to the Editor: Interface: Machine Gun or
Blunderbuss?; Usability or privacy redux; Erratum",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "4",
pages = "7--8",
month = jul # "\slash " # aug,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.51",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 4 07:44:24 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/04/j4007.htm;
j4007.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Forbes:2004:BRN,
author = "Scott Forbes",
title = "Book Reviews: {{\em A .NET Gold Mine: .NET Security
and Cryptography}, by Peter Thorsteinson and G. Gnana
Arun Ganesh (Prentice-Hall 2004, ISBN 0-13-100851-X)}",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "4",
pages = "10--10",
month = jul # "\slash " # aug,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.38",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 4 07:44:24 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/04/j4010.htm",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Stone:2004:NDB,
author = "Adam Stone and Benjamin Alfonsi and Scott L.
Andresen",
title = "News: The Delicate Balance: Security and Privacy;
Corporate Security Under Siege; News Briefs",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "4",
pages = "12--13",
month = jul # "\slash " # aug,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.53",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 4 07:44:24 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/04/j4012.htm",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Arce:2004:GEI,
author = "Iv{\'a}an Arce and Gary McGraw",
title = "{Guest Editors}' Introduction: Why Attacking Systems
Is a Good Idea",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "4",
pages = "17--19",
month = jul # "\slash " # aug,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.46",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 4 07:44:24 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/04/j4017.htm",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Pincus:2004:BSS,
author = "Jonathan Pincus and Brandon Baker",
title = "Beyond Stack Smashing: Recent Advances in Exploiting
Buffer Overruns",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "4",
pages = "20--27",
month = jul # "\slash " # aug,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.36",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 4 07:44:24 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/04/j4020.htm;
http://csdl.computer.org/dl/mags/sp/2004/04/j4020.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Meinel:2004:CTC,
author = "Carolyn P. Meinel",
title = "{Cybercrime Treaty} Could Chill Research",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "4",
pages = "28--32",
month = jul # "\slash " # aug,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.40",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 4 07:44:24 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/04/j4028.htm;
http://csdl.computer.org/dl/mags/sp/2004/04/j4028.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{White:2004:AUF,
author = "Greg White and Art Conklin",
title = "The Appropriate Use of Force-on-Force Cyberexercises",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "4",
pages = "33--37",
month = jul # "\slash " # aug,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.58",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 4 07:44:24 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/04/j4033.htm;
http://csdl.computer.org/dl/mags/sp/2004/04/j4033.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Ring:2004:TLS,
author = "Sandra Ring and Eric Cole",
title = "Taking a Lesson from Stealthy Rootkits",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "4",
pages = "38--45",
month = jul # "\slash " # aug,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.57",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 4 07:44:24 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/04/j4038.htm;
http://csdl.computer.org/dl/mags/sp/2004/04/j4038.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Shannon:2004:SWW,
author = "Colleen Shannon and David Moore",
title = "The Spread of the Witty Worm",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "4",
pages = "46--50",
month = jul # "\slash " # aug,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.59",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 4 07:44:24 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/04/j4046.htm;
http://csdl.computer.org/dl/mags/sp/2004/04/j4046.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Donner:2004:DEM,
author = "Marc Donner",
title = "Deus Est Machina",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "4",
pages = "51--53",
month = jul # "\slash " # aug,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2004.1281246",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 4 07:44:24 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/04/j4051.htm;
http://csdl.computer.org/dl/mags/sp/2004/04/j4051.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Frincke:2004:BS,
author = "Deborah Frincke and Matt Bishop",
title = "Back to School",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "4",
pages = "54--56",
month = jul # "\slash " # aug,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.35",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 4 07:44:24 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/04/j4054.htm;
http://csdl.computer.org/dl/mags/sp/2004/04/j4054.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Elliott:2004:QC,
author = "Chip Elliott",
title = "Quantum Cryptography",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "4",
pages = "57--61",
month = jul # "\slash " # aug,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.54",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 4 07:44:24 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/04/j4057.htm;
http://csdl.computer.org/dl/mags/sp/2004/04/j4057.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Lesk:2004:BSS,
author = "Michael Lesk",
title = "Bigger Share of a Smaller Pie",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "4",
pages = "62--64",
month = jul # "\slash " # aug,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2004.1281249",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 4 07:44:24 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/04/j4062.htm;
http://csdl.computer.org/dl/mags/sp/2004/04/j4062.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Levy:2004:AZ,
author = "Elias Levy",
title = "Approaching Zero",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "4",
pages = "65--66",
month = jul # "\slash " # aug,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2004.1281250",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 4 07:44:24 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/04/j4065.htm;
http://csdl.computer.org/dl/mags/sp/2004/04/j4065.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Guida:2004:DUP,
author = "Richard Guida and Robert Stahl and Thomas Bunt and
Gary Secrest and Joseph Moorcones",
title = "Deploying and Using Public Key Technology: Lessons
Learned in Real Life",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "4",
pages = "67--71",
month = jul # "\slash " # aug,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.41",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 4 07:44:24 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/04/j4067.htm;
http://csdl.computer.org/dl/mags/sp/2004/04/j4067.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Raynal:2004:HFPa,
author = "Frederic Raynal and Yann Berthier and Philippe Biondi
and Danielle Kaminsky",
title = "Honeypot Forensics {Part I}: Analyzing the Network",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "4",
pages = "72--78",
month = jul # "\slash " # aug,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.47",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 4 07:44:24 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/04/j4072.htm;
http://csdl.computer.org/dl/mags/sp/2004/04/j4072.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Verdon:2004:RAS,
author = "Denis Verdon and Gary McGraw",
title = "Risk Analysis in Software Design",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "4",
pages = "79--84",
month = jul # "\slash " # aug,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.55",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 4 07:44:24 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/04/j4079.htm;
http://csdl.computer.org/dl/mags/sp/2004/04/j4079.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Caloyannides:2004:PRC,
author = "Michael A. Caloyannides",
title = "Is Privacy Really Constraining Security or Is this a
Red Herring?",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "4",
pages = "86--87",
month = jul # "\slash " # aug,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.50",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 4 07:44:24 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/04/j4086.htm;
http://csdl.computer.org/dl/mags/sp/2004/04/j4086.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Schneier:2004:CPW,
author = "Bruce Schneier",
title = "Customers, Passwords, and {Web} Sites",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "4",
pages = "88--88",
month = jul # "\slash " # aug,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.39",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 4 07:44:24 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/04/j4088.htm;
http://csdl.computer.org/dl/mags/sp/2004/04/j4088.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Schneider:2004:TSI,
author = "Fred Schneider",
title = "Time Out for Station Identification",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "5",
pages = "5--5",
month = sep # "\slash " # oct,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.88",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Sat Dec 11 18:47:37 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2004/05/j5005.pdf;
http://csdl.computer.org/dl/mags/sp/2004/05/j5005.htm",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Anonymous:2004:LE,
author = "Anonymous",
title = "Letters to the {Editor}",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "5",
pages = "6--7",
month = sep # "\slash " # oct,
year = "2004",
CODEN = "????",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Sat Dec 11 18:47:37 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2004/05/j5006.pdf;
http://csdl.computer.org/dl/mags/sp/2004/05/j5006.htm",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Goth:2004:Na,
author = "Greg Goth",
title = "News",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "5",
pages = "8--11",
month = sep # "\slash " # oct,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.79",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Sat Dec 11 18:47:37 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2004/05/j5008.pdf;
http://csdl.computer.org/dl/mags/sp/2004/05/j5008.htm",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Anonymous:2004:PCP,
author = "Anonymous",
title = "Protecting Consumers' Private Health Information",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "5",
pages = "12--12",
month = sep # "\slash " # oct,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.82",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Sat Dec 11 18:47:37 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2004/05/j5012.pdf;
http://csdl.computer.org/dl/mags/sp/2004/05/j5012.htm",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Cranor:2004:GEI,
author = "Lorrie Faith Cranor and Simson Garfinkel",
title = "{Guest Editors}' Introduction: Secure or Usable?",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "5",
pages = "16--18",
month = sep # "\slash " # oct,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.69",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Sat Dec 11 18:47:37 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2004/05/j5016.pdf;
http://csdl.computer.org/dl/mags/sp/2004/05/j5016.htm",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Balfanz:2004:SUS,
author = "Dirk Balfanz and Glenn Durfee and Rebecca E. Grinter
and D. K. Smetters",
title = "In Search of Usable Security: Five Lessons from the
Field",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "5",
pages = "19--24",
month = sep # "\slash " # oct,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.71",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Sat Dec 11 18:47:37 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/05/j5019.htm;
http://csdl.computer.org/dl/mags/sp/2004/05/j5019.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Yan:2004:PMS,
author = "Jeff Yan and Alan Blackwell and Ross Anderson and
Alasdair Grant",
title = "Password Memorability and Security: Empirical
Results",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "5",
pages = "25--31",
month = sep # "\slash " # oct,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.81",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Sat Dec 11 18:47:37 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/05/j5025.htm;
http://csdl.computer.org/dl/mags/sp/2004/05/j5025.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Just:2004:DEC,
author = "Mike Just",
title = "Designing and Evaluating Challenge-Question Systems",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "5",
pages = "32--39",
month = sep # "\slash " # oct,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.80",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Sat Dec 11 18:47:37 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/05/j5032.htm;
http://csdl.computer.org/dl/mags/sp/2004/05/j5032.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Peacock:2004:TPK,
author = "Alen Peacock and Xian Ke and Matthew Wilkerson",
title = "Typing Patterns: a Key to User Identification",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "5",
pages = "40--47",
month = sep # "\slash " # oct,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.89",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Sat Dec 11 18:47:37 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2004/extras/j5040x1.pdf;
http://csdl.computer.org/comp/mags/sp/2004/extras/j5040x2.pdf;
http://csdl.computer.org/dl/mags/sp/2004/05/j5040.htm;
http://csdl.computer.org/dl/mags/sp/2004/05/j5040.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Yee:2004:ASU,
author = "Ka-Ping Yee",
title = "Aligning Security and Usability",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "5",
pages = "48--55",
month = sep # "\slash " # oct,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.64",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Sat Dec 11 18:47:37 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/05/j5048.htm;
http://csdl.computer.org/dl/mags/sp/2004/05/j5048.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Donner:2004:JG,
author = "Marc Donner",
title = "{Jennifer Government}",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "5",
pages = "57--59",
month = sep # "\slash " # oct,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.74",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Sat Dec 11 18:47:37 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/05/j5057.htm;
http://csdl.computer.org/dl/mags/sp/2004/05/j5057.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Frincke:2004:JSE,
author = "Deborah Frincke and Matt Bishop",
title = "Joining the Security Education Community",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "5",
pages = "61--63",
month = sep # "\slash " # oct,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.75",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Sat Dec 11 18:47:37 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/05/j5061.htm;
http://csdl.computer.org/dl/mags/sp/2004/05/j5061.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Saydjari:2004:MSR,
author = "O. Sami Saydjari",
title = "Multilevel Security: Reprise",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "5",
pages = "64--67",
month = sep # "\slash " # oct,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.78",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Sat Dec 11 18:47:37 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/05/j5064.htm;
http://csdl.computer.org/dl/mags/sp/2004/05/j5064.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Andrews:2004:CS,
author = "Mike Andrews and James A. Whittaker",
title = "Computer Security",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "5",
pages = "68--71",
month = sep # "\slash " # oct,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.66",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Sat Dec 11 18:47:37 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/05/j5068.htm;
http://csdl.computer.org/dl/mags/sp/2004/05/j5068.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Arce:2004:SG,
author = "Iv{\'a}n Arce",
title = "The Shellcode Generation",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "5",
pages = "72--76",
month = sep # "\slash " # oct,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.87",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Sat Dec 11 18:47:37 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/05/j5072.htm;
http://csdl.computer.org/dl/mags/sp/2004/05/j5072.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Raynal:2004:HFPb,
author = "Frederic Raynal and Yann Berthier and Philippe Biondi
and Danielle Kaminsky",
title = "Honeypot Forensics, {Part II}: Analyzing the
Compromised Host",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "5",
pages = "77--80",
month = sep # "\slash " # oct,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.70",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Sat Dec 11 18:47:37 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/05/j5077.htm;
http://csdl.computer.org/dl/mags/sp/2004/05/j5077.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{McGraw:2004:SST,
author = "Gary McGraw and Bruce Potter",
title = "Software Security Testing",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "5",
pages = "81--85",
month = sep # "\slash " # oct,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.84",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Sat Dec 11 18:47:37 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/05/j5081.htm;
http://csdl.computer.org/dl/mags/sp/2004/05/j5081.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Caloyannides:2004:SPT,
author = "Michael A. Caloyannides",
title = "Speech Privacy Technophobes Need Not Apply",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "5",
pages = "86--87",
month = sep # "\slash " # oct,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.85",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Sat Dec 11 18:47:37 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/05/j5086.htm;
http://csdl.computer.org/dl/mags/sp/2004/05/j5086.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Schneier:2004:SSP,
author = "Bruce Schneier",
title = "{SIMS}: Solution, or Part of the Problem?",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "5",
pages = "88--88",
month = sep # "\slash " # oct,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.83",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Sat Dec 11 18:47:37 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/05/j5088.htm;
http://csdl.computer.org/dl/mags/sp/2004/05/j5088.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Cybenko:2004:SA,
author = "George Cybenko",
title = "Security Alchemy",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "6",
pages = "5--5",
month = nov # "\slash " # dec,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.110",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Sat Dec 11 18:47:37 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2004/06/j6005.pdf;
http://csdl.computer.org/dl/mags/sp/2004/06/j6005.htm",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Forbes:2004:PLR,
author = "Scott Forbes",
title = "Privacy Law Resource for Students and Professionals",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "6",
pages = "7--7",
month = nov # "\slash " # dec,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.107",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Sat Dec 11 18:47:37 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2004/06/j6007.pdf;
http://csdl.computer.org/dl/mags/sp/2004/06/j6007.htm",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Goth:2004:Nb,
author = "Greg Goth and Benjamin Alfonsi",
title = "News",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "6",
pages = "8--9",
month = nov # "\slash " # dec,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.106",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Sat Dec 11 18:47:37 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2004/06/j6008.pdf;
http://csdl.computer.org/dl/mags/sp/2004/06/j6008.htm",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Anton:2004:IJP,
author = "Annie I. Ant{\'o}n and Qingfeng He and David L.
Baumer",
title = "Inside {JetBlue}'s Privacy Policy Violations",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "6",
pages = "12--18",
month = nov # "\slash " # dec,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.103",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Sat Dec 11 18:47:37 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/06/j6012.htm;
http://csdl.computer.org/dl/mags/sp/2004/06/j6012.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Vaidya:2004:PPD,
author = "Jaideep Vaidya and Chris Clifton",
title = "Privacy-Preserving Data Mining: Why, How, and When",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "6",
pages = "19--27",
month = nov # "\slash " # dec,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.108",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Sat Dec 11 18:47:37 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/06/j6019.htm;
http://csdl.computer.org/dl/mags/sp/2004/06/j6019.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Shankar:2004:COS,
author = "K. S. Shankar and Helmut Kurth",
title = "Certifying Open Source---The {Linux} Experience",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "6",
pages = "28--33",
month = nov # "\slash " # dec,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.96",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Sat Dec 11 18:47:37 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/06/j6028.htm;
http://csdl.computer.org/dl/mags/sp/2004/06/j6028.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Bakken:2004:DOA,
author = "David E. Bakken and Rupa Parameswaran and Douglas M.
Blough and Andy A. Franz and Ty J. Palmer",
title = "Data Obfuscation: Anonymity and Desensitization of
Usable Data Sets",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "6",
pages = "34--41",
month = nov # "\slash " # dec,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.97",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Sat Dec 11 18:47:37 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/06/j6034.htm;
http://csdl.computer.org/dl/mags/sp/2004/06/j6034.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Aslam:2004:KTI,
author = "Javed Aslam and Sergey Bratus and David Kotz and Ron
Peterson and Brett Tofel and Daniela Rus",
title = "The {Kerf Toolkit} for Intrusion Analysis",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "6",
pages = "42--52",
month = nov # "\slash " # dec,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.113",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Sat Dec 11 18:47:37 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/06/j6042.htm;
http://csdl.computer.org/dl/mags/sp/2004/06/j6042.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Donner:2004:UFL,
author = "Marc Donner",
title = "Use the Force, {Luke}!",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "6",
pages = "53--55",
month = nov # "\slash " # dec,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSECP.2004.1264854",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Sat Dec 11 18:47:37 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/06/j6053.htm;
http://csdl.computer.org/dl/mags/sp/2004/06/j6053.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Frincke:2004:ADP,
author = "Deborah Frincke and Matt Bishop",
title = "Academic Degrees and Professional Certification",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "6",
pages = "56--58",
month = nov # "\slash " # dec,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.91",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Sat Dec 11 18:47:37 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/06/j6056.htm;
http://csdl.computer.org/dl/mags/sp/2004/06/j6056.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Evans:2004:RBS,
author = "Shelby Evans and David Heinbuch and Elizabeth Kyule
and John Piorkowski and James Wallner",
title = "Risk-based Systems Security Engineering: Stopping
Attacks with Intention",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "6",
pages = "59--62",
month = nov # "\slash " # dec,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.109",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Sat Dec 11 18:47:37 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/06/j6059.htm;
http://csdl.computer.org/dl/mags/sp/2004/06/j6059.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Howard:2004:BMS,
author = "Michael Howard",
title = "Building More Secure Software with Improved
Development Processes",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "6",
pages = "63--65",
month = nov # "\slash " # dec,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.95",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Sat Dec 11 18:47:37 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/06/j6063.htm;
http://csdl.computer.org/dl/mags/sp/2004/06/j6063.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Levy:2004:II,
author = "Elias Levy",
title = "Interface Illusions",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "6",
pages = "66--69",
month = nov # "\slash " # dec,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.104",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Sat Dec 11 18:47:37 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/06/j6066.htm;
http://csdl.computer.org/dl/mags/sp/2004/06/j6066.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Somayaji:2004:HWE,
author = "Anil Somayaji",
title = "How to Win and Evolutionary Arms Race",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "6",
pages = "70--72",
month = nov # "\slash " # dec,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.100",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Sat Dec 11 18:47:37 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/06/j6070.htm;
http://csdl.computer.org/dl/mags/sp/2004/06/j6070.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Levine:2004:UHP,
author = "John G. Levine and Julian B. Grizzard and Henry L.
Owen",
title = "Using Honeynets to Protect Large Enterprise Networks",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "6",
pages = "73--75",
month = nov # "\slash " # dec,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.115",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Sat Dec 11 18:47:37 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/06/j6073.htm;
http://csdl.computer.org/dl/mags/sp/2004/06/j6073.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Chess:2004:SAS,
author = "Brian Chess and Gary McGraw",
title = "Static Analysis for Security",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "6",
pages = "76--79",
month = nov # "\slash " # dec,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.111",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Sat Dec 11 18:47:37 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/06/j6076.htm;
http://csdl.computer.org/dl/mags/sp/2004/06/j6076.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Anonymous:2004:AI,
author = "Anonymous",
title = "2004 Annual Index",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "6",
pages = "80--85",
month = nov # "\slash " # dec,
year = "2004",
CODEN = "????",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Sat Dec 11 18:47:37 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2004/06/j6080.pdf;
http://csdl.computer.org/dl/mags/sp/2004/06/j6080.htm",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Caloyannides:2004:ESC,
author = "Michael Caloyannides",
title = "Enhancing Security: Not for the Conformist",
journal = j-IEEE-SEC-PRIV,
volume = "2",
number = "6",
pages = "88, 86--87",
month = nov # "\slash " # dec,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2004.98",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Sat Dec 11 18:47:37 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/dl/mags/sp/2004/06/j6088.htm;
http://csdl.computer.org/dl/mags/sp/2004/06/j6088.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Landwehr:2005:CPP,
author = "C. Landwehr",
title = "Changing the Puzzle Pieces",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "1",
pages = "3--4",
month = jan # "\slash " # feb,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.9",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jul 26 18:29:12 MDT 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/30310/01392686.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30310&arnumber=1392686&count=17&index=0",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Sytz:2005:SAI,
author = "M. R. Sytz",
title = "Studying Attacks to Improve Software Defense",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "1",
pages = "11--11",
month = jan # "\slash " # feb,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.25",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jul 26 18:29:12 MDT 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/30310/01392692.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30310&arnumber=1392692&count=17&index=1",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Anderson:2005:GEI,
author = "R. Anderson and B. Schneier",
title = "{Guest Editors}' Introduction: Economics of
Information Security",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "1",
pages = "12--13",
month = jan # "\slash " # feb,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.14",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jul 26 18:29:12 MDT 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/30310/01392693.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30310&arnumber=1392693&count=17&index=2",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Rescorla:2005:FSH,
author = "E. Rescorla",
title = "Is finding security holes a good idea?",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "1",
pages = "14--19",
month = jan # "\slash " # feb,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.17",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jul 26 18:29:12 MDT 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/30310/01392694.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30310&arnumber=1392694&count=17&index=3",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Arora:2005:ESV,
author = "A. Arora and R. Telang",
title = "Economics of software vulnerability disclosure",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "1",
pages = "20--25",
month = jan # "\slash " # feb,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.12",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jul 26 18:29:12 MDT 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/30310/01392695.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30310&arnumber=1392695&count=17&index=4",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Acquisti:2005:PRI,
author = "A. Acquisti and J. Grossklags",
title = "Privacy and rationality in individual decision
making",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "1",
pages = "26--33",
month = jan # "\slash " # feb,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.22",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jul 26 18:29:12 MDT 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/30310/01392696.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30310&arnumber=1392696&count=17&index=5",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Varian:2005:DDC,
author = "H. Varian and F. Wallenberg and G. Woroch",
title = "The demographics of the do-not-call list [security of
data]",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "1",
pages = "34--39",
month = jan # "\slash " # feb,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.28",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jul 26 18:29:12 MDT 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/30310/01392697.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30310&arnumber=1392697&count=17&index=6",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Schechter:2005:TEM,
author = "S. E. Schechter",
title = "Toward econometric models of the security risk from
remote attacks",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "1",
pages = "40--44",
month = jan # "\slash " # feb,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.30",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jul 26 18:29:12 MDT 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/30310/01392698.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30310&arnumber=1392698&count=17&index=7",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Danezis:2005:ERC,
author = "G. Danezis and R. Anderson",
title = "The economics of resisting censorship",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "1",
pages = "45--50",
month = jan # "\slash " # feb,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.29",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jul 26 18:29:12 MDT 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/30310/01392699.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30310&arnumber=1392699&count=17&index=8",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Linn:2005:TWU,
author = "J. Linn",
title = "Technology and {Web} user data privacy --- a survey of
risks and countermeasures",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "1",
pages = "52--58",
month = jan # "\slash " # feb,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.27",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jul 26 18:29:12 MDT 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/30310/01392701.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30310&arnumber=1392701&count=17&index=9",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Yasinsac:2005:CAE,
author = "A. Yasinsac and M. Burmester",
title = "Centers of academic excellence: a case study",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "1",
pages = "62--65",
month = jan # "\slash " # feb,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.8",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jul 26 18:29:12 MDT 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/30310/01392703.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30310&arnumber=1392703&count=17&index=10",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Thompson:2005:APT,
author = "H. H. Thompson",
title = "Application penetration testing",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "1",
pages = "66--69",
month = jan # "\slash " # feb,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.3",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jul 26 18:29:12 MDT 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/30310/01392704.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30310&arnumber=1392704&count=17&index=11",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Arce:2005:BP,
author = "I. Arce",
title = "Bad peripherals",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "1",
pages = "70--73",
month = jan # "\slash " # feb,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.6",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jul 26 18:29:12 MDT 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/30310/01392705.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30310&arnumber=1392705&count=17&index=12",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Adams:2005:BSW,
author = "C. Adams",
title = "Building secure {Web}-based environments:
understanding research interrelationships through a
construction metaphor",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "1",
pages = "74--77",
month = jan # "\slash " # feb,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.7",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jul 26 18:29:12 MDT 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/30310/01392706.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30310&arnumber=1392706&count=17&index=13",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Trope:2005:DDF,
author = "R. L. Trope",
title = "Directors' digital fiduciary duties",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "1",
pages = "78--82",
month = jan # "\slash " # feb,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.11",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jul 26 18:29:12 MDT 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/30310/01392707.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30310&arnumber=1392707&count=17&index=14",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Arkin:2005:SPT,
author = "B. Arkin and S. Stender and G. McGraw",
title = "Software penetration testing",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "1",
pages = "84--87",
month = jan # "\slash " # feb,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.23",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jul 26 18:29:12 MDT 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/30310/01392709.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30310&arnumber=1392709&count=17&index=15",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Schneier:2005:AE,
author = "B. Schneier",
title = "Authentication and Expiration",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "1",
pages = "88--88",
month = jan # "\slash " # feb,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.4",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jul 26 18:29:12 MDT 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/30310/01392710.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30310&arnumber=1392710&count=17&index=16",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Donner:2005:WN,
author = "M. Donner",
title = "What's in a Name?",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "2",
pages = "4--5",
month = mar # "\slash " # apr,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.56",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jul 26 18:29:12 MDT 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/30742/01423949.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30742&arnumber=1423949&count=15&index=0",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Weiss:2005:C,
author = "S. A. Weiss",
title = "{Crypto 2004}",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "2",
pages = "11--13",
month = mar # "\slash " # apr,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.39",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jul 26 18:29:12 MDT 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/30742/01423953.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30742&arnumber=1423953&count=15&index=1",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Iverson:2005:FC,
author = "R. Iverson",
title = "A Framework to Consider",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "2",
pages = "14--14",
month = mar # "\slash " # apr,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.31",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jul 26 18:29:12 MDT 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/30742/01423954.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30742&arnumber=1423954&count=15&index=2",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Oppliger:2005:DTC,
author = "R. Oppliger and R. Rytz",
title = "Does trusted computing remedy computer security
problems?",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "2",
pages = "16--19",
month = mar # "\slash " # apr,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.40",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jul 26 18:29:12 MDT 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/30742/01423956.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30742&arnumber=1423956&count=15&index=3",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Iliev:2005:PCP,
author = "A. Iliev and S. W. Smith",
title = "Protecting client privacy with trusted computing at
the server",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "2",
pages = "20--28",
month = mar # "\slash " # apr,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.49",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jul 26 18:29:12 MDT 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/30742/01423957.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30742&arnumber=1423957&count=15&index=4",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Jutla:2005:SAO,
author = "D. N. Jutla and P. Bodorik",
title = "Sociotechnical architecture for online privacy",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "2",
pages = "29--39",
month = mar # "\slash " # apr,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.50",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jul 26 18:29:12 MDT 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/30742/01423958.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30742&arnumber=1423958&count=15&index=5",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Pfleeger:2005:CSP,
author = "S. L. Pfleeger and G. Bloom",
title = "Canning {SPAM}: Proposed solutions to unwanted email",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "2",
pages = "40--47",
month = mar # "\slash " # apr,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.38",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jul 26 18:29:12 MDT 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/30742/01423959.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30742&arnumber=1423959&count=15&index=6",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Dodge:2005:TEU,
author = "R. Dodge and D. Ragsdale",
title = "Technology education at the {US Military Academy}",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "2",
pages = "49--53",
month = mar # "\slash " # apr,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.52",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jul 26 18:29:12 MDT 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/30742/01423961.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30742&arnumber=1423961&count=15&index=7",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Maxion:2005:MFE,
author = "R. A. Maxion and R. R. M. Roberts",
title = "Methodological foundations: enabling the next
generation of security",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "2",
pages = "54--57",
month = mar # "\slash " # apr,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.47",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jul 26 18:29:12 MDT 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/30742/01423962.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30742&arnumber=1423962&count=15&index=8",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Oehlert:2005:VAF,
author = "P. Oehlert",
title = "Violating assumptions with fuzzing",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "2",
pages = "58--62",
month = mar # "\slash " # apr,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.55",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jul 26 18:29:12 MDT 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/30742/01423963.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30742&arnumber=1423963&count=15&index=9",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Levy:2005:WPG,
author = "E. Levy",
title = "Worm propagation and generic attacks",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "2",
pages = "63--65",
month = mar # "\slash " # apr,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.57",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jul 26 18:29:12 MDT 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/30742/01423964.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30742&arnumber=1423964&count=15&index=10",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Smith:2005:TMS,
author = "S. W. Smith",
title = "{Turing} is from {Mars}, {Shannon} is from {Venus}:
computer science and computer engineering",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "2",
pages = "66--69",
month = mar # "\slash " # apr,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.54",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jul 26 18:29:12 MDT 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/30742/01423965.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30742&arnumber=1423965&count=15&index=11",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Power:2005:ASM,
author = "E. M. Power and R. L. Trope",
title = "Averting security missteps in outsourcing",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "2",
pages = "70--73",
month = mar # "\slash " # apr,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.36",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jul 26 18:29:12 MDT 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/30742/01423966.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30742&arnumber=1423966&count=15&index=12",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Barnum:2005:KSS,
author = "S. Barnum and G. McGraw",
title = "Knowledge for software security",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "2",
pages = "74--78",
month = mar # "\slash " # apr,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.45",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jul 26 18:29:12 MDT 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/30742/01423967.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30742&arnumber=1423967&count=15&index=13",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Geer:2005:PSP,
author = "D. {Geer, Jr.}",
title = "The Problem Statement is the Problem",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "2",
pages = "80--80",
month = mar # "\slash " # apr,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.53",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jul 26 18:29:12 MDT 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/30742/01423969.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30742&arnumber=1423969&count=15&index=14",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Schneider:2005:IDW,
author = "F. B. Schneider",
title = "It Depends on What You Pay",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "3",
pages = "3--3",
month = may # "\slash " # jun,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.72",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jul 26 18:29:12 MDT 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/31002/01439491.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439491&count=20&index=0",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Stytz:2005:UB,
author = "M. R. Stytz",
title = "Under the {Black Hat}",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "3",
pages = "5--5",
month = may # "\slash " # jun,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.83",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jul 26 18:29:12 MDT 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/31002/01439493.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439493&count=20&index=1",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{McLaughlin:2005:IHS,
author = "L. McLaughlin",
title = "Interview: Holistic Security",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "3",
pages = "6--8",
month = may # "\slash " # jun,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.71",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jul 26 18:29:12 MDT 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/31002/01439494.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439494&count=20&index=2",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Landau:2005:OCS,
author = "S. Landau and M. R. Stytz",
title = "Overview of cyber security: a crisis of
prioritization",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "3",
pages = "9--11",
month = may # "\slash " # jun,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.76",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jul 26 18:29:12 MDT 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/31002/01439495.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439495&count=20&index=3",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Amin:2005:GEI,
author = "M. Amin",
title = "{Guest Editor}'s Introduction: Infrastructure
Security--Reliability and Dependability of Critical
Systems",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "3",
pages = "15--17",
month = may # "\slash " # jun,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.68",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jul 26 18:29:12 MDT 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/31002/01439497.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439497&count=20&index=4",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Sahinoglu:2005:SMP,
author = "M. Sahinoglu",
title = "Security meter: a practical decision-tree model to
quantify risk",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "3",
pages = "18--24",
month = may # "\slash " # jun,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.81",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jul 26 18:29:12 MDT 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/31002/01439498.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439498&count=20&index=5",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Cai:2005:CIW,
author = "Min Cai and Kai Hwang and Yu-Kwong Kwok and Shanshan
Song and Yu Chen",
title = "Collaborative {Internet} worm containment",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "3",
pages = "25--33",
month = may # "\slash " # jun,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.63",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jul 26 18:29:12 MDT 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/31002/01439499.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439499&count=20&index=6",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Garfinkel:2005:RPO,
author = "S. L. Garfinkel and A. Juels and R. Pappu",
title = "{RFID} privacy: an overview of problems and proposed
solutions",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "3",
pages = "34--43",
month = may # "\slash " # jun,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.78",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jul 26 18:29:12 MDT 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/31002/01439500.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439500&count=20&index=7",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Walsh:2005:CSV,
author = "T. J. Walsh and D. R. Kuhn",
title = "Challenges in securing voice over {IP}",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "3",
pages = "44--49",
month = may # "\slash " # jun,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.62",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jul 26 18:29:12 MDT 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/31002/01439501.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439501&count=20&index=8",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Senior:2005:EVP,
author = "A. Senior and S. Pankanti and A. Hampapur and L. Brown
and Ying-Li Tian and A. Ekin and J. Connell and Chiao
Fe Shu and M. Lu",
title = "Enabling video privacy through computer vision",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "3",
pages = "50--57",
month = may # "\slash " # jun,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.65",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jul 26 18:29:12 MDT 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/31002/01439502.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439502&count=20&index=9",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Donner:2005:YGF,
author = "M. Donner",
title = "A young geek's fancy turns to\ldots{} science fiction?
[Book recommendations]",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "3",
pages = "58--60",
month = may # "\slash " # jun,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.59",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jul 26 18:29:12 MDT 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/31002/01439503.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439503&count=20&index=10",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Irvine:2005:CGI,
author = "C. E. Irvine and M. F. Thompson and K. Allen",
title = "{CyberCIEGE}: gaming for information assurance",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "3",
pages = "61--64",
month = may # "\slash " # jun,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.64",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jul 26 18:29:12 MDT 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/31002/01439504.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439504&count=20&index=11",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Snow:2005:FWI,
author = "B. Snow",
title = "Four ways to improve security",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "3",
pages = "65--67",
month = may # "\slash " # jun,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.66",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jul 26 18:29:12 MDT 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/31002/01439505.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439505&count=20&index=12",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Gutmann:2005:WHC,
author = "P. Gutmann and D. Naccache and C. C. Palmer",
title = "When hashes collide [applied cryptography]",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "3",
pages = "68--71",
month = may # "\slash " # jun,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.84",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jul 26 18:29:12 MDT 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/31002/01439506.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439506&count=20&index=13",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Ford:2005:MMR,
author = "R. Ford",
title = "Malcode mysteries revealed [computer viruses and
worms]",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "3",
pages = "72--75",
month = may # "\slash " # jun,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.73",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jul 26 18:29:12 MDT 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/31002/01439507.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439507&count=20&index=14",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Holz:2005:SVB,
author = "T. Holz",
title = "A short visit to the bot zoo [malicious bots
software]",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "3",
pages = "76--79",
month = may # "\slash " # jun,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.58",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jul 26 18:29:12 MDT 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/31002/01439508.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439508&count=20&index=15",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Salka:2005:PLS,
author = "C. Salka",
title = "Programming languages and systems security",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "3",
pages = "80--83",
month = may # "\slash " # jun,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.77",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jul 26 18:29:12 MDT 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/31002/01439509.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439509&count=20&index=16",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Lesk:2005:SBF,
author = "M. Lesk",
title = "Salute the broadcast flag [digital protection for {TV}
recording]",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "3",
pages = "84--87",
month = may # "\slash " # jun,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.79",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jul 26 18:29:12 MDT 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/31002/01439510.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439510&count=20&index=17",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Taylor:2005:ASS,
author = "D. Taylor and G. McGraw",
title = "Adopting a software security improvement program",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "3",
pages = "88--91",
month = may # "\slash " # jun,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.60",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jul 26 18:29:12 MDT 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/31002/01439511.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439511&count=20&index=18",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Bellovin:2005:SPE,
author = "S. Bellovin",
title = "Security and Privacy: Enemies or Allies?",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "3",
pages = "92--92",
month = may # "\slash " # jun,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.80",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Jul 26 18:29:12 MDT 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/31002/01439512.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439512&count=20&index=19",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Cybenko:2005:OEM,
author = "George Cybenko",
title = "The One-Eyed Man Is King",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "4",
pages = "4--5",
month = jul # "\slash " # aug,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.108",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Mon Nov 21 08:38:09 MST 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2005/04/j4004.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Paul:2005:CLV,
author = "Nathanael Paul",
title = "A Closer Look at Viruses and Worms",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "4",
pages = "7",
month = jul # "\slash " # aug,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.86",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Mon Nov 21 08:38:09 MST 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2005/04/j4007.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Alfonsi:2005:AAV,
author = "Benjamin Alfonsi",
title = "Alliance Addresses {VoIP} Security",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "4",
pages = "8",
month = jul # "\slash " # aug,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.92",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Mon Nov 21 08:38:09 MST 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2005/04/j4008.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Apvrille:2005:SSD,
author = "Axelle Apvrille and Makan Pourzandi",
title = "Secure Software Development by Example",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "4",
pages = "10--17",
month = jul # "\slash " # aug,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.103",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Mon Nov 21 08:38:09 MST 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Ray:2005:TAA,
author = "Helayne T. Ray and Raghunath Vemuri and Hariprasad R.
Kantubhukta",
title = "Toward an Automated Attack Model for {Red} Teams",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "4",
pages = "18--25",
month = jul # "\slash " # aug,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.111",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Mon Nov 21 08:38:09 MST 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Bailey:2005:BWT,
author = "Michael Bailey and Evan Cooke and Farnam Jahanian and
David Watson and Jose Nazario",
title = "The {Blaster Worm}: Then and Now",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "4",
pages = "26--31",
month = jul # "\slash " # aug,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.106",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Mon Nov 21 08:38:09 MST 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Lekkas:2005:HRS,
author = "Dimitrios Lekkas and Diomidis Spinellis",
title = "Handling and Reporting Security Advisories: a
Scorecard Approach",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "4",
pages = "32--41",
month = jul # "\slash " # aug,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.98",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Mon Nov 21 08:38:09 MST 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Gattiker:2005:E,
author = "Urs E. Gattiker",
title = "{EICAR 2005}",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "4",
pages = "45--48",
month = jul # "\slash " # aug,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.96",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Mon Nov 21 08:38:09 MST 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Bishop:2005:HEL,
author = "Matt Bishop and Deborah Frincke",
title = "A Human Endeavor: Lessons from {Shakespeare} and
Beyond",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "4",
pages = "49--51",
month = jul # "\slash " # aug,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.87",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Mon Nov 21 08:38:09 MST 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Mulvenon:2005:TCS,
author = "James Mulvenon",
title = "Toward a Cyberconflict Studies Research Agenda",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "4",
pages = "52--55",
month = jul # "\slash " # aug,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.110",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Mon Nov 21 08:38:09 MST 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Gutmann:2005:SU,
author = "Peter Gutmann and Ian Grigg",
title = "Security Usability",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "4",
pages = "56--58",
month = jul # "\slash " # aug,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.104",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Mon Nov 21 08:38:09 MST 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Allen:2005:CF,
author = "William H. Allen",
title = "Computer Forensics",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "4",
pages = "59--62",
month = jul # "\slash " # aug,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.95",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Mon Nov 21 08:38:09 MST 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Arce:2005:LB,
author = "Iv{\'a}n Arce",
title = "The Land of the Blind",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "4",
pages = "63--67",
month = jul # "\slash " # aug,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.107",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Mon Nov 21 08:38:09 MST 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Sinclair:2005:TPT,
author = "Sara Sinclair and S. W. Smith",
title = "The {TIPPI} Point: Toward Trustworthy Interfaces",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "4",
pages = "68--71",
month = jul # "\slash " # aug,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.109",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Mon Nov 21 08:38:09 MST 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Stytz:2005:PPP,
author = "Martin R. Stytz",
title = "Protecting Personal Privacy: Hauling Down the {Jolly
Roger}",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "4",
pages = "72--74",
month = jul # "\slash " # aug,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.102",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Mon Nov 21 08:38:09 MST 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Mead:2005:PSS,
author = "Nancy R. Mead and Gary McGraw",
title = "A Portal for Software Security",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "4",
pages = "75--79",
month = jul # "\slash " # aug,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.88",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Mon Nov 21 08:38:09 MST 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Donner:2005:TAN,
author = "Marc Donner",
title = "There Ain't No Inside, There Ain't No
Outside\ldots{}",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "5",
pages = "4--5",
month = sep # "\slash " # oct,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.135",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Mon Nov 21 08:37:34 MST 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2005/05/j5004.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Webb:2005:BSS,
author = "Katharine W. Webb",
title = "Biometric Security Solutions",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "5",
pages = "7",
month = sep # "\slash " # oct,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.117",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Mon Nov 21 08:37:34 MST 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2005/05/j5007.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Drinan:2005:NBa,
author = "Heather Drinan and Brent Kesler",
title = "News Briefs",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "5",
pages = "8--10",
month = sep # "\slash " # oct,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.130",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Mon Nov 21 08:37:34 MST 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2005/05/j5008.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{McLaughlin:2005:AGP,
author = "Laurianne McLaughlin",
title = "From {AWK} to {Google}: {Peter Weinberger} Talks
Search",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "5",
pages = "11--13",
month = sep # "\slash " # oct,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.123",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Mon Nov 21 08:37:34 MST 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2005/05/j5011.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Carminati:2005:EPI,
author = "Barbara Carminati and Elena Ferrari and Patrick C. K.
Hung",
title = "Exploring Privacy Issues in {Web} Services Discovery
Agencies",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "5",
pages = "14--21",
month = sep # "\slash " # oct,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.121",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Mon Nov 21 08:37:34 MST 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Huberman:2005:VP,
author = "Bernardo A. Huberman and Eytan Adar and Leslie R.
Fine",
title = "Valuating Privacy",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "5",
pages = "22--25",
month = sep # "\slash " # oct,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.137",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Mon Nov 21 08:37:34 MST 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Hoffman:2005:ENC,
author = "Lance J. Hoffman and Tim Rosenberg and Ronald Dodge
and Daniel Ragsdale",
title = "Exploring a National Cybersecurity Exercise for
Universities",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "5",
pages = "27--33",
month = sep # "\slash " # oct,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.120",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Mon Nov 21 08:37:34 MST 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Schneider:2005:ITS,
author = "Fred B. Schneider and Lidong Zhou",
title = "Implementing Trustworthy Services Using Replicated
State Machines",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "5",
pages = "34--43",
month = sep # "\slash " # oct,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.125",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Mon Nov 21 08:37:34 MST 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Reeder:2005:S,
author = "Robert W. Reeder and Fahd Arshad",
title = "Soups 2005",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "5",
pages = "47--50",
month = sep # "\slash " # oct,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.131",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Mon Nov 21 08:37:34 MST 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Kuper:2005:SS,
author = "Peter Kuper",
title = "The State of Security",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "5",
pages = "51--53",
month = sep # "\slash " # oct,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.134",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Mon Nov 21 08:37:34 MST 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Bishop:2005:TSP,
author = "Matt Bishop and Deborah A. Frincke",
title = "Teaching Secure Programming",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "5",
pages = "54--56",
month = sep # "\slash " # oct,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.133",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Mon Nov 21 08:37:34 MST 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Miller:2005:TPC,
author = "Ann Miller",
title = "Trends in Process Control Systems Security",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "5",
pages = "57--60",
month = sep # "\slash " # oct,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.136",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Mon Nov 21 08:37:34 MST 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Naccache:2005:FF,
author = "David Naccache",
title = "Finding Faults",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "5",
pages = "61--65",
month = sep # "\slash " # oct,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.122",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Mon Nov 21 08:37:34 MST 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Torr:2005:DTM,
author = "Peter Torr",
title = "Demystifying the Threat-Modeling Process",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "5",
pages = "66--70",
month = sep # "\slash " # oct,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.119",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Mon Nov 21 08:37:34 MST 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Nicol:2005:MSS,
author = "David M. Nicol",
title = "Modeling and Simulation in Security Evaluation",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "5",
pages = "71--74",
month = sep # "\slash " # oct,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.129",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Mon Nov 21 08:37:34 MST 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{vanWyk:2005:BGB,
author = "Kenneth R. van Wyk and Gary McGraw",
title = "Bridging the Gap between Software Development and
Information Security",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "5",
pages = "75--79",
month = sep # "\slash " # oct,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.118",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Mon Nov 21 08:37:34 MST 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Geer:2005:WPS,
author = "Dan Geer",
title = "When Is a Product a Security Product?",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "5",
pages = "80",
month = sep # "\slash " # oct,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.138",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Mon Nov 21 08:37:34 MST 2005",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2005/05/j5080.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Libicki:2005:RCG,
author = "Martin Libicki",
title = "Are {RFIDs} Coming to Get You?",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "6",
pages = "6--6",
month = nov # "\slash " # dec,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.142",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Feb 9 18:53:30 MST 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/33104/01556529.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33104&arnumber=1556529",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Drinan:2005:NBb,
author = "Heather Drinan and Nancy Fontaine and Brent Kesler",
title = "News Briefs",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "6",
pages = "7--8",
month = nov # "\slash " # dec,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.154",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:41 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{McLaughlin:2005:WGR,
author = "Laurianne McLaughlin",
title = "Winning the Game of Risk: {Neumann}'s Take on Sound
Design",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "6",
pages = "9--12",
month = nov # "\slash " # dec,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.164",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Feb 9 18:53:30 MST 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/33104/01556531.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33104&arnumber=1556531",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Sherr:2005:SVW,
author = "Michah Sherr and Eric Cronin and Sandy Clark and Matt
Blaze",
title = "Signaling vulnerabilities in wiretapping systems",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "6",
pages = "13--25",
month = nov # "\slash " # dec,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.160",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Feb 9 18:53:30 MST 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/33104/01556532.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33104&arnumber=1556532",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Landau:2005:SWI,
author = "Susan Landau",
title = "Security, wiretapping, and the {Internet}",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "6",
pages = "26--33",
month = nov # "\slash " # dec,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.158",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Feb 9 18:53:30 MST 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/33104/01556533.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33104&arnumber=1556533",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Campbell:2005:DSD,
author = "Philip L. Campbell",
title = "The denial-of-service dance",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "6",
pages = "34--40",
month = nov # "\slash " # dec,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.162",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Feb 9 18:53:30 MST 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/33104/01556534.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33104&arnumber=1556534",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Sidiroglou:2005:CNW,
author = "Stelios Sidiroglou and Angelos D. Keromytis",
title = "Countering network worms through automatic patch
generation",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "6",
pages = "41--49",
month = nov # "\slash " # dec,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.144",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Feb 9 18:53:30 MST 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/33104/01556535.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33104&arnumber=1556535",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Conti:2005:FCD,
author = "Gregory Conti and Mustaque Ahamad",
title = "A framework for countering denial-of-information
attacks",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "6",
pages = "50--56",
month = nov # "\slash " # dec,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.140",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Feb 9 18:53:30 MST 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/33104/01556536.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33104&arnumber=1556536",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Keikkila:2005:SE,
author = "Faith M. Keikkila",
title = "{SecureWorld Expo 2005}",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "6",
pages = "57--60",
month = nov # "\slash " # dec,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.156",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Feb 9 18:53:30 MST 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/33104/01556537.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33104&arnumber=1556537",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Sheoran:2005:DSI,
author = "Pinny Sheoran and Oria Friesen and Barbara J. {Huffman
de Bel{\'o}n}",
title = "Developing and Sustaining Information Assurance: The
Role of Community Colleges (Part 1)",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "6",
pages = "61--63",
month = nov # "\slash " # dec,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.145",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Feb 9 18:53:30 MST 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/33104/01556538.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33104&arnumber=1556538",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Borg:2005:ECC,
author = "Scott Borg",
title = "Economically complex cyberattacks",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "6",
pages = "64--67",
month = nov # "\slash " # dec,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.146",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Feb 9 18:53:30 MST 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/33104/01556539.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33104&arnumber=1556539",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Marin:2005:NSB,
author = "Gerald A. Marin",
title = "Network security basics",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "6",
pages = "68--72",
month = nov # "\slash " # dec,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.153",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Feb 9 18:53:30 MST 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/33104/01556540.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33104&arnumber=1556540",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Smith:2005:PSS,
author = "S. W. Smith",
title = "Pretending that systems are secure",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "6",
pages = "73--76",
month = nov # "\slash " # dec,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.155",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Feb 9 18:53:30 MST 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/33104/01556541.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33104&arnumber=1556541",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Power:2005:ARG,
author = "E. Michael Power and Roland L. Trope",
title = "Acting responsibly with geospatial data",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "6",
pages = "77--80",
month = nov # "\slash " # dec,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.141",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Feb 9 18:53:30 MST 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/33104/01556542.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33104&arnumber=1556542",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Tsipenyuk:2005:SPK,
author = "Katrina Tsipenyuk and Brian Chess and Gary McGraw",
title = "Seven pernicious kingdoms: a taxonomy of software
security errors",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "6",
pages = "81--84",
month = nov # "\slash " # dec,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.159",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Feb 9 18:53:30 MST 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/33104/01556543.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33104&arnumber=1556543",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Phillips:2005:SSR,
author = "Ted Phillips and Ttom Karygiannis and Rick Kuhn",
title = "Security standards for the {RFID} market",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "6",
pages = "85--89",
month = nov # "\slash " # dec,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.157",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Feb 9 18:53:30 MST 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/33104/01556544.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33104&arnumber=1556544",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Anonymous:2005:AI,
author = "Anonymous",
title = "2005 Annual Index",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "6",
pages = "90--95",
month = nov # "\slash " # dec,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.139",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:41 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Schneier:2005:ZS,
author = "Bruce Schneier",
title = "The {Zotob} Storm",
journal = j-IEEE-SEC-PRIV,
volume = "3",
number = "6",
pages = "96--96",
month = nov # "\slash " # dec,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2005.163",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Feb 9 18:53:30 MST 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/33104/01556546.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33104&arnumber=1556546",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Cybenko:2006:WJC,
author = "George Cybenko",
title = "Why {Johnny} Can't Evaluate Security Risk",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "1",
pages = "5--5",
month = jan # "\slash " # feb,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.30",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Feb 9 18:53:31 MST 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/33481/01588814.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33481&arnumber=1588814",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Anonymous:2006:STS,
author = "Anonymous",
title = "Special Thanks to {S\&P}'s Reviewers",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "1",
pages = "7--8",
month = jan # "\slash " # feb,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.21",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Feb 9 18:53:31 MST 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Diffie:2006:CAS,
author = "Whitfield Diffie",
title = "Chattering about {SIGINT}",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "1",
pages = "9--9",
month = jan # "\slash " # feb,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.9",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Feb 9 18:53:31 MST 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/33481/01588817.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33481&arnumber=1588817",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{McLaughlin:2006:PZW,
author = "Laurianne McLaughlin",
title = "{Philip Zimmermann} on {What's Next after PGP?}",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "1",
pages = "10--13",
month = jan # "\slash " # feb,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.20",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Feb 9 18:53:31 MST 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/33481/01588818.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33481&arnumber=1588818",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Drinan:2006:NB,
author = "Heather Drinan and Nancy Fontaine and Brent Kesler",
title = "News Briefs",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "1",
pages = "14--16",
month = jan # "\slash " # feb,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.19",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Feb 9 18:53:31 MST 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/33481/01588819.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33481&arnumber=1588819",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Felten:2006:DRM,
author = "Edward W. Felten and J. Alex Halderman",
title = "Digital Rights Management, Spyware, and Security",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "1",
pages = "18--23",
month = jan # "\slash " # feb,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.12",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Feb 9 18:53:31 MST 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/33481/01588821.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33481&arnumber=1588821",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Levine:2006:DCK,
author = "John G. Levine and Julian B. Grizzard and Henry L.
Owen",
title = "Detecting and Categorizing Kernel-Level Rootkits to
Aid Future Detection",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "1",
pages = "24--32",
month = jan # "\slash " # feb,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.11",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Feb 9 18:53:31 MST 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/33481/01588822.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33481&arnumber=1588822",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Kshetri:2006:SEC,
author = "Nir Kshetri",
title = "The Simple Economics of Cybercrimes",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "1",
pages = "33--39",
month = jan # "\slash " # feb,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.27",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Feb 9 18:53:31 MST 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/33481/01588823.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33481&arnumber=1588823",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Cheung:2006:DSA,
author = "Steven Cheung",
title = "Denial of Service against the {Domain Name System}",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "1",
pages = "40--45",
month = jan # "\slash " # feb,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.10",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Feb 9 18:53:31 MST 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/33481/01588824.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33481&arnumber=1588824",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Black:2006:SAI,
author = "John Black and Martin Cochran and Ryan Gardner",
title = "A Security Analysis of the {Internet Chess Club}",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "1",
pages = "46--52",
month = jan # "\slash " # feb,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.2",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Feb 9 18:53:31 MST 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/33481/01588825.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33481&arnumber=1588825",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Rechberger:2006:NCW,
author = "Christian Rechberger and Vincent Rijmen and Nicolas
Sklavos",
title = "The {NIST Cryptographic Workshop on Hash Functions}",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "1",
pages = "54--56",
month = jan # "\slash " # feb,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.26",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Feb 9 18:53:31 MST 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/33481/01588827.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33481&arnumber=1588827;
http://www.csrc.nist.gov/pki/HashWorkshop/",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
remark = "October 31--November 1, 2005 Gaithersburg, MD, USA.
Second workshop August 24--25, 2006, Santa Barbara, CA,
USA.",
}
@Article{Rosenberg:2006:TNR,
author = "Timothy Rosenberg and Lance J. Hoffman",
title = "Taking Networks on the Road: Portable Solutions for
Security Educators",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "1",
pages = "57--60",
month = jan # "\slash " # feb,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.25",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Feb 9 18:53:31 MST 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/33481/01588828.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33481&arnumber=1588828",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Anonymous:2006:EC,
author = "Anonymous",
title = "2006 Editorial Calendar",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "1",
pages = "61--61",
month = jan # "\slash " # feb,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.1",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Feb 9 18:53:31 MST 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Gligor:2006:IAT,
author = "Virgil D. Gligor and Tom Haigh and Dick Kemmerer and
Carl Landwehr and Steve Lipner and John McLean",
title = "Information Assurance Technology Forecast 2005",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "1",
pages = "62--69",
month = jan # "\slash " # feb,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.14",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Feb 9 18:53:31 MST 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/33481/01588830.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33481&arnumber=1588830",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Coron:2006:WC,
author = "Jean-Sebastien Coron",
title = "What Is Cryptography?",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "1",
pages = "70--73",
month = jan # "\slash " # feb,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.29",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Feb 9 18:53:31 MST 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/33481/01588831.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33481&arnumber=1588831",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Seacord:2006:SCC,
author = "Robert Seacord",
title = "Secure Coding in {C} and {C++}: Of Strings and
Integers",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "1",
pages = "74--76",
month = jan # "\slash " # feb,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.22",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Feb 9 18:53:31 MST 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/33481/01588832.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33481&arnumber=1588832",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Ruiu:2006:LIS,
author = "Dragos Ruiu",
title = "Learning from Information Security History",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "1",
pages = "77--79",
month = jan # "\slash " # feb,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.17",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Feb 9 18:53:31 MST 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/33481/01588833.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33481&arnumber=1588833",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Epstein:2006:SSS,
author = "Jeremy Epstein and Scott Matsumoto and Gary McGraw",
title = "Software Security and {SOA}: {Danger, Will
Robinson}!",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "1",
pages = "80--83",
month = jan # "\slash " # feb,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.23",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Feb 9 18:53:31 MST 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/33481/01588834.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33481&arnumber=1588834",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Chandramouli:2006:CSD,
author = "Ramaswamy Chandramouli and Scott Rose",
title = "Challenges in Securing the {Domain Name System}",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "1",
pages = "84--87",
month = jan # "\slash " # feb,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.8",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Feb 9 18:53:31 MST 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/33481/01588835.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33481&arnumber=1588835",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Bellovin:2006:UW,
author = "Steve Bellovin",
title = "Unconventional Wisdom",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "1",
pages = "88--88",
month = jan # "\slash " # feb,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.28",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Feb 9 18:53:31 MST 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://ieeexplore.ieee.org/iel5/8013/33481/01588836.pdf;
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33481&arnumber=1588836",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Donner:2006:ID,
author = "Marc Donner",
title = "The Impending Debate",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "2",
pages = "4--5",
month = mar # "\slash " # apr,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.55",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Mon Apr 3 07:36:16 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2006/02/j2004.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Felker:2006:IWG,
author = "Mikhael Felker",
title = "{Internet} War Games: Power of the Masses",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "2",
pages = "7",
month = mar # "\slash " # apr,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.44",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Mon Apr 3 07:36:16 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2006/02/j2007.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Kesler:2006:NBa,
author = "Brent Kesler and Heather Drinan and Nancy Fontaine",
title = "News Briefs",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "2",
pages = "8--13",
month = mar # "\slash " # apr,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.47",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Mon Apr 3 07:36:16 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2006/02/j2008.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Hole:2006:CSO,
author = "Kjell J. Hole and Vebj{\o}rn Moen and Thomas
Tj{\o}stheim",
title = "Case Study: Online Banking Security",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "2",
pages = "14--20",
month = mar # "\slash " # apr,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.36",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Mon Apr 3 07:36:16 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Hiltgen:2006:SIB,
author = "Alain Hiltgen and Thorsten Kramp and Thomas Weigold",
title = "Secure {Internet} Banking Authentication",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "2",
pages = "21--29",
month = mar # "\slash " # apr,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.50",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Mon Apr 3 07:36:16 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Wang:2006:CFC,
author = "WenJie Wang and Yufei Yuan and Norm Archer",
title = "A Contextual Framework for Combating Identity Theft",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "2",
pages = "30--38",
month = mar # "\slash " # apr,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.31",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Mon Apr 3 07:36:16 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Hwang:2006:SES,
author = "David D. Hwang and Patrick Schaumont and Kris Tiri and
Ingrid Verbauwhede",
title = "Securing Embedded Systems",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "2",
pages = "40--49",
month = mar # "\slash " # apr,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.51",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Mon Apr 3 07:36:16 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Keblawi:2006:ACC,
author = "Feisal Keblawi and Dick Sullivan",
title = "Applying the Common Criteria in Systems Engineering",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "2",
pages = "50--55",
month = mar # "\slash " # apr,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.35",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Mon Apr 3 07:36:16 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Kuper:2006:WIF,
author = "Peter Kuper",
title = "A Warning to Industry---Fix It or Lose It",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "2",
pages = "56--60",
month = mar # "\slash " # apr,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.32",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Mon Apr 3 07:36:16 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Bishop:2006:WOY,
author = "Matt Bishop and Deborah A. Frincke",
title = "Who Owns Your Computer?",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "2",
pages = "61--63",
month = mar # "\slash " # apr,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.56",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Mon Apr 3 07:36:16 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Gennaro:2006:RC,
author = "Rosario Gennaro",
title = "Randomness in Cryptography",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "2",
pages = "64--67",
month = mar # "\slash " # apr,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.49",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Mon Apr 3 07:36:16 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Whittaker:2006:HTA,
author = "James A. Whittaker and Richard Ford",
title = "How to Think about Security",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "2",
pages = "68--71",
month = mar # "\slash " # apr,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.39",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Mon Apr 3 07:36:16 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Holz:2006:NTA,
author = "Thorsten Holz and Simon Marechal and Fr{\'e}d{\'e}ric
Raynal",
title = "New Threats and Attacks on the {World Wide Web}",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "2",
pages = "72--75",
month = mar # "\slash " # apr,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.46",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Mon Apr 3 07:36:16 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Bradner:2006:EEE,
author = "Scott Bradner",
title = "The End of End-to-End Security?",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "2",
pages = "76--79",
month = mar # "\slash " # apr,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.54",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Mon Apr 3 07:36:16 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Lesk:2006:SIF,
author = "Michael Lesk",
title = "Should Indexing Be Fair Use? {The} Battle over
{Google} Book Search",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "2",
pages = "80--83",
month = mar # "\slash " # apr,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.52",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Mon Apr 3 07:36:16 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
abstract = "In late 2004, Google announced as part of its Library
Project that it would scan millions of books into a
searchable online database accessible to anyone using
Google Book Search (http://books.google.com). In
response, the US Authors Guild and the Association of
American Publishers (AAP) sued Google, claiming its
book scanning is ``massive copyright infringement.''
Google says its indexing is a legitimate fair use. As
in all such discussions, two different questions arise:
What does the law say? What would be good public
policy?",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Steven:2006:AES,
author = "John Steven",
title = "Adopting an Enterprise Software Security Framework",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "2",
pages = "84--87",
month = mar # "\slash " # apr,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.33",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Mon Apr 3 07:36:16 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Burr:2006:CHS,
author = "William E. Burr",
title = "Cryptographic Hash Standards: Where Do We Go from
Here?",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "2",
pages = "88--91",
month = mar # "\slash " # apr,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.37",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Mon Apr 3 07:36:16 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Anonymous:2006:ISPa,
author = "Anonymous",
title = "{IEEE Security \& Privacy} 2006 Editorial Calendar",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "2",
pages = "92",
month = mar # "\slash " # apr,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.41",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:42 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Schneider:2006:HD,
author = "Fred B. Schneider",
title = "Here Be Dragons",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "3",
pages = "3",
month = may # "\slash " # jun,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.68",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Oct 24 17:28:08 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2006/03/j3003.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Pfleeger:2006:EYW,
author = "Shari Lawrence Pfleeger",
title = "Everything You Wanted to Know about Privacy (But Were
Afraid to Ask)",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "3",
pages = "5",
month = may # "\slash " # jun,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.65",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Oct 24 17:28:08 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2006/03/j3005.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Kesler:2006:NBb,
author = "Brent Kesler and Heather Drinan",
title = "News Briefs",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "3",
pages = "6--10",
month = may # "\slash " # jun,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.76",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Oct 24 17:28:08 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2006/03/j3006.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{McGraw:2006:ISBa,
author = "Gary McGraw",
title = "Interview: {Silver Bullet} Speaks to {Avi Rubin}",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "3",
pages = "11--13",
month = may # "\slash " # jun,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.78",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Oct 24 17:28:08 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Dempsey:2006:GEI,
author = "James X. Dempsey and Ira Rubinstein",
title = "{Guest Editors}' Introduction: Lawyers and
Technologists---Joined at the Hip?",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "3",
pages = "15--19",
month = may # "\slash " # jun,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.67",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Oct 24 17:28:08 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2006/03/j3015.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Bellia:2006:FAE,
author = "Patricia L. Bellia",
title = "The {Fourth Amendment} and Emerging Communications
Technologies",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "3",
pages = "20--28",
month = may # "\slash " # jun,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.80",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Oct 24 17:28:08 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Gidari:2006:DRW,
author = "Albert Gidari",
title = "Designing the Right Wiretap Solution: Setting
Standards under {CALEA}",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "3",
pages = "29--36",
month = may # "\slash " # jun,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.62",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Oct 24 17:28:08 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Egan:2006:BBF,
author = "Erin Egan and Tim Jucovy",
title = "Building a Better Filter: How To Create a Safer
{Internet} and Avoid the Litigation Trap",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "3",
pages = "37--44",
month = may # "\slash " # jun,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.59",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Oct 24 17:28:08 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Curran:2006:CSS,
author = "Charles D. Curran",
title = "Combating Spam, Spyware, and Other Desktop Intrusions:
Legal Considerations in Operating Trusted Intermediary
Technologies",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "3",
pages = "45--51",
month = may # "\slash " # jun,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.60",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Oct 24 17:28:08 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Schaffer:2006:WVB,
author = "Gregory P. Schaffer",
title = "Worms and Viruses and Botnets, Oh My!: Rational
Responses to Emerging {Internet} Threats",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "3",
pages = "52--58",
month = may # "\slash " # jun,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.83",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Oct 24 17:28:08 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Sheoran:2006:DSI,
author = "Pinny Sheoran and Oris Friesen and Barbara J. {Huffman
de Bel{\'o}n}",
title = "Developing and Sustaining Information Assurance: The
Role of Community Colleges, Part 2",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "3",
pages = "60--65",
month = may # "\slash " # jun,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.63",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Oct 24 17:28:08 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Bloomfield:2006:IWG,
author = "Robin E. Bloomfield and Sofia Guerra and Ann Miller
and Marcelo Masera and Charles B. Weinstock",
title = "International Working Group on Assurance Cases (for
Security)",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "3",
pages = "66--68",
month = may # "\slash " # jun,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.73",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Oct 24 17:28:08 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Paterson:2006:LTT,
author = "Kenneth G. Paterson and Arnold K. L. Yau",
title = "Lost in Translation: Theory and Practice in
Cryptography",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "3",
pages = "69--72",
month = may # "\slash " # jun,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.74",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Oct 24 17:28:08 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Aura:2006:WYS,
author = "Tuomas Aura",
title = "Why You Shouldn't Study Security",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "3",
pages = "74--76",
month = may # "\slash " # jun,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.82",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Oct 24 17:28:08 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Stytz:2006:DSS,
author = "Martin R. Stytz and Sheila B. Banks",
title = "Dynamic Software Security Testing",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "3",
pages = "77--79",
month = may # "\slash " # jun,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.64",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Oct 24 17:28:08 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Chandra:2006:PTW,
author = "Pravir Chandra and Brian Chess and John Steven",
title = "Putting the Tools to Work: How to Succeed with Source
Code Analysis",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "3",
pages = "80--83",
month = may # "\slash " # jun,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.77",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Oct 24 17:28:08 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Anderson:2006:WSP,
author = "Anne Anderson",
title = "{Web} Services Policies (Abstract)",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "3",
pages = "84--87",
month = may # "\slash " # jun,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.81",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Oct 24 17:28:08 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Geer:2006:CA,
author = "Daniel E. {Geer, Jr.}",
title = "Convergence (Abstract)",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "3",
pages = "88--88",
month = may # "\slash " # jun,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.61",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Oct 24 17:28:08 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Landwehr:2006:SP,
author = "Carl E. Landwehr",
title = "Speaking of Privacy",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "4",
pages = "4--5",
month = jul # "\slash " # aug,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.105",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Oct 24 17:28:16 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2006/04/j4004.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Kesler:2006:NBc,
author = "Brent Kesler and Heather Drinan",
title = "News Briefs",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "4",
pages = "6--8",
month = jul # "\slash " # aug,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.100",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Oct 24 17:28:16 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2006/04/j4006.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Pfleeger:2006:WWW,
author = "Charles P. Pfleeger and Shari Lawrence Pfleeger",
title = "Why We Won't Review Books by Hackers",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "4",
pages = "9",
month = jul # "\slash " # aug,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.111",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Oct 24 17:28:16 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2006/04/j4009.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{McGraw:2006:ISBb,
author = "Gary McGraw",
title = "Interview: {Silver Bullet} Speaks with {Dan Geer}",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "4",
pages = "10--13",
month = jul # "\slash " # aug,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.104",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Oct 24 17:28:16 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Andrews:2006:GEI,
author = "Mike Andrews",
title = "{Guest Editor}'s Introduction: The State of {Web}
Security",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "4",
pages = "14--15",
month = jul # "\slash " # aug,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.88",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Oct 24 17:28:16 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2006/04/j4014.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Meier:2006:WAS,
author = "J. D. Meier",
title = "{Web} Application Security Engineering",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "4",
pages = "16--24",
month = jul # "\slash " # aug,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.109",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Oct 24 17:28:16 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Viega:2006:WAS,
author = "John Viega and Jeremy Epstein",
title = "Why Applying Standards to {Web} Services Is Not
Enough",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "4",
pages = "25--31",
month = jul # "\slash " # aug,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.110",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Oct 24 17:28:16 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Curphey:2006:WAS,
author = "Mark Curphey and Rudolph Araujo",
title = "{Web} Application Security Assessment Tools",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "4",
pages = "32--41",
month = jul # "\slash " # aug,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.108",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Oct 24 17:28:16 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Verdon:2006:SPS,
author = "Denis Verdon",
title = "Security Policies and the Software Developer",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "4",
pages = "42--49",
month = jul # "\slash " # aug,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.103",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Oct 24 17:28:16 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Brooks:2006:KAN,
author = "Richard R. Brooks and Christopher Vutsinas",
title = "{Kafka} in the Academy: a Note on Ethics in {IA}
Education",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "4",
pages = "50--53",
month = jul # "\slash " # aug,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.96",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Oct 24 17:28:16 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Verissimo:2006:ITM,
author = "Paulo E. Ver{\'\i}ssimo and Nuno F. Neves and
Christian Cachin and Jonathan Poritz and David Powell
and Yves Deswarte and Robert Stroud and Ian Welch",
title = "Intrusion-Tolerant Middleware: The Road to Automatic
Security",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "4",
pages = "54--62",
month = jul # "\slash " # aug,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.95",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Oct 24 17:28:16 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Trope:2006:LLC,
author = "Roland L. Trope and E. Michael Power",
title = "Lessons for Laptops for the {18th Century}",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "4",
pages = "64--68",
month = jul # "\slash " # aug,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.97",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Oct 24 17:28:16 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Rieback:2006:RMT,
author = "Melanie R. Rieback and Bruno Crispo and Andrew S.
Tanenbaum",
title = "{RFID} Malware: Truth vs. Myth",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "4",
pages = "70--72",
month = jul # "\slash " # aug,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.102",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Oct 24 17:28:16 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Howard:2006:PPS,
author = "Michael Howard",
title = "A Process for Performing Security Code Reviews",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "4",
pages = "74--79",
month = jul # "\slash " # aug,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.84",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Oct 24 17:28:16 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Arce:2006:VHV,
author = "Ivan Arce",
title = "Voices, {I} Hear Voices",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "4",
pages = "80--83",
month = jul # "\slash " # aug,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.107",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Oct 24 17:28:16 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Herzog:2006:APA,
author = "Jonathan Herzog",
title = "Applying Protocol Analysis to Security Device
Interfaces",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "4",
pages = "84--87",
month = jul # "\slash " # aug,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.85",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Oct 24 17:28:16 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Peterson:2006:IIM,
author = "Gunnar Peterson",
title = "Introduction to Identity Management Risk Metrics",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "4",
pages = "88--91",
month = jul # "\slash " # aug,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.94",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Oct 24 17:28:16 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Robbins:2006:MIP,
author = "Jim Robbins and John T. Sabo",
title = "Managing Information Privacy: Developing a Context for
Security and Privacy Standards Convergence",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "4",
pages = "92--95",
month = jul # "\slash " # aug,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.98",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Oct 24 17:28:16 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Bellovin:2006:BSI,
author = "Steven M. Bellovin",
title = "On the Brittleness of Software and the Infeasibility
of Security Metrics",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "4",
pages = "96--96",
month = jul # "\slash " # aug,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.101",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Oct 24 17:28:16 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Donner:2006:ITO,
author = "Marc Donner",
title = "Insecurity through Obscurity",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "5",
pages = "4",
month = sep # "\slash " # oct,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.123",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Oct 24 17:28:29 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2006/05/j5004.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Anonymous:2006:LE,
author = "Anonymous",
title = "Letters to the Editor",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "5",
pages = "5",
month = sep # "\slash " # oct,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.127",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Oct 24 17:28:29 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2006/05/j5005.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{MacDonald:2006:CBT,
author = "Geraldine MacDonald",
title = "Cross-Border Transaction Liability",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "5",
pages = "7",
month = sep # "\slash " # oct,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.116",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Oct 24 17:28:29 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2006/05/j5007.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Ortega:2006:NBa,
author = "Brandi Ortega",
title = "News Briefs",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "5",
pages = "8--10",
month = sep # "\slash " # oct,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.129",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Oct 24 17:28:29 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2006/05/j5008.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{McGraw:2006:ISBc,
author = "Gary McGraw",
title = "Interview: {Silver Bullet} Speaks to {Marcus Ranum}",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "5",
pages = "11--14",
month = sep # "\slash " # oct,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.126",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Oct 24 17:28:29 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Geiger:2006:SSD,
author = "Matthew Geiger and Lorrie Faith Cranor",
title = "Scrubbing Stubborn Data: An Evaluation of
Counter-Forensic Privacy Tools",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "5",
pages = "16--25",
month = sep # "\slash " # oct,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.132",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Oct 24 17:28:29 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Thibadeau:2006:TCD,
author = "Robert Thibadeau",
title = "Trusted Computing for Disk Drives and Other
Peripherals",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "5",
pages = "26--33",
month = sep # "\slash " # oct,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.136",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Oct 24 17:28:29 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Shaunghe:2006:EPS,
author = "Peng Shaunghe and Han Zhen",
title = "Enhancing {PC} Security with a {U}-Key",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "5",
pages = "34--39",
month = sep # "\slash " # oct,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.118",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Oct 24 17:28:29 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Jacoby:2006:UBC,
author = "Grant A. Jacoby and Randy Marchany and Nathaniel J.
{Davis IV}",
title = "Using Battery Constraints within Mobile Hosts to
Improve Network Security",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "5",
pages = "40--49",
month = sep # "\slash " # oct,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.139",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Oct 24 17:28:29 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Randell:2006:VTT,
author = "Brian Randell and Peter Y. A. Ryan",
title = "Voting Technologies and Trust",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "5",
pages = "50--56",
month = sep # "\slash " # oct,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.140",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Oct 24 17:28:29 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Weis:2006:PET,
author = "Stephen A. Weis",
title = "Privacy Enhancing Technologies",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "5",
pages = "59",
month = sep # "\slash " # oct,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.130",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Oct 24 17:28:29 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2006/05/j5059.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Slay:2006:CSE,
author = "Jill Slay and Benjamin Turnbull",
title = "Computer Security Education and Research in
{Australia}",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "5",
pages = "60--63",
month = sep # "\slash " # oct,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.115",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Oct 24 17:28:29 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Martin:2006:FSP,
author = "Luther Martin",
title = "Fitting Square Pegs into Round Holes",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "5",
pages = "64--66",
month = sep # "\slash " # oct,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.120",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Oct 24 17:28:29 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Gordon:2006:UAV,
author = "Sarah Gordon",
title = "Understanding the Adversary: Virus Writers and
Beyond",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "5",
pages = "67--70",
month = sep # "\slash " # oct,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.137",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Oct 24 17:28:29 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Levy:2006:WCS,
author = "Elias Levy",
title = "Worst-Case Scenario",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "5",
pages = "71--73",
month = sep # "\slash " # oct,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.141",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Oct 24 17:28:29 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Trope:2006:ITM,
author = "Roland L. Trope",
title = "Immaterial Transfers with Material Consequences",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "5",
pages = "74--78",
month = sep # "\slash " # oct,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.122",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Oct 24 17:28:29 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{vanWyk:2006:EFS,
author = "Kenneth R. van Wyk and John Steven",
title = "Essential Factors for Successful Software Security
Awareness Training",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "5",
pages = "80--83",
month = sep # "\slash " # oct,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.119",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Oct 24 17:28:29 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Montgomery:2006:TSR,
author = "Doug Montgomery and Sandra Murphy",
title = "Toward Secure Routing Infrastructures",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "5",
pages = "84--87",
month = sep # "\slash " # oct,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.135",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Oct 24 17:28:29 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Schneier:2006:UND,
author = "Bruce Schneier",
title = "University Networks and Data Security",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "5",
pages = "88--88",
month = sep # "\slash " # oct,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.138",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Tue Oct 24 17:28:29 MDT 2006",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Cybenko:2006:WLS,
author = "George Cybenko",
title = "Weak Links, Strong Ties",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "6",
pages = "3",
month = nov # "\slash " # dec,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.170",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:42 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Anonymous:2006:M,
author = "Anonymous",
title = "Masthead",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "6",
pages = "4",
month = nov # "\slash " # dec,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.158",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:42 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Spafford:2006:DIB,
author = "Eugene Spafford",
title = "Desert Island Books",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "6",
pages = "5",
month = nov # "\slash " # dec,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.150",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:42 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Ortega:2006:NBb,
author = "Brandi Ortega",
title = "News Briefs",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "6",
pages = "6--9",
month = nov # "\slash " # dec,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.160",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:42 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{McGraw:2006:SBS,
author = "Gary McGraw",
title = "Silver Bullet Speaks with {Ed Felten}",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "6",
pages = "10--13",
month = nov # "\slash " # dec,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.164",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:42 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Anonymous:2006:RC,
author = "Anonymous",
title = "{RSA{\reg} Conference 2007}",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "6",
pages = "14",
month = nov # "\slash " # dec,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.162",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:42 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Garfinkel:2006:GEI,
author = "Simson Garfinkel and Michael D. Smith",
title = "{Guest Editors}' Introduction: Data Surveillance",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "6",
pages = "15--17",
month = nov # "\slash " # dec,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.154",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:42 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Popp:2006:CTT,
author = "Robert Popp and John Poindexter",
title = "Countering Terrorism through Information and Privacy
Protection Technologies",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "6",
pages = "18--27",
month = nov # "\slash " # dec,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.147",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:42 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Jonas:2006:TFI,
author = "Jeff Jonas",
title = "Threat and Fraud Intelligence, {Las Vegas} Style",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "6",
pages = "28--34",
month = nov # "\slash " # dec,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.169",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:42 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Anonymous:2006:ICS,
author = "Anonymous",
title = "{IEEE Computer Society Distance Learning Campus}",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "6",
pages = "35",
month = nov # "\slash " # dec,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.155",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:42 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Chaboya:2006:NID,
author = "David J. Chaboya and Richard A. Raines and Rusty O.
Baldwin and Barry E. Mullins",
title = "Network Intrusion Detection: Automated and Manual
Methods Prone to Attack and Evasion",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "6",
pages = "36--43",
month = nov # "\slash " # dec,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.159",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:42 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Lee:2006:EPI,
author = "Vincent C. S. Lee and Linyi Shao",
title = "Estimating Potential {IT} Security Losses: An
Alternative Quantitative Approach",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "6",
pages = "44--52",
month = nov # "\slash " # dec,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.151",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:42 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Tsai:2006:S,
author = "Janice Y. Tsai and Serge Egelman",
title = "{Soups 2006}",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "6",
pages = "53--55",
month = nov # "\slash " # dec,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.165",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:42 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Rubin:2006:CSE,
author = "Bradley S. Rubin and Donald Cheung",
title = "Computer Security Education and Research: Handle with
Care",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "6",
pages = "56--59",
month = nov # "\slash " # dec,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.146",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:42 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Porras:2006:PEG,
author = "Phillip A. Porras",
title = "Privacy-Enabled Global Threat Monitoring",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "6",
pages = "60--63",
month = nov # "\slash " # dec,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.161",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:42 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Tomaszewski:2006:YSY,
author = "John P. Tomaszewski",
title = "Are You Sure You Had a Privacy Incident?",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "6",
pages = "64--66",
month = nov # "\slash " # dec,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.143",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:42 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Gratzer:2006:CLE,
author = "Vanessa Gratzer and David Naccache",
title = "Cryptography, Law Enforcement, and Mobile
Communications",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "6",
pages = "67--70",
month = nov # "\slash " # dec,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.148",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:42 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Ladd:2006:SPS,
author = "David Ladd",
title = "A Software Procurement and Security Primer",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "6",
pages = "71--73",
month = nov # "\slash " # dec,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.142",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:42 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Kiely:2006:SSM,
author = "Laree Kiely and Terry V. Benzel",
title = "Systemic Security Management",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "6",
pages = "74--77",
month = nov # "\slash " # dec,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.167",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:42 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Suchan:2006:SWL,
author = "William Suchan and Edward Sobiesk",
title = "Strengthening the Weakest Link in Digital Protection",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "6",
pages = "78--80",
month = nov # "\slash " # dec,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.166",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:42 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Peterson:2006:DMW,
author = "Gunnar Peterson and John Steven",
title = "Defining Misuse within the Development Process",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "6",
pages = "81--84",
month = nov # "\slash " # dec,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.149",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:42 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Mell:2006:CVS,
author = "Peter Mell and Karen Scarfone and Sasha Romanosky",
title = "Common Vulnerability Scoring System",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "6",
pages = "85--89",
month = nov # "\slash " # dec,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.145",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:42 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Anonymous:2006:ISPb,
author = "Anonymous",
title = "{IEEE Security \& Privacy} 2006 Annual Index, Volume
4",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "6",
pages = "90--95",
month = nov # "\slash " # dec,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.156",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:42 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Geer:2006:EE,
author = "Daniel E. {Geer, Jr.}",
title = "Evidently Evidentiary",
journal = j-IEEE-SEC-PRIV,
volume = "4",
number = "6",
pages = "96",
month = nov # "\slash " # dec,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2006.152",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:42 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Landwehr:2007:NCN,
author = "Carl E. Landwehr",
title = "New Challenges for the {New Year}",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "1",
pages = "3--4",
month = jan # "\slash " # feb,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.13",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:43 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Anonymous:2007:STS,
author = "Anonymous",
title = "Special Thanks to {S\&P}'s Reviewers",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "1",
pages = "6--7",
month = jan # "\slash " # feb,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.19",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:43 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Anderson:2007:SSS,
author = "Ross Anderson",
title = "Software Security: State of the Art",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "1",
pages = "8",
month = jan # "\slash " # feb,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.18",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:43 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{McGraw:2007:SBSa,
author = "Gary McGraw",
title = "Silver Bullet Speaks with {John Stewart}",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "1",
pages = "9--11",
month = jan # "\slash " # feb,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.17",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:43 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Ortega:2007:NBa,
author = "Brandi Ortega",
title = "News Briefs",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "1",
pages = "12--15",
month = jan # "\slash " # feb,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.14",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:43 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Oppliger:2007:PCM,
author = "Rolf Oppliger",
title = "Providing Certified Mail Services on the {Internet}",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "1",
pages = "16--22",
month = jan # "\slash " # feb,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.15",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:43 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Aime:2007:DWN,
author = "Marco Domenico Aime and Giorgio Calandriello and
Antonio Lioy",
title = "Dependability in Wireless Networks: Can We Rely on
{WiFi?}",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "1",
pages = "23--29",
month = jan # "\slash " # feb,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.4",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:43 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Woody:2007:COS,
author = "Carol Woody and Christopher Alberts",
title = "Considering Operational Security Risk during System
Development",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "1",
pages = "30--35",
month = jan # "\slash " # feb,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.3",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:43 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Baker:2007:ISU,
author = "Wade H. Baker and Linda Wallace",
title = "Is Information Security Under Control?: Investigating
Quality in Information Security Management",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "1",
pages = "36--44",
month = jan # "\slash " # feb,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.11",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:43 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Anton:2007:HEW,
author = "Annie I. Ant{\'o}n and Julia B. Eart and Matthew W.
Vail and Neha Jain and Carrie M. Gheen and Jack M.
Frink",
title = "{HIPAA}'s Effect on {Web} Site Privacy Policies",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "1",
pages = "45--52",
month = jan # "\slash " # feb,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.7",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:43 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Bishop:2007:ALO,
author = "Matt Bishop and Deborah A. Frincke",
title = "Achieving Learning Objectives through {E}-Voting Case
Studies",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "1",
pages = "53--56",
month = jan # "\slash " # feb,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.1",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:43 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Iyer:2007:TAA,
author = "Ravishankar K. Iyer and Zbigniew Kalbarczyk and
Karthik Pattabiraman and William Healey and Wen-Mei W.
Hwu and Peter Klemperer and Reza Farivar",
title = "Toward Application-Aware Security and Reliability",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "1",
pages = "57--62",
month = jan # "\slash " # feb,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.23",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:43 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Geiselmann:2007:SPH,
author = "Willi Geiselmann and Rainer Steinwandt",
title = "Special-Purpose Hardware in Cryptanalysis: The Case of
1,024-Bit {RSA}",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "1",
pages = "63--66",
month = jan # "\slash " # feb,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.20",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:43 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Ford:2007:HS,
author = "Richard Ford and William H. Allen",
title = "How Not to Be Seen",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "1",
pages = "67--69",
month = jan # "\slash " # feb,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.8",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:43 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{ODonnell:2007:EMS,
author = "Adam J. O'Donnell",
title = "The Evolutionary Microcosm of Stock Spam",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "1",
pages = "70--72",
month = jan # "\slash " # feb,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.22",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:43 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{DeLooze:2007:PWS,
author = "Lori DeLooze",
title = "Providing {Web} Service Security in a Federated
Environment",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "1",
pages = "73--75",
month = jan # "\slash " # feb,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.16",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:43 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Morris:2007:WWY,
author = "John Morris and Jon Peterson",
title = "Who's Watching You Now?",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "1",
pages = "76--79",
month = jan # "\slash " # feb,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.24",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:43 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Bellovin:2007:DCC,
author = "Steve Bellovin",
title = "{DRM}, Complexity, and Correctness",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "1",
pages = "80",
month = jan # "\slash " # feb,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.5",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:43 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Schneider:2007:TCC,
author = "Fred Schneider",
title = "Trusted Computing in Context",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "2",
pages = "4--5",
month = mar # "\slash " # apr,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.47",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:43 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Ortega:2007:NBb,
author = "Brandi Ortega",
title = "News Briefs",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "2",
pages = "7--10",
month = mar # "\slash " # apr,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.38",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:43 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{McGraw:2007:SBSb,
author = "Gary McGraw",
title = "Silver Bullet Speaks with {Dorothy Denning}",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "2",
pages = "11--14",
month = mar # "\slash " # apr,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.41",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:43 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Arce:2007:SPY,
author = "Iv{\'a}n Arce",
title = "A Surprise Party (on Your Computer)?",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "2",
pages = "15--16",
month = mar # "\slash " # apr,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.27",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:43 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Carettoni:2007:SBM,
author = "Luca Carettoni and Claudio Merloni and Stefano
Zanero",
title = "Studying {Bluetooth} Malware Propagation: The
{BlueBag} Project",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "2",
pages = "17--25",
month = mar # "\slash " # apr,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.43",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:43 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Gratzer:2007:AVQ,
author = "Vanessa Gratzer and David Naccache",
title = "Alien vs. {Quine}",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "2",
pages = "26--31",
month = mar # "\slash " # apr,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.28",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:43 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Willems:2007:TAD,
author = "Carsten Willems and Thorsten Holz and Felix Freiling",
title = "Toward Automated Dynamic Malware Analysis Using
{CWSandbox}",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "2",
pages = "32--39",
month = mar # "\slash " # apr,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.45",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:43 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Lyda:2007:UEA,
author = "Robert Lyda and James Hamrock",
title = "Using Entropy Analysis to Find Encrypted and Packed
Malware",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "2",
pages = "40--45",
month = mar # "\slash " # apr,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.48",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:43 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Bruschi:2007:CNS,
author = "Danilo Bruschi and Lorenzo Martignoni and Mattia
Monga",
title = "Code Normalization for Self-Mutating Malware",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "2",
pages = "46--54",
month = mar # "\slash " # apr,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.31",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:43 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Bhargav-Spantzel:2007:TNI,
author = "Abhilasha Bhargav-Spantzel and Anna C. Squicciarini
and Elisa Bertino",
title = "Trust Negotiation in Identity Management",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "2",
pages = "55--63",
month = mar # "\slash " # apr,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.46",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:43 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Theoharidou:2007:CBK,
author = "Marianthi Theoharidou and Dimitris Gritazalis",
title = "Common Body of Knowledge for Information Security",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "2",
pages = "64--67",
month = mar # "\slash " # apr,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.32",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:43 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Martin:2007:SCE,
author = "Keye Martin",
title = "Secure Communication without Encryption?",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "2",
pages = "68--71",
month = mar # "\slash " # apr,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.39",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:43 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Power:2007:SBB,
author = "E. Michael Power and Jonathan Gilhen and Roland L.
Trope",
title = "Setting Boundaries at Borders: Reconciling Laptop
Searches and Privacy",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "2",
pages = "72--75",
month = mar # "\slash " # apr,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.40",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:43 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Tsang:2007:WCT,
author = "Patrick P. Tsang",
title = "When Cryptographers Turn Lead into Gold",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "2",
pages = "76--79",
month = mar # "\slash " # apr,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.49",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:43 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Kapadia:2007:CSU,
author = "Apu Kapadia",
title = "A Case (Study) For Usability in Secure Email
Communication",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "2",
pages = "80--84",
month = mar # "\slash " # apr,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.25",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:43 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Lesk:2007:SKW,
author = "Michael Lesk",
title = "{South Korea}'s Way to the Future",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "2",
pages = "85--87",
month = mar # "\slash " # apr,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.42",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:43 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Nichols:2007:MFD,
author = "Elizabeth A. Nichols and Gunnar Peterson",
title = "A Metrics Framework to Drive Application Security
Improvement",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "2",
pages = "88--91",
month = mar # "\slash " # apr,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.26",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:43 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Chandramouli:2007:ISS,
author = "Ramaswamy Chandramouli and Philip Lee",
title = "Infrastructure Standards for Smart {ID} Card
Deployment",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "2",
pages = "92--96",
month = mar # "\slash " # apr,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.34",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:43 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Landwehr:2007:FTI,
author = "Carl E. Landwehr",
title = "Food for Thought: Improving the Market for Assurance",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "3",
pages = "3--4",
month = may # "\slash " # jun,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.60",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:44 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{McGraw:2007:SBTa,
author = "Gary McGraw",
title = "Silver Bullet Talks with {Becky Bace}",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "3",
pages = "6--9",
month = may # "\slash " # jun,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.70",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:44 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Ortega:2007:NBc,
author = "Brandi Ortega",
title = "News Briefs",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "3",
pages = "10--12",
month = may # "\slash " # jun,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.67",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:44 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Pfleeger:2007:GEI,
author = "Shari Lawrence Pfleeger and Roland L. Trope and
Charles C. Palmer",
title = "{Guest Editors}' Introduction: Managing Organizational
Security",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "3",
pages = "13--15",
month = may # "\slash " # jun,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.62",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:44 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Johnson:2007:EIS,
author = "M. Eric Johnson and Eric Goetz",
title = "Embedding Information Security into the Organization",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "3",
pages = "16--24",
month = may # "\slash " # jun,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.59",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:44 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Pfleeger:2007:IBC,
author = "Shari Lawrence Pfleeger and Martin Libicki and Michael
Webber",
title = "{I}'ll Buy That! Cybersecurity in the {Internet}
Marketplace",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "3",
pages = "25--31",
month = may # "\slash " # jun,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.64",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:44 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Trope:2007:CSD,
author = "Roland L. Trope and E. Michael Power and Vincent I.
Polley and Bradford C. Morley",
title = "A Coherent Strategy for Data Security through Data
Governance",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "3",
pages = "32--39",
month = may # "\slash " # jun,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.51",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:44 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Rosenblum:2007:WAC,
author = "David Rosenblum",
title = "What Anyone Can Know: The Privacy Risks of Social
Networking Sites",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "3",
pages = "40--49",
month = may # "\slash " # jun,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.75",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:44 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Baer:2007:CIS,
author = "Walter S. Baer and Andrew Parkinson",
title = "Cyberinsurance in {IT} Security Management",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "3",
pages = "50--56",
month = may # "\slash " # jun,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.57",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:44 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Swart:2007:ESC,
author = "Richard S. Swart and Robert F. Erbacher",
title = "Educating Students to Create Trustworthy Systems",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "3",
pages = "58--61",
month = may # "\slash " # jun,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.58",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:44 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Carpenter:2007:HVA,
author = "Matthew Carpenter and Tom Liston and Ed Skoudis",
title = "Hiding Virtualization from Attackers and Malware",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "3",
pages = "62--65",
month = may # "\slash " # jun,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.63",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:44 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Sobiesk:2007:CFW,
author = "Edward Sobiesk and Gregory Conti",
title = "The Cost of Free {Web} Tools",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "3",
pages = "66--68",
month = may # "\slash " # jun,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.74",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:44 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Lysyanskaya:2007:AI,
author = "Anna Lysyanskaya",
title = "Authentication without Identification",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "3",
pages = "69--71",
month = may # "\slash " # jun,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.52",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:44 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Knutson:2007:BPS,
author = "Tina R. Knutson",
title = "Building Privacy into Software Products and Services",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "3",
pages = "72--74",
month = may # "\slash " # jun,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.55",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:44 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Ahmad:2007:CSS,
author = "David Ahmad",
title = "The Contemporary Software Security Landscape",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "3",
pages = "75--77",
month = may # "\slash " # jun,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.73",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:44 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Sasse:2007:REB,
author = "M. Angela Sasse",
title = "Red-Eye Blink, Bendy Shuffle, and the Yuck Factor: a
User Experience of Biometric Airport Systems",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "3",
pages = "78--81",
month = may # "\slash " # jun,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.69",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:44 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Gagnon:2007:SPT,
author = "Michael N. Gagnon and Stephen Taylor and Anup K.
Ghosh",
title = "Software Protection through Anti-Debugging",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "3",
pages = "82--84",
month = may # "\slash " # jun,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.71",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:44 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Peeters:2007:CES,
author = "Johan Peeters and Paul Dyson",
title = "Cost-Effective Security",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "3",
pages = "85--87",
month = may # "\slash " # jun,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.56",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:44 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Schneier:2007:NCS,
author = "Bruce Schneier",
title = "Nonsecurity Considerations in Security Decisions",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "3",
pages = "88",
month = may # "\slash " # jun,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.68",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:44 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Donner:2007:CE,
author = "Marc Donner",
title = "Cyberassault on {Estonia}",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "4",
pages = "4",
month = jul # "\slash " # aug,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.78",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:45 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Ortega:2007:NBd,
author = "Brandi Ortega",
title = "News Briefs",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "4",
pages = "6--9",
month = jul # "\slash " # aug,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.93",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:45 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{McGraw:2007:SBTb,
author = "Gary McGraw and Ross Anderson",
title = "Silver Bullet Talks with {Ross Anderson}",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "4",
pages = "10--13",
month = jul # "\slash " # aug,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.94",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:45 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{English:2007:MAC,
author = "Jennifer English and David Coe and Rhonda Gaede and
David Hyde and Jeffrey Kulick",
title = "{MEMS}-Assisted Cryptography for {CPI} Protection",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "4",
pages = "14--21",
month = jul # "\slash " # aug,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.90",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:45 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Heikkila:2007:ESC,
author = "Faith M. Heikkila",
title = "Encryption: Security Considerations for Portable Media
Devices",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "4",
pages = "22--27",
month = jul # "\slash " # aug,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.80",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:45 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Jones:2007:ESV,
author = "Jeffrey R. Jones",
title = "Estimating Software Vulnerabilities",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "4",
pages = "28--32",
month = jul # "\slash " # aug,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.81",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:45 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Kim:2007:SFD,
author = "Jangbok Kim and Kihyun Chung and Kyunghee Choi",
title = "Spam Filtering With Dynamically Updated {URL}
Statistics",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "4",
pages = "33--39",
month = jul # "\slash " # aug,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.95",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:45 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Dimitriadis:2007:IMC,
author = "Christos K. Dimitriadis",
title = "Improving Mobile Core Network Security with
Honeynets",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "4",
pages = "40--47",
month = jul # "\slash " # aug,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.85",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:45 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Peisert:2007:SP,
author = "Sean Peisert and Matt Bishop",
title = "{I} Am a Scientist, Not a Philosopher!",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "4",
pages = "48--51",
month = jul # "\slash " # aug,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.84",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:45 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Franz:2007:CUT,
author = "Michael Franz",
title = "Containing the Ultimate {Trojan} Horse",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "4",
pages = "52--56",
month = jul # "\slash " # aug,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.77",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:45 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{IntVeld:2007:DSA,
author = "Sophie {In 't Veld}",
title = "Data Sharing across the {Atlantic}",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "4",
pages = "58--61",
month = jul # "\slash " # aug,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.79",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:45 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Aciicmez:2007:MAC,
author = "Onur Acii{\c{c}}mez and Jean-Pierre Seifert and
{\c{C}}etin Kaya Ko{\c{c}}",
title = "Micro-Architectural Cryptanalysis",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "4",
pages = "62--64",
month = jul # "\slash " # aug,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.91",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:45 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Allen:2007:MWC,
author = "William H. Allen",
title = "Mixing Wheat with the Chaff: Creating Useful Test Data
for {IDS} Evaluation",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "4",
pages = "65--67",
month = jul # "\slash " # aug,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.92",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:45 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Arce:2007:GVM,
author = "Iv{\'a}n Arce",
title = "Ghost in the Virtual Machine",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "4",
pages = "68--71",
month = jul # "\slash " # aug,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.83",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:45 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
abstract = "Virtual machines and virtualization technologies
aren't new to the computing world---they've been used
for at least 40 years. Recently, the availability of
virtualization software for low-cost computer equipment
and the promise of both tangible reductions on total
cost of ownership and rapid return on investment on
virtualization projects have moved many organizations
to adopt it as a key component of their IT strategy. In
this installment of Attack Trends, I'll look at this
technology trend with an eye toward security and
analyze past and present advances in offensive security
tools and techniques",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Bratus:2007:WHL,
author = "Sergey Bratus",
title = "What Hackers Learn that the Rest of Us Don't: Notes on
Hacker Curriculum",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "4",
pages = "72--75",
month = jul # "\slash " # aug,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.101",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:45 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Lesk:2007:NFL,
author = "Michael Lesk",
title = "The New Front Line: {Estonia} under Cyberassault",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "4",
pages = "76--79",
month = jul # "\slash " # aug,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.98",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:45 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Gupta:2007:UAG,
author = "Suvajit Gupta and Joel Winstead",
title = "Using Attack Graphs to Design Systems",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "4",
pages = "80--83",
month = jul # "\slash " # aug,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.100",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:45 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Bramhall:2007:UCI,
author = "Pete Bramhall and Marit Hansen and Kai Rannenberg and
Thomas Roessler",
title = "User-Centric Identity Management: New Trends in
Standardization and Regulation",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "4",
pages = "84--87",
month = jul # "\slash " # aug,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.99",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:45 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Geer:2007:EBW,
author = "Daniel E. Geer",
title = "The End of Black and White",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "4",
pages = "88",
month = jul # "\slash " # aug,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.97",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Aug 2 17:50:45 MDT 2007",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Schneider:2007:TSP,
author = "Fred B. Schneider",
title = "Technology Scapegoats and Policy Saviors",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "5",
pages = "3--4",
month = sep # "\slash " # oct,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.124",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:37 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2007/05/msp2007050003.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Anonymous:2007:I,
author = "Anonymous",
title = "Interface",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "5",
pages = "5",
month = sep # "\slash " # oct,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.113",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:37 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2007/05/msp2007050005.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Pfleeger:2007:SL,
author = "Shari Lawrence Pfleeger",
title = "Spooky Lessons",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "5",
pages = "7",
month = sep # "\slash " # oct,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.122",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:37 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2007/05/msp2007050007.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{McGraw:2007:ISBa,
author = "Gary McGraw",
title = "Interview: {Silver Bullet} Talks with {Annie
Ant{\'o}n}",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "5",
pages = "8--11",
month = sep # "\slash " # oct,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.121",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:37 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Ortega:2007:NBe,
author = "Brandi Ortega",
title = "News Briefs",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "5",
pages = "12--14",
month = sep # "\slash " # oct,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.115",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:37 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2007/05/msp2007050012.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Otto:2007:CDH,
author = "Paul N. Otto and Annie I. Ant{\'o}n and David L.
Baumer",
title = "The {ChoicePoint} Dilemma: How Data Brokers Should
Handle the Privacy of Personal Information",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "5",
pages = "15--23",
month = sep # "\slash " # oct,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.126",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:37 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Vassilev:2007:PBW,
author = "Apostol T. Vassilev and Bertrand du Castel and Asad M.
Ali",
title = "Personal Brokerage of {Web} Service Access",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "5",
pages = "24--31",
month = sep # "\slash " # oct,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.118",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:37 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Mabry:2007:USE,
author = "Frank J. Mabry and John R. James and Aaron J.
Ferguson",
title = "{Unicode} Steganographic Exploits: Maintaining
Enterprise Border Security",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "5",
pages = "32--39",
month = sep # "\slash " # oct,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.128",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:37 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
abstract = "Unicode is rapidly becoming the preferred means for
representing symbols used in creating multimedia
content, especially for information that's presented in
multiple languages. This article discusses a Unicode
vulnerability that makes such content susceptible to
being used for creation of covert channel
communications. We also developed a solution
architecture, the Unified Secure Message Augmentation
(USMA) service. The USMA service incorporates rules (in
an XML vocabulary) that we can apply to Unicode
transmissions that will detect an attempt to transmit a
potential exploit, alert network managers to the
presence of the Unicode anomaly, and take action to
mitigate the exploit.",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Mullins:2007:HCD,
author = "Barry E. Mullins and Timothy H. Lacey and Robert F.
Mills and Joseph E. Trechter and Samuel D. Bass",
title = "How the Cyber Defense Exercise Shaped an
Information-Assurance Curriculum",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "5",
pages = "40--49",
month = sep # "\slash " # oct,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.111",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:37 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Oshri:2007:ISS,
author = "Ilan Oshri and Julia Kotlarsky and Corey Hirsch",
title = "An Information Security Strategy for Networkable
Devices",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "5",
pages = "50--56",
month = sep # "\slash " # oct,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.104",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:37 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Caulkins:2007:OIS,
author = "Jonathan Caulkins and Eric D. Hough and Nancy R. Mead
and Hassan Osman",
title = "Optimizing Investments in Security Countermeasures: a
Practical Tool for Fixed Budgets",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "5",
pages = "57--60",
month = sep # "\slash " # oct,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.117",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:37 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Ryan:2007:PGE,
author = "Julie J. C. H. Ryan",
title = "Plagiarism, Graduate Education, and Information
Security",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "5",
pages = "62--65",
month = sep # "\slash " # oct,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.119",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:37 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Fraser:2007:CRU,
author = "David Fraser",
title = "The {Canadian} Response to the {USA Patriot Act}",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "5",
pages = "66--68",
month = sep # "\slash " # oct,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.125",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:37 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Gratzer:2007:TNS,
author = "Vanessa Gratzer and David Naccache",
title = "Trust on a Nationwide Scale",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "5",
pages = "69--71",
month = sep # "\slash " # oct,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.127",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:37 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Solomon:2007:BPR,
author = "Dianne Solomon",
title = "Balancing Privacy and Risk in the {E}-Messaging
World",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "5",
pages = "72--75",
month = sep # "\slash " # oct,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.105",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:37 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{McGraw:2007:OGS,
author = "Gary McGraw and Greg Hoglund",
title = "Online Games and Security",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "5",
pages = "76--79",
month = sep # "\slash " # oct,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.116",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:37 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Dushin:2007:HMC,
author = "Fred Dushin and Eric Newcomer",
title = "Handling Multiple Credentials in a Heterogeneous {SOA}
Environment",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "5",
pages = "80--82",
month = sep # "\slash " # oct,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.110",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:37 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Dingledine:2007:DLL,
author = "Roger Dingledine and Nick Mathewson and Paul
Syverson",
title = "Deploying Low-Latency Anonymity: Design Challenges and
Social Factors",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "5",
pages = "83--87",
month = sep # "\slash " # oct,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.108",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:37 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Bellovin:2007:SC,
author = "Steve Bellovin",
title = "Seers and Craftspeople",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "5",
pages = "88",
month = sep # "\slash " # oct,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.120",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:37 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://bell.computer.org/dlcomments/",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Landwehr:2007:RTC,
author = "Carl E. Landwehr",
title = "Revolution through Competition?",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "6",
pages = "3--4",
month = nov # "\slash " # dec,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.174",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:37 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2007/06/msp2007060003.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Ortega:2007:NBf,
author = "Brandi Ortega",
title = "News Briefs",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "6",
pages = "6--7",
month = nov # "\slash " # dec,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.172",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:37 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2007/06/msp2007060006.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{McGraw:2007:ISBb,
author = "Gary McGraw",
title = "Interview: {Silver Bullet} Talks with {Mikko
Hypp{\"o}nen}",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "6",
pages = "8--11",
month = nov # "\slash " # dec,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.177",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:37 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Stytz:2007:WN,
author = "Martin R. Stytz",
title = "What Are the Numbers?",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "6",
pages = "12",
month = nov # "\slash " # dec,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.183",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:37 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2007/06/msp2007060012.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Jakobsson:2007:WCP,
author = "Markus Jakobsson and Sid Stamm",
title = "{Web} Camouflage: Protecting Your Clients from
Browser-Sniffing Attacks",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "6",
pages = "16--24",
month = nov # "\slash " # dec,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.182",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:37 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Hole:2007:LNA,
author = "Kjell J. Hole and Vebj{\o}rn Moen and Andr{\'e} N.
Klingsheim and Knut M. Tande",
title = "Lessons from the {Norwegian} {ATM} System",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "6",
pages = "25--31",
month = nov # "\slash " # dec,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.168",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:37 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Piazzalunga:2007:SSM,
author = "Ugo Piazzalunga and Paolo Salvaneschi and Francesco
Balducci and Pablo Jacomuzzi and Cristiano Moroncelli",
title = "Security Strength Measurement for Dongle-Protected
Software",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "6",
pages = "32--40",
month = nov # "\slash " # dec,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.176",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:37 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Li:2007:CAS,
author = "Ninghui Li and Ji-Won Byun and Elisa Bertino",
title = "A Critique of the {ANSI Standard} on Role-Based Access
Control",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "6",
pages = "41--49",
month = nov # "\slash " # dec,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.158",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:37 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Ferraiolo:2007:RSR,
author = "David Ferraiolo and Rick Kuhn and Ravi Sandhu",
title = "{RBAC} Standard Rationale: Comments on {``A Critique
of the ANSI Standard on Role-Based Access Control''}",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "6",
pages = "51--53",
month = nov # "\slash " # dec,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.173",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:37 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Petratos:2007:WIS,
author = "Pythagoras Petratos",
title = "Weather, Information Security, and Markets",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "6",
pages = "54--57",
month = nov # "\slash " # dec,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.181",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:37 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Power:2007:DCP,
author = "E. Michael Power",
title = "Developing a Culture of Privacy: a Case Study",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "6",
pages = "58--60",
month = nov # "\slash " # dec,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.163",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:37 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Vaudenay:2007:PT,
author = "Serge Vaudenay",
title = "{E}-Passport Threats",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "6",
pages = "61--64",
month = nov # "\slash " # dec,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.164",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:37 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Ford:2007:HSI,
author = "Richard Ford and William H. Allen",
title = "How Not to Be Seen {II}: The Defenders Fight Back",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "6",
pages = "65--68",
month = nov # "\slash " # dec,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.166",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:37 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{McKinney:2007:VB,
author = "David McKinney",
title = "Vulnerability Bazaar",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "6",
pages = "69--73",
month = nov # "\slash " # dec,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.180",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:37 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Perrone:2007:CCD,
author = "Luiz Felipe Perrone",
title = "Could a Caveman Do It? {The} Surprising Potential of
Simple Attacks",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "6",
pages = "74--77",
month = nov # "\slash " # dec,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.162",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:37 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Stytz:2007:WEW,
author = "Martin R. Stytz",
title = "Who Are the Experts, and What Have They Done for Us
Lately?",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "6",
pages = "78--80",
month = nov # "\slash " # dec,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.184",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:37 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Steven:2007:M,
author = "John Steven and Gunnar Peterson",
title = "{Metricon 2.0}",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "6",
pages = "81--83",
month = nov # "\slash " # dec,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.171",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:37 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Bishop:2007:APT,
author = "Matt Bishop",
title = "About Penetration Testing",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "6",
pages = "84--87",
month = nov # "\slash " # dec,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.159",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:37 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Schneier:2007:DSI,
author = "Bruce Schneier",
title = "The Death of the Security Industry",
journal = j-IEEE-SEC-PRIV,
volume = "5",
number = "6",
pages = "88",
month = nov # "\slash " # dec,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2007.179",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:37 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Donner:2008:CLB,
author = "Marc Donner",
title = "Charge of the Light Brigade",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "1",
pages = "5--5",
month = jan # "\slash " # feb,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.7",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:38 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2008/01/msp2008010005.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Ortega:2008:NBa,
author = "Brandi Ortega",
title = "News Briefs",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "1",
pages = "6--8",
month = jan # "\slash " # feb,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.16",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:38 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2008/01/msp2008010006.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Spafford:2008:JPA,
author = "Eugene Spafford",
title = "{James P. Anderson}: An Information Security Pioneer",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "1",
pages = "9",
month = jan # "\slash " # feb,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.15",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:38 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2008/01/msp2008010009.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{McGraw:2008:ISBa,
author = "Gary McGraw",
title = "Interview: {Silver Bullet} Talks with {Eugene
Spafford}",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "1",
pages = "10--15",
month = jan # "\slash " # feb,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.22",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:38 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2008/01/msp2008010010.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Bellovin:2008:IAT,
author = "Steven M. Bellovin and Terry V. Benzel and Bob Blakley
and Dorothy E. Denning and Whitfield Diffie and Jeremy
Epstein and Paulo Ver{\'\i}ssimo",
title = "{Information Assurance Technology Forecast 2008}",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "1",
pages = "16--23",
month = jan # "\slash " # feb,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.13",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:38 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Bellovin:2008:RCS,
author = "Steven M. Bellovin and Matt Blaze and Whitfield Diffie
and Susan Landau and Peter G. Neumann and Jennifer
Rexford",
title = "Risking Communications Security: Potential Hazards of
the {Protect America Act}",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "1",
pages = "24--33",
month = jan # "\slash " # feb,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.17",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:38 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Pearson:2008:SIT,
author = "Siani Pearson and Marco Casassa-Mont and Manny Novoa",
title = "Securing Information Transfer in Distributed Computing
Environments",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "1",
pages = "34--42",
month = jan # "\slash " # feb,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.19",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:38 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Chakrabarti:2008:GCS,
author = "Anirban Chakrabarti and Anish Damodaran and Shubhashis
Sengupta",
title = "{Grid} Computing Security: a Taxonomy",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "1",
pages = "44--51",
month = jan # "\slash " # feb,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.12",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:38 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Leversage:2008:ESM,
author = "David John Leversage and Eric James Byres",
title = "Estimating a System's Mean Time-to-Compromise",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "1",
pages = "52--60",
month = jan # "\slash " # feb,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.9",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:38 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Greitzer:2008:CIC,
author = "Frank L. Greitzer and Andrew P. Moore and Dawn M.
Cappelli and Dee H. Andrews and Lynn A. Carroll and
Thomas D. Hull",
title = "Combating the Insider Cyber Threat",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "1",
pages = "61--64",
month = jan # "\slash " # feb,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.8",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:38 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Carbone:2008:TV,
author = "Martim Carbone and Diego Zamboni and Wenke Lee",
title = "Taming Virtualization",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "1",
pages = "65--67",
month = jan # "\slash " # feb,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.24",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:38 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Kolupaev:2008:CHV,
author = "Aleksey Kolupaev and Juriy Ogijenko",
title = "{CAPTCHAs}: Humans vs. Bots",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "1",
pages = "68--70",
month = jan # "\slash " # feb,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.6",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:38 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Howard:2008:BSE,
author = "Michael Howard",
title = "Becoming a Security Expert",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "1",
pages = "71--73",
month = jan # "\slash " # feb,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.3",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:38 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Ahmad:2008:CDD,
author = "Dave Ahmad",
title = "The Confused Deputy and the Domain Hijacker",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "1",
pages = "74--77",
month = jan # "\slash " # feb,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.25",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:38 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Lesk:2008:FSI,
author = "Michael Lesk",
title = "Forum Shopping on the {Internet}",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "1",
pages = "78--80",
month = jan # "\slash " # feb,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.10",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:38 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Bonver:2008:STI,
author = "Edward Bonver",
title = "Security Testing of Internal Tools",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "1",
pages = "81--83",
month = jan # "\slash " # feb,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.21",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:38 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Coyne:2008:RII,
author = "Ed Coyne and Tim Weil",
title = "An {RBAC} Implementation and Interoperability
Standard: The {INCITS} Cyber Security 1.1 Model",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "1",
pages = "84--87",
month = jan # "\slash " # feb,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.2",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:38 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Geer:2008:WWG,
author = "Dan Geer and Daniel Conway",
title = "What We Got for {Christmas}",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "1",
pages = "88",
month = jan # "\slash " # feb,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.26",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:38 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://bell.computer.org/dlcomments/",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Donner:2008:LEI,
author = "Marc Donner",
title = "Lessons from Electrification for Identification",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "2",
pages = "3",
month = mar # "\slash " # apr,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.38",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:38 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2008/02/msp2008020003.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Garfinkel:2008:SFF,
author = "Simson Garfinkel",
title = "Sharp Figures, Fuzzy Purpose",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "2",
pages = "5",
month = mar # "\slash " # apr,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.45",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:38 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2008/02/msp2008020005.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{McGraw:2008:ISBb,
author = "Gary McGraw",
title = "Interview: {Silver Bullet} Talks with {Ed Amoroso}",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "2",
pages = "6--9",
month = mar # "\slash " # apr,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.46",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:38 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2008/02/msp2008020006.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Ortega:2008:NBb,
author = "Brandi Ortega",
title = "News Briefs",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "2",
pages = "10--12",
month = mar # "\slash " # apr,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.40",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:38 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2008/02/msp2008020010.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Landau:2008:IPS,
author = "Susan Landau and Deirdre K. Mulligan",
title = "{I}'m {Pc01002/SpringPeeper\slash ED288l.6}; Who are
You?",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "2",
pages = "13--15",
month = mar # "\slash " # apr,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.34",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:38 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2008/02/msp2008020013.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Maler:2008:VIO,
author = "Eve Maler and Drummond Reed",
title = "The {Venn} of Identity: Options and Issues in
Federated Identity Management",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "2",
pages = "16--23",
month = mar # "\slash " # apr,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.50",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:38 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Dhamija:2008:SFI,
author = "Rachna Dhamija and Lisa Dusseault",
title = "The Seven Flaws of Identity Management: Usability and
Security Challenges",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "2",
pages = "24--29",
month = mar # "\slash " # apr,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.49",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:38 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Wayman:2008:BIM,
author = "James L. Wayman",
title = "Biometrics in Identity Management Systems",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "2",
pages = "30--37",
month = mar # "\slash " # apr,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.28",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:38 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Hansen:2008:PIM,
author = "Marit Hansen and Ari Schwartz and Alissa Cooper",
title = "Privacy and Identity Management",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "2",
pages = "38--45",
month = mar # "\slash " # apr,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.41",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:38 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Acquisti:2008:IMP,
author = "Alessandro Acquisti",
title = "Identity Management, Privacy, and Price
Discrimination",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "2",
pages = "46--50",
month = mar # "\slash " # apr,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.35",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:38 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{McKenzie:2008:UCI,
author = "Robin McKenzie and Malcolm Crompton and Colin Wallis",
title = "Use Cases for Identity Management in {E}-Government",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "2",
pages = "51--57",
month = mar # "\slash " # apr,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.51",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:38 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Dube:2008:HRE,
author = "Thomas E. Dube and Bobby D. Birrer and Richard A.
Raines and Rusty O. Baldwin and Barry E. Mullins and
Robert W. Bennington and Christopher E. Reuter",
title = "Hindering Reverse Engineering: Thinking Outside the
Box",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "2",
pages = "58--65",
month = mar # "\slash " # apr,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.33",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:38 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Jakobsson:2008:WHP,
author = "Markus Jakobsson and Nathaniel Johnson and Peter
Finn",
title = "Why and How to Perform Fraud Experiments",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "2",
pages = "66--68",
month = mar # "\slash " # apr,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.52",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:38 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Levieil:2008:CTC,
author = "Eric Levieil and David Naccache",
title = "Cryptographic Test Correction",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "2",
pages = "69--71",
month = mar # "\slash " # apr,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.30",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:38 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Carvalho:2008:SMA,
author = "Marco Carvalho",
title = "Security in Mobile Ad Hoc Networks",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "2",
pages = "72--75",
month = mar # "\slash " # apr,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.44",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:38 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{McKinney:2008:NHV,
author = "David McKinney",
title = "New Hurdles for Vulnerability Disclosure",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "2",
pages = "76--78",
month = mar # "\slash " # apr,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.39",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:38 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Locasto:2008:HDW,
author = "Michael E. Locasto and Angelos Stavrou",
title = "The Hidden Difficulties of Watching and Rebuilding
Networks",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "2",
pages = "79--82",
month = mar # "\slash " # apr,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.48",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:38 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Harding:2008:DSA,
author = "Patrick Harding and Leif Johansson and Nate
Klingenstein",
title = "{Dynamic Security Assertion Markup Language}:
Simplifying Single Sign-On",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "2",
pages = "83--85",
month = mar # "\slash " # apr,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.31",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:38 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Geer:2008:BIM,
author = "Daniel E. {Geer, Jr.} and Daniel G. Conway",
title = "Beware the {IDs of March}",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "2",
pages = "87",
month = mar # "\slash " # apr,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.27",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:38 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Bellovin:2008:SC,
author = "Steve Bellovin",
title = "Security by Checklist",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "2",
pages = "88",
month = mar # "\slash " # apr,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.43",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:38 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://bell.computer.org/dlcomments/",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Landwehr:2008:S,
author = "Carl E. Landwehr",
title = "Up Scope",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "3",
pages = "3--4",
month = may # "\slash " # jun,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.76",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:38 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2008/03/msp2008030003.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Ortega:2008:NBc,
author = "Brandi Ortega",
title = "News Briefs",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "3",
pages = "6--8",
month = may # "\slash " # jun,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.69",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:38 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{McGraw:2008:ISBc,
author = "Gary McGraw",
title = "Interview: {Silver Bullet} Talks with {Jon Swartz}",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "3",
pages = "9--11",
month = may # "\slash " # jun,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.72",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:38 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Rubin:2008:NRR,
author = "Aviel D. Rubin and David R. Jefferson",
title = "New Research Results for Electronic Voting",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "3",
pages = "12--13",
month = may # "\slash " # jun,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.68",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:38 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://csdl.computer.org/comp/mags/sp/2008/03/msp2008030012.pdf",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Santin:2008:TBB,
author = "Altair O. Santin and Regivaldo G. Costa and Carlos A.
Maziero",
title = "A Three-Ballot-Based Secure Electronic Voting System",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "3",
pages = "14--21",
month = may # "\slash " # jun,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.56",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:38 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Yasinsac:2008:DCR,
author = "Alec Yasinsac and Matt Bishop",
title = "The Dynamics of Counting and Recounting Votes",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "3",
pages = "22--29",
month = may # "\slash " # jun,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.75",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:38 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Ansari:2008:EEV,
author = "Nirwan Ansari and Pitipatana Sakarindr and Ehsan
Haghani and Chao Zhang and Aridaman K. Jain and Yun Q.
Shi",
title = "Evaluating Electronic Voting Systems Equipped with
Voter-Verified Paper Records",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "3",
pages = "30--39",
month = may # "\slash " # jun,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.62",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:38 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Chaum:2008:SEE,
author = "David Chaum and Aleks Essex and Richard Carback and
Jeremy Clark and Stefan Popoveniuc and Alan Sherman and
Poorvi Vora",
title = "Scantegrity: End-to-End Voter-Verifiable Optical-Scan
Voting",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "3",
pages = "40--46",
month = may # "\slash " # jun,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.70",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:38 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Goirizelaia:2008:OSV,
author = "I{\~n}aki Goirizelaia and Ted Selker and Maider Huarte
and Juanjo Unzilla",
title = "An Optical Scan {E}-Voting System based on {N}-Version
Programming",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "3",
pages = "47--53",
month = may # "\slash " # jun,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.57",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:38 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Batten:2008:TDF,
author = "Lynn Batten and Lei Pan",
title = "Teaching Digital Forensics to Undergraduate Students",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "3",
pages = "54--56",
month = may # "\slash " # jun,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.74",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:38 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Hughes:2008:CNP,
author = "Gordon Hughes and Sophie Dawson and Tim Brookes",
title = "Considering New Privacy Laws in {Australia}",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "3",
pages = "57--59",
month = may # "\slash " # jun,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.60",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:38 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Burr:2008:NHC,
author = "William E. Burr",
title = "A New Hash Competition",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "3",
pages = "60--62",
month = may # "\slash " # jun,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.55",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:38 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Michener:2008:CPM,
author = "John R. Michener",
title = "Common Permissions in {Microsoft Windows Server 2008}
and {Windows Vista}",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "3",
pages = "63--67",
month = may # "\slash " # jun,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.59",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:38 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{ODonnell:2008:WMA,
author = "Adam J. O'Donnell",
title = "When Malware Attacks (Anything but {Windows})",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "3",
pages = "68--70",
month = may # "\slash " # jun,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.78",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:38 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Bratus:2008:WDS,
author = "Sergey Bratus and Chris Masone and Sean W. Smith",
title = "Why Do Street-Smart People Do Stupid Things Online?",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "3",
pages = "71--74",
month = may # "\slash " # jun,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.79",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:38 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Lesk:2008:DRM,
author = "Michael Lesk",
title = "Digital Rights Management and Individualized Pricing",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "3",
pages = "76--79",
month = may # "\slash " # jun,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.61",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:38 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Epstein:2008:SLL,
author = "Jeremy Epstein",
title = "Security Lessons Learned from {Soci{\'e}t{\'e}
G{\'e}n{\'e}rale}",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "3",
pages = "80--82",
month = may # "\slash " # jun,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.71",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:38 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Frankel:2008:IPV,
author = "Sheila Frankel and David Green",
title = "{Internet Protocol Version 6}",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "3",
pages = "83--86",
month = may # "\slash " # jun,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.65",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:38 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Geer:2008:LAT,
author = "Daniel E. {Geer, Jr.}",
title = "Learn by Analogy or Die Trying",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "3",
pages = "88, 87",
month = may # "\slash " # jun,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.66",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 3 12:03:38 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
URL = "http://bell.computer.org/dlcomments/",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Schneider:2008:NNV,
author = "Fred B. Schneider",
title = "Network Neutrality versus {Internet}
Trustworthiness?",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "4",
pages = "3--4",
month = jul # "\slash " # aug,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.90",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 6 14:53:07 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{McGraw:2008:ISBd,
author = "Gary McGraw",
title = "Interview: {Silver Bullet} Talks with {Adam
Shostack}",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "4",
pages = "6--10",
month = jul # "\slash " # aug,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.104",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 6 14:53:07 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Ortega:2008:NBd,
author = "Brandi Ortega",
title = "News Briefs",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "4",
pages = "11--13",
month = jul # "\slash " # aug,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.91",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 6 14:53:07 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Hole:2008:OWN,
author = "Kjell J. Hole and Lars-Helge Netland and Yngve Espelid
and Andr{\'e} N. Klingsheim and Hallvar Helleseth and
Jan B. Henriksen",
title = "Open Wireless Networks on University Campuses",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "4",
pages = "14--20",
month = jul # "\slash " # aug,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.92",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 6 14:53:07 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Razaq:2008:SGR,
author = "Abdul (Ali) Razaq and Wai Tong Luk and Kam Man Shum
and Lee Ming Cheng and Kai Ning Yung",
title = "Second-Generation {RFID}",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "4",
pages = "21--27",
month = jul # "\slash " # aug,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.94",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 6 14:53:07 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Pai:2008:TCS,
author = "Sameer Pai and Sergio Bermudez and Stephen B. Wicker
and Marci Meingast and Tanya Roosta and Shankar Sastry
and Deirdre K. Mulligan",
title = "Transactional Confidentiality in Sensor Networks",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "4",
pages = "28--35",
month = jul # "\slash " # aug,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.107",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 6 14:53:07 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Weigold:2008:RCA,
author = "Thomas Weigold and Thorsten Kramp and Michael
Baentsch",
title = "Remote Client Authentication",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "4",
pages = "36--43",
month = jul # "\slash " # aug,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.93",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 6 14:53:07 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Pretschner:2008:UCE,
author = "Alexander Pretschner and Manuel Hilty and Florian
Sch{\"u}tz and Christian Schaefer and Thomas Walter",
title = "Usage Control Enforcement: Present and Future",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "4",
pages = "44--53",
month = jul # "\slash " # aug,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.101",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 6 14:53:07 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Rostad:2008:LFF,
author = "Lillian R{\o}stad and Gunnar Ren{\'e} {\O}ie and Inger
Anne T{\o}ndel and Per H{\aa}kon Meland",
title = "Learning by Failing (and Fixing)",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "4",
pages = "54--56",
month = jul # "\slash " # aug,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.89",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 6 14:53:07 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Anonymous:2008:CPO,
author = "Anonymous",
title = "Call for Papers: {Online Gaming Security}",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "4",
pages = "57--57",
month = jul # "\slash " # aug,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.81",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 6 14:53:07 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{ElEmam:2008:HIH,
author = "Khaled {El Emam}",
title = "Heuristics for De-identifying Health Data",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "4",
pages = "58--61",
month = jul # "\slash " # aug,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.84",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 6 14:53:07 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Troutman:2008:VMM,
author = "Justin Troutman",
title = "The Virtues of Mature and Minimalist Cryptography",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "4",
pages = "62--65",
month = jul # "\slash " # aug,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.99",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 6 14:53:07 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Predd:2008:IBB,
author = "Joel Predd and Shari Lawrence Pfleeger and Jeffrey
Hunker and Carla Bulford",
title = "Insiders Behaving Badly",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "4",
pages = "66--70",
month = jul # "\slash " # aug,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.87",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 6 14:53:07 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Anonymous:2008:MA,
author = "Anonymous",
title = "2008 Membership advertisement",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "4",
pages = "71--73",
month = jul # "\slash " # aug,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.103",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 6 14:53:07 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Landau:2008:SPL,
author = "Susan Landau",
title = "Security and Privacy Landscape in Emerging
Technologies",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "4",
pages = "74--77",
month = jul # "\slash " # aug,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.95",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 6 14:53:07 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Geer:2008:SA,
author = "Daniel E. {Geer, Jr.} and Daniel G. Conway",
title = "Strong Attractors",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "4",
pages = "78--79",
month = jul # "\slash " # aug,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.105",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 6 14:53:07 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Schneier:2008:HHB,
author = "Bruce Schneier",
title = "How the Human Brain Buys Security",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "4",
pages = "80--80",
month = jul # "\slash " # aug,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.85",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 6 14:53:07 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Anonymous:2008:CNS,
author = "Anonymous",
title = "Corporate Network Security advertisement",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "4",
pages = "c3--c3",
month = jul # "\slash " # aug,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.82",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 6 14:53:07 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Anonymous:2008:FC,
author = "Anonymous",
title = "Front Cover",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "4",
pages = "c1--c1",
month = jul # "\slash " # aug,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.83",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 6 14:53:07 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Anonymous:2008:ISW,
author = "Anonymous",
title = "{IT Security World} advertisement",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "4",
pages = "c2--c2",
month = jul # "\slash " # aug,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.88",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 6 14:53:07 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Anonymous:2008:USS,
author = "Anonymous",
title = "{Usenix Security Symposium} advertisement",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "4",
pages = "c4--c4",
month = jul # "\slash " # aug,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.102",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Aug 6 14:53:07 MDT 2008",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Landwehr:2008:ECA,
author = "Carl E. Landwehr",
title = "From the {Editors}: Cybersecurity and Artificial
Intelligence: From Fixing the Plumbing to Smart Water",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "5",
pages = "3--4",
month = sep # "\slash " # oct,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.113",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Stytz:2008:BRS,
author = "Martin R. Stytz",
title = "Book Reviews: The Shape of Crimeware to Come",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "5",
pages = "5--5",
month = sep # "\slash " # oct,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.130",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{McGraw:2008:ISBe,
author = "Gary McGraw",
title = "Interview: {Silver Bullet} Talks with {Bill
Cheswick}",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "5",
pages = "7--11",
month = sep # "\slash " # oct,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.127",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Ortega:2008:NBe,
author = "Brandi Ortega",
title = "News Briefs",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "5",
pages = "12--13",
month = sep # "\slash " # oct,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.108",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{King:2008:GEI,
author = "Samuel T. King and Sean W. Smith",
title = "{Guest Editors}' Introduction: Virtualization and
Security: Back to the Future",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "5",
pages = "15--15",
month = sep # "\slash " # oct,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.136",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Karger:2008:VVM,
author = "Paul A. Karger and David R. Safford",
title = "Virtualization: {I/O} for Virtual Machine Monitors:
Security and Performance Issues",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "5",
pages = "16--23",
month = sep # "\slash " # oct,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.119",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Perez:2008:VHB,
author = "Ronald Perez and Leendert van Doorn and Reiner
Sailer",
title = "Virtualization and Hardware-Based Security",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "5",
pages = "24--31",
month = sep # "\slash " # oct,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.135",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Nance:2008:VMI,
author = "Kara Nance and Matt Bishop and Brian Hay",
title = "Virtual Machine Introspection: Observation or
Interference?",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "5",
pages = "32--37",
month = sep # "\slash " # oct,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.134",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Ryan:2008:RMP,
author = "Julie J. C. H. Ryan and Daniel J. Ryan",
title = "Risk Management: Performance Metrics for Information
Security Risk Management",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "5",
pages = "38--44",
month = sep # "\slash " # oct,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.125",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Kotzanikolaou:2008:DPD,
author = "Panayiotis Kotzanikolaou",
title = "Data Privacy: Data Retention and Privacy in Electronic
Communications",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "5",
pages = "46--52",
month = sep # "\slash " # oct,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.114",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Bishop:2008:EIA,
author = "Matt Bishop and Deborah A. Frincke",
title = "Education: Information Assurance Education: a Work In
Progress",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "5",
pages = "54--57",
month = sep # "\slash " # oct,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.123",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{McLaughlin:2008:PIC,
author = "Peter McLaughlin",
title = "Privacy Interests: Cross-Border Data Flows and
Increased Enforcement",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "5",
pages = "58--61",
month = sep # "\slash " # oct,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.111",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Martin:2008:CCI,
author = "Luther Martin",
title = "Crypto Corner: Identity-Based Encryption and Beyond",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "5",
pages = "62--64",
month = sep # "\slash " # oct,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.120",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Yan:2008:BTR,
author = "Wei Yan and Zheng Zhang and Nirwan Ansari",
title = "Basic Training: Revealing Packed Malware",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "5",
pages = "65--69",
month = sep # "\slash " # oct,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.126",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Ahmad:2008:ATT,
author = "David Ahmad",
title = "Attack Trends: Two Years of Broken Crypto: {Debian}'s
Dress Rehearsal for a Global {PKI} Compromise",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "5",
pages = "70--73",
month = sep # "\slash " # oct,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.131",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
abstract = "A patch to the OpenSSL package maintained by Debian
GNU/Linux (an operating system composed of free and
open source software that can be used as a desktop or
server OS) submitted in 2006 weakened its pseudo-random
number generator (PRNG), a critical component for
secure key generation. Putting both servers and users
at risk, this vulnerability affected OpenSSH, Apache
(mod\_ssl), the onion router (TOR), OpenVPN, and other
applications. In this article, the author examines
these issue and its consequences. OpenSSL is an open
source library implementing the SSL (Secure Socket
Layer) and TLS (Transport Layer Security) protocols.
Several widely deployed applications on many OSs rely
on it for secure communications, particularly Linux and
BSD-based systems. Where in use, it's a critical part
of the OS's security subsystem.",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Viecco:2008:SSL,
author = "Camilo Viecco and Jean Camp",
title = "Secure Systems: a Life or Death {InfoSec} Subversion",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "5",
pages = "74--76",
month = sep # "\slash " # oct,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.109",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Trope:2008:DPH,
author = "Roland L. Trope and Monique Witt and William J.
Adams",
title = "Digital Protection: Hardening the Target",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "5",
pages = "77--81",
month = sep # "\slash " # oct,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.118",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Bonver:2008:BSD,
author = "Edward Bonver and Michael Cohen",
title = "Building Security In: Developing and Retaining a
Security Testing Mindset",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "5",
pages = "82--85",
month = sep # "\slash " # oct,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.115",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Geer:2008:GMT,
author = "Daniel E. {Geer, Jr.} and Daniel G. Conway",
title = "For Good Measure: Type {II} Reverse Engineering",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "5",
pages = "86--87",
month = sep # "\slash " # oct,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.132",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Bellovin:2008:CTP,
author = "Steven M. Bellovin",
title = "Clear Text: The Puzzle of Privacy",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "5",
pages = "88--88",
month = sep # "\slash " # oct,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.129",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
abstract = "A number of recent news stories have made me wonder
more about privacy. It's not just that the threats to
privacy are increasing; rather, the problem is that the
countervailing forces are becoming very much stronger.
Was Scott McNealy right when he told us that we had no
privacy and that we should just ``get over it''?",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Michael:2008:EGT,
author = "Bret Michael",
title = "From the {Editors}: Are Governments Up to the Task?",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "6",
pages = "4--5",
month = nov # "\slash " # dec,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.137",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{McGraw:2008:ISBf,
author = "Gary McGraw",
title = "Interview: {Silver Bullet} Talks with {Matt Bishop}",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "6",
pages = "6--10",
month = nov # "\slash " # dec,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.153",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Saydjari:2008:SLC,
author = "O. Sami Saydjari",
title = "Spotlight: Launching into the Cyberspace Race: An
Interview with {Melissa E. Hathaway}",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "6",
pages = "11--17",
month = nov # "\slash " # dec,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.147",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Figueroa:2008:NSC,
author = "James Figueroa and Brandi Ortega",
title = "News: Shaking Up the Cybersecurity Landscape",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "6",
pages = "18--21",
month = nov # "\slash " # dec,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.152",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Trellue:2008:GEI,
author = "Ron Trellue and Charles C. Palmer",
title = "{Guest Editors}' Introduction: Process Control System
Security: Bootstrapping a Legacy",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "6",
pages = "22--23",
month = nov # "\slash " # dec,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.148",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Brandle:2008:PCS,
author = "Markus Br{\"a}ndle and Martin Naedele",
title = "Process Control Security: Security for Process Control
Systems: An Overview",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "6",
pages = "24--29",
month = nov # "\slash " # dec,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.150",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Nicol:2008:UGN,
author = "David M. Nicol and William H. Sanders and Sankalp
Singh and Mouna Seri",
title = "Usable Global Network Access Policy for Process
Control Systems",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "6",
pages = "30--36",
month = nov # "\slash " # dec,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.159",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Parks:2008:VAC,
author = "Raymond C. Parks and Edmond Rogers",
title = "Vulnerability Assessment for Critical Infrastructure
Control Systems",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "6",
pages = "37--43",
month = nov # "\slash " # dec,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.160",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Bessani:2008:CWC,
author = "Alysson Neves Bessani and Paulo Sousa and Miguel
Correia and Nuno Ferreira Neves and Paulo
Ver{\'\i}ssimo",
title = "The Crutial Way of Critical Infrastructure
Protection",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "6",
pages = "44--51",
month = nov # "\slash " # dec,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.158",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Mathieu:2008:VIS,
author = "Bertrand Mathieu and Saverio Niccolini and Dorgham
Sisalem",
title = "{Voice over IP}: {SDRS}: a {Voice-over-IP} Spam
Detection and Reaction System",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "6",
pages = "52--59",
month = nov # "\slash " # dec,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.149",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
abstract = "An expected surge in spam over Internet telephony
(SPIT) requires a solution that incorporates multiple
detection methods and reaction mechanisms, enabling
greater flexibility and customization. Our solution
framework combines well-known detection schemes, such
as blacklists and white lists, with methods based on
statistical traffic analysis, such as the number and
duration of calls a user conducts.",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Balfe:2008:TCC,
author = "Shane Balfe and Eimear Gallery and Chris J. Mitchell
and Kenneth G. Paterson",
title = "Trusted Computing: Challenges for Trusted Computing",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "6",
pages = "60--66",
month = nov # "\slash " # dec,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.138",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Chan:2008:ETC,
author = "Yuen-Yan Chan and Victor K. Wei",
title = "Education: Teaching for Conceptual Change in Security
Awareness",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "6",
pages = "67--69",
month = nov # "\slash " # dec,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.157",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Nahra:2008:PIH,
author = "Kirk J. Nahra",
title = "Privacy Interests: {HIPAA} Security Enforcement Is
Here",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "6",
pages = "70--72",
month = nov # "\slash " # dec,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.143",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Chu:2008:BTI,
author = "Chengyun Chu",
title = "Basic Training: Introduction to {Microsoft .NET}
Security",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "6",
pages = "73--78",
month = nov # "\slash " # dec,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.146",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Grossman:2008:ATF,
author = "Jeremiah Grossman",
title = "Attack Trends: Five User-Customizable {Web} Site
Security Features",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "6",
pages = "79--81",
month = nov # "\slash " # dec,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.141",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Steven:2008:BSS,
author = "John Steven",
title = "Building Security In: State of Application
Assessment",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "6",
pages = "82--85",
month = nov # "\slash " # dec,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.155",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Geer:2008:GMS,
author = "Daniel E. {Geer, Jr.} and Daniel G. Conway",
title = "For Good Measure: Security Is a Subset of
Reliability",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "6",
pages = "86--87",
month = nov # "\slash " # dec,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.151",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Geer:2008:CTC,
author = "Daniel E. {Geer, Jr.}",
title = "Clear Text: Complexity Is the Enemy",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "6",
pages = "88--88",
month = nov # "\slash " # dec,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.139",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Anonymous:2008:AI,
author = "Anonymous",
title = "Annual Index",
journal = j-IEEE-SEC-PRIV,
volume = "6",
number = "6",
pages = "0--0",
month = nov # "\slash " # dec,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2008.161",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Donner:2009:ERE,
author = "Marc Donner",
title = "From the {Editors}: Reading (with) the Enemy",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "1",
pages = "3--3",
month = jan # "\slash " # feb,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.16",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Ortega:2009:NBS,
author = "Brandi Ortega",
title = "News Briefs: Shaking Up the Cybersecurity Landscape",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "1",
pages = "5--6",
month = jan # "\slash " # feb,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.19",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{McGraw:2009:ISBa,
author = "Gary McGraw",
title = "Interview: {Silver Bullet} Talks with {Gunnar
Peterson}",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "1",
pages = "7--11",
month = jan # "\slash " # feb,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.20",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Lala:2009:GEI,
author = "Jaynarayan H. Lala and Fred B. Schneider",
title = "{Guest Editors}' Introduction: {IT} Monoculture
Security Risks and Defenses",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "1",
pages = "12--13",
month = jan # "\slash " # feb,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.11",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Birman:2009:IMM,
author = "Kenneth P. Birman and Fred B. Schneider",
title = "{IT} Monoculture: The Monoculture Risk Put into
Context",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "1",
pages = "14--17",
month = jan # "\slash " # feb,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.24",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Keromytis:2009:RIS,
author = "Angelos D. Keromytis",
title = "Randomized Instruction Sets and Runtime Environments
Past Research and Future Directions",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "1",
pages = "18--25",
month = jan # "\slash " # feb,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.15",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Williams:2009:STD,
author = "Daniel Williams and Wei Hu and Jack W. Davidson and
Jason D. Hiser and John C. Knight and Anh
Nguyen-Tuong",
title = "Security through Diversity: Leveraging Virtual Machine
Technology",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "1",
pages = "26--33",
month = jan # "\slash " # feb,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.18",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Hole:2009:APR,
author = "Kjell J. Hole and Andr{\'e} N. Klingsheim and
Lars-Helge Netland and Yngve Espelid and Thomas
Tj{\O}stheim and Vebj{\O}rn Moen",
title = "Assessing {PKI}: Risk Assessment of a {National
Security Infrastructure}",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "1",
pages = "34--41",
month = jan # "\slash " # feb,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.17",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Cukier:2009:VRP,
author = "Michel Cukier and Susmit Panjwani",
title = "Vulnerability Remediation: Prioritizing Vulnerability
Remediation by Determining Attacker-Targeted
Vulnerabilities",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "1",
pages = "42--48",
month = jan # "\slash " # feb,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.13",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Enck:2009:FUA,
author = "William Enck and Machigar Ongtang and Patrick
McDaniel",
title = "Focus: Understanding {Android} Security",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "1",
pages = "50--57",
month = jan # "\slash " # feb,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.26",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Landau:2009:PNT,
author = "Susan Landau",
title = "Perspectives: The {NRC} Takes on Data Mining,
Behavioral Surveillance, and Privacy",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "1",
pages = "58--62",
month = jan # "\slash " # feb,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.25",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Michael:2009:IAD,
author = "Bret Michael and Jeffrey Voas and Phil Laplante",
title = "It All Depends: Cyberpandemics: History,
Inevitability, Response",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "1",
pages = "63--67",
month = jan # "\slash " # feb,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.4",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Chan:2009:ETC,
author = "Yuen-Yan Chan and Victor K. Wei",
title = "Education: Teaching for Conceptual Change in Security
Awareness: a Case Study in Higher Education",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "1",
pages = "68--71",
month = jan # "\slash " # feb,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.22",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Kosseim:2009:PIP,
author = "Patricia Kosseim and Khaled {El Emam}",
title = "Privacy Interests: Privacy Interests in Prescription
Data, {Part I}: Prescriber Privacy",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "1",
pages = "72--76",
month = jan # "\slash " # feb,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.14",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Callegati:2009:BTM,
author = "Franco Callegati and Walter Cerroni and Marco
Ramilli",
title = "Basic Training: Man-in-the-Middle Attack to the
{HTTPS} Protocol",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "1",
pages = "78--81",
month = jan # "\slash " # feb,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.12",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Porras:2009:ATD,
author = "Phillip Porras",
title = "Attack Trends: Directions in Network-Based Security
Monitoring",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "1",
pages = "82--85",
month = jan # "\slash " # feb,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.5",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Geer:2009:GMO,
author = "Daniel E. {Geer, Jr.} and Daniel G. Conway",
title = "For Good Measure: The Owned Price Index",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "1",
pages = "86--87",
month = jan # "\slash " # feb,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.23",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Schneier:2009:CTA,
author = "Bruce Schneier",
title = "Clear Text: Architecture of Privacy",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "1",
pages = "88--88",
month = jan # "\slash " # feb,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.1",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Schneider:2009:EAP,
author = "Fred B. Schneider",
title = "From the {Editors}: Accountability for Perfection",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "2",
pages = "3--4",
month = mar # "\slash " # apr,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.30",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Anonymous:2009:STS,
author = "Anonymous",
title = "Special Thanks: Special Thanks to {S\&P}'s Peer
Reviewers",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "2",
pages = "5--6",
month = mar # "\slash " # apr,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.52",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Ortega:2009:NB,
author = "Brandi Ortega",
title = "News Briefs",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "2",
pages = "8--9",
month = mar # "\slash " # apr,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.45",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{McGraw:2009:ISBb,
author = "Gary McGraw",
title = "Interview: {Silver Bullet} Talks with {Jeremiah
Grossman}",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "2",
pages = "10--14",
month = mar # "\slash " # apr,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.51",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Pfleeger:2009:BRS,
author = "Shari Lawrence Pfleeger",
title = "Book Reviews: Searching for You",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "2",
pages = "15--15",
month = mar # "\slash " # apr,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.48",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Caloyannides:2009:GEI,
author = "Michael A. Caloyannides and Nasir Memon and Wietse
Venema",
title = "{Guest Editors}' Introduction: Digital Forensics",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "2",
pages = "16--17",
month = mar # "\slash " # apr,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.34",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Caloyannides:2009:FY,
author = "Michael A. Caloyannides",
title = "Forensics Is So {``Yesterday''}",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "2",
pages = "18--25",
month = mar # "\slash " # apr,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.37",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Carrier:2009:DFW,
author = "Brian D. Carrier",
title = "Digital Forensics Works",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "2",
pages = "26--29",
month = mar # "\slash " # apr,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.35",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Hay:2009:LAP,
author = "Brian Hay and Matt Bishop and Kara Nance",
title = "Live Analysis: Progress and Challenges",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "2",
pages = "30--37",
month = mar # "\slash " # apr,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.43",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Garfinkel:2009:NXB,
author = "Simson L. Garfinkel and James J. Migletz",
title = "New {XML}-Based Files Implications for Forensics",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "2",
pages = "38--44",
month = mar # "\slash " # apr,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.44",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Manes:2009:OLL,
author = "Gavin W. Manes and Elizabeth Downing",
title = "Overview of Licensing and Legal Issues for Digital
Forensic Investigators",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "2",
pages = "45--48",
month = mar # "\slash " # apr,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.46",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Roussev:2009:HDF,
author = "Vassil Roussev",
title = "Hashing and Data Fingerprinting in Digital Forensics",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "2",
pages = "49--55",
month = mar # "\slash " # apr,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.40",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Spiekermann:2009:ACR,
author = "Sarah Spiekermann and Sergei Evdokimov",
title = "Authentication: Critical {RFID} Privacy-Enhancing
Technologies",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "2",
pages = "56--62",
month = mar # "\slash " # apr,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.31",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Harauz:2009:IAD,
author = "John Harauz and Lori M. Kaufman",
title = "It All Depends: a New Era of Presidential Security:
The {President} and His {BlackBerry}",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "2",
pages = "67--70",
month = mar # "\slash " # apr,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.29",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Ryoo:2009:ESE,
author = "Jungwoo Ryoo and Angsana Techatassanasoontorn and
Dongwon Lee",
title = "Education: Security Education Using Second Life",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "2",
pages = "71--74",
month = mar # "\slash " # apr,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.49",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{ElEmam:2009:PIP,
author = "Khaled {El Emam} and Patricia Kosseim",
title = "Privacy Interests: Privacy Interests in Prescription
Data, Part 2: Patient Privacy",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "2",
pages = "75--78",
month = mar # "\slash " # apr,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.47",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Brouchier:2009:CCT,
author = "Julien Brouchier and Tom Kean and Carol Marsh and
David Naccache",
title = "Crypto Corner: Temperature Attacks",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "2",
pages = "79--82",
month = mar # "\slash " # apr,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.54",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Jaatun:2009:ATF,
author = "Martin Gilje Jaatun and Jostein Jensen and H{\aa}vard
Vegge and Finn Michael Halvorsen and Rune Wals{\o}
Nerg{\aa}rd",
title = "Attack Trends: Fools Download Where Angels Fear to
Tread",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "2",
pages = "83--86",
month = mar # "\slash " # apr,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.36",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Zhivich:2009:SSR,
author = "Michael Zhivich and Robert K. Cunningham",
title = "Secure Systems: The Real Cost of Software Errors",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "2",
pages = "87--90",
month = mar # "\slash " # apr,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.56",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
keywords = "Bellingham, WA, pipeline rupture; Patriot Missile
Defense System failure; radiation treatment overdoses",
}
@Article{Peterson:2009:BSS,
author = "Gunnar Peterson",
title = "Building Security In: Service-Oriented Security
Indications for Use",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "2",
pages = "91--93",
month = mar # "\slash " # apr,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.50",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Geer:2009:GMH,
author = "Daniel E. {Geer, Jr.} and Daniel G. Conway",
title = "For Good Measure: Hard Data Is Good to Find",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "2",
pages = "94--95",
month = mar # "\slash " # apr,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.39",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Bellovin:2009:CTG,
author = "Steven M. Bellovin",
title = "Clear Text: The Government and Cybersecurity",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "2",
pages = "96--96",
month = mar # "\slash " # apr,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.55",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Landwehr:2009:ENG,
author = "Carl E. Landwehr",
title = "From the {Editors}: a National Goal for Cyberspace:
Create an Open, Accountable {Internet}",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "3",
pages = "3--4",
month = may # "\slash " # jun,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.58",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Figueroa:2009:NBa,
author = "James Figueroa",
title = "News Briefs",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "3",
pages = "6--7",
month = may # "\slash " # jun,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.73",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{McGovern:2009:ISB,
author = "James McGovern",
title = "Interview: {Silver Bullet} Talks with {Gary McGraw}",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "3",
pages = "8--10",
month = may # "\slash " # jun,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.79",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{McGraw:2009:SOG,
author = "Gary McGraw and Ming Chow",
title = "Securing Online Games: {Guest Editors}' Introduction:
Securing Online Games: Safeguarding the Future of
Software Security",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "3",
pages = "11--12",
month = may # "\slash " # jun,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.65",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Bono:2009:RAS,
author = "Stephen Bono and Dan Caselden and Gabriel Landau and
Charlie Miller",
title = "Reducing the Attack Surface in Massively Multiplayer
Online Role-Playing Games",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "3",
pages = "13--19",
month = may # "\slash " # jun,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.75",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Portnoy:2009:WWC,
author = "Aaron Portnoy and Ali Rizvi-Santiago",
title = "Walking on Water: a Cheating Case Study",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "3",
pages = "20--22",
month = may # "\slash " # jun,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.82",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Kane:2009:VJL,
author = "Sean F. Kane",
title = "Virtual Judgment: Legal Implications of Online
Gaming",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "3",
pages = "23--28",
month = may # "\slash " # jun,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.81",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Mitterhofer:2009:SSB,
author = "Stefan Mitterhofer and Christopher Kruegel and Engin
Kirda and Christian Platzer",
title = "Server-Side Bot Detection in Massively Multiplayer
Online Games",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "3",
pages = "29--36",
month = may # "\slash " # jun,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.78",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Yan:2009:ICO,
author = "Jeff Yan and Brian Randell",
title = "An Investigation of Cheating in Online Games",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "3",
pages = "37--44",
month = may # "\slash " # jun,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.60",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Johnson:2009:IRS,
author = "M. Eric Johnson and Eric Goetz and Shari Lawrence
Pfleeger",
title = "Information Risk: Security through Information Risk
Management",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "3",
pages = "45--52",
month = may # "\slash " # jun,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.77",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Locasto:2009:EHS,
author = "Michael E. Locasto",
title = "Education: Helping Students Own Their Own Code",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "3",
pages = "53--56",
month = may # "\slash " # jun,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.66",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Varadharajan:2009:HNT,
author = "Vijay Varadharajan",
title = "On the Horizon: a Note on Trust-Enhanced Security",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "3",
pages = "57--59",
month = may # "\slash " # jun,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.59",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Donner:2009:BTW,
author = "Marc Donner",
title = "Biblio Tech: War Stories",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "3",
pages = "60--63",
month = may # "\slash " # jun,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.83",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Conti:2009:PIM,
author = "Gregory Conti and Edward Sobiesk",
title = "Privacy Interests: Malicious Interfaces and
Personalization's Uninviting Future",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "3",
pages = "64--67",
month = may # "\slash " # jun,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.71",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Howard:2009:BTI,
author = "Michael Howard",
title = "Basic Training: Improving Software Security by
Eliminating the {CWE} Top 25 Vulnerabilities",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "3",
pages = "68--71",
month = may # "\slash " # jun,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.69",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Zdrnja:2009:ATM,
author = "Bojan Zdrnja",
title = "Attack Trends: Malicious {JavaScript} Insertion
through {ARP} Poisoning Attacks",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "3",
pages = "72--74",
month = may # "\slash " # jun,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.72",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{McDaniel:2009:SSS,
author = "Patrick McDaniel and Stephen McLaughlin",
title = "Secure Systems: Security and Privacy Challenges in the
{Smart Grid}",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "3",
pages = "75--77",
month = may # "\slash " # jun,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.76",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Lesk:2009:SPEa,
author = "Michael Lesk",
title = "Security {\&} Privacy Economics: Reading Over Your
Shoulder",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "3",
pages = "78--81",
month = may # "\slash " # jun,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.74",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Chuvakin:2009:BSL,
author = "Anton Chuvakin and Gunnar Peterson",
title = "Building Security In: Logging in the Age of {Web}
Services",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "3",
pages = "82--85",
month = may # "\slash " # jun,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.70",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Geer:2009:GMD,
author = "Daniel E. {Geer, Jr.} and Daniel G. Conway",
title = "For Good Measure: a Doubt of the Benefit",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "3",
pages = "86--87",
month = may # "\slash " # jun,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.57",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Geer:2009:CDE,
author = "Daniel E. {Geer, Jr.}",
title = "{ClearText}: Digital Endosymbiosis",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "3",
pages = "88--88",
month = may # "\slash " # jun,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.63",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Jul 2 10:02:21 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Donner:2009:ENM,
author = "Marc Donner",
title = "From the Editors: New Models for Old",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "4",
pages = "3--4",
month = jul # "\slash " # aug,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.99",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Sep 10 15:38:24 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Anonymous:2009:ILE,
author = "Anonymous",
title = "Interface: Letters to the Editor",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "4",
pages = "6--7",
month = jul # "\slash " # aug,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.95",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Sep 10 15:38:24 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Figueroa:2009:NBb,
author = "James Figueroa",
title = "News Briefs",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "4",
pages = "8--10",
month = jul # "\slash " # aug,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.100",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Sep 10 15:38:24 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{McGraw:2009:ISBc,
author = "Gary McGraw",
title = "Interview: Silver Bullet Talks with {Virgil Gligor}",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "4",
pages = "11--14",
month = jul # "\slash " # aug,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.106",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Sep 10 15:38:24 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Lin:2009:SRL,
author = "Herbert Lin",
title = "Special Report: Lifting the Veil on Cyber Offense",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "4",
pages = "15--21",
month = jul # "\slash " # aug,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.96",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Sep 10 15:38:24 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Yan:2009:PCA,
author = "Jeff Yan and Ahmad Salah {El Ahmad}",
title = "Pixel-Count Attacks: {CAPTCHA} Security: a Case
Study",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "4",
pages = "22--28",
month = jul # "\slash " # aug,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.84",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Sep 10 15:38:24 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Hughes:2009:SDS,
author = "Gordon F. Hughes and Tom Coughlin and Daniel M.
Commins",
title = "Secure Data Sanitization: Disposal of Disk and Tape
Data by Secure Sanitization",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "4",
pages = "29--34",
month = jul # "\slash " # aug,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.89",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Sep 10 15:38:24 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Ni:2009:ACP,
author = "Qun Ni and Elisa Bertino and Jorge Lobo and Seraphin
B. Calo",
title = "Access Control: Privacy-Aware Role-Based Access
Control",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "4",
pages = "35--43",
month = jul # "\slash " # aug,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.102",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Sep 10 15:38:24 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Meike:2009:ISS,
author = "Michael Meike and Johannes Sametinger and Andreas
Wiesauer",
title = "{Internet} Security: Security in Open Source {Web}
Content Management Systems",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "4",
pages = "44--51",
month = jul # "\slash " # aug,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.104",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Sep 10 15:38:24 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Rue:2009:CMB,
author = "Rachel Rue and Shari Lawrence Pfleeger",
title = "Cybersecurity: Making the Best Use of Cybersecurity
Economic Models",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "4",
pages = "52--60",
month = jul # "\slash " # aug,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.98",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Sep 10 15:38:24 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Kaufman:2009:IAD,
author = "Lori M. Kaufman",
title = "It All Depends: Data Security in the World of Cloud
Computing",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "4",
pages = "61--64",
month = jul # "\slash " # aug,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.87",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Sep 10 15:38:24 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Hagen:2009:EHR,
author = "Janne Hagen",
title = "Education: Human Relationships: a Never-Ending
Security Education Challenge?",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "4",
pages = "65--67",
month = jul # "\slash " # aug,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.92",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Sep 10 15:38:24 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Masiello:2009:PID,
author = "Betsy Masiello",
title = "Privacy Interests: Deconstructing the Privacy
Experience",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "4",
pages = "68--70",
month = jul # "\slash " # aug,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.88",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Sep 10 15:38:24 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Troutman:2009:CCGa,
author = "Justin Troutman and Vincent Rijmen",
title = "Crypto Corner: Green Cryptography: Cleaner Engineering
through Recycling",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "4",
pages = "71--73",
month = jul # "\slash " # aug,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.91",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Sep 10 15:38:24 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Henning:2009:BTP,
author = "Ronda Henning",
title = "Basic Training: Predictable Surprises",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "4",
pages = "74--76",
month = jul # "\slash " # aug,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.101",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Sep 10 15:38:24 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Traynor:2009:SSS,
author = "Patrick Traynor",
title = "Secure Systems: Securing Cellular Infrastructure:
Challenges and Opportunities",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "4",
pages = "77--79",
month = jul # "\slash " # aug,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.103",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Sep 10 15:38:24 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{MacKie-Mason:2009:SPE,
author = "Jeffrey K. MacKie-Mason",
title = "Security {\&} Privacy Economics: Incentive-Centered
Design for Security",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "4",
pages = "80--83",
month = jul # "\slash " # aug,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.94",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Sep 10 15:38:24 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Steingruebl:2009:BSS,
author = "Andy Steingruebl and Gunnar Peterson",
title = "Building Security In: Software Assumptions Lead to
Preventable Errors",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "4",
pages = "84--87",
month = jul # "\slash " # aug,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.107",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Sep 10 15:38:24 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Schneier:2009:CTS,
author = "Bruce Schneier",
title = "Clear Text: Security, Group Size, and the Human
Brain",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "4",
pages = "88--88",
month = jul # "\slash " # aug,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.105",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu Sep 10 15:38:24 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Michael:2009:ECS,
author = "Bret Michael",
title = "From the Editors: In Clouds Shall We Trust?",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "5",
pages = "3--3",
month = sep # "\slash " # oct,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.124",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Oct 14 17:01:10 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{McGraw:2009:ISBd,
author = "Gary McGraw",
title = "Interview: {Silver Bullet} Talks with {Bob Blakley}",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "5",
pages = "5--8",
month = sep # "\slash " # oct,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.136",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Oct 14 17:01:10 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Figueroa:2009:NBc,
author = "James Figueroa",
title = "News Briefs",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "5",
pages = "9--10",
month = sep # "\slash " # oct,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.128",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Oct 14 17:01:10 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Massey:2009:SDN,
author = "Daniel Massey and Dorothy E. Denning",
title = "Securing the {Domain Name System}: {Guest Editors}'
Introduction",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "5",
pages = "11--13",
month = sep # "\slash " # oct,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.121",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Oct 14 17:01:10 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Avramopoulos:2009:PDR,
author = "Ioannis Avramopoulos and Martin Suchara",
title = "Protecting the {DNS} from Routing Attacks: Two
Alternative Anycast Implementations",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "5",
pages = "14--20",
month = sep # "\slash " # oct,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.131",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Oct 14 17:01:10 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{McGrath:2009:PIF,
author = "D. Kevin McGrath and Andrew Kalafut and Minaxi Gupta",
title = "Phishing Infrastructure Fluxes All the Way",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "5",
pages = "21--28",
month = sep # "\slash " # oct,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.130",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Oct 14 17:01:10 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Chandramouli:2009:OIS,
author = "Ramaswamy Chandramouli and Scott Rose",
title = "Open Issues in Secure {DNS} Deployment",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "5",
pages = "29--35",
month = sep # "\slash " # oct,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.129",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Oct 14 17:01:10 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Wijngaards:2009:SDE,
author = "Wouter C. A. Wijngaards and Benno J. Overeinder",
title = "Securing {DNS}: Extending {DNS} Servers with a
{DNSSEC} Validator",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "5",
pages = "36--43",
month = sep # "\slash " # oct,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.133",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Oct 14 17:01:10 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Osterweil:2009:ICM,
author = "Eric Osterweil and Lixia Zhang",
title = "Interadministrative Challenges in Managing {DNSKEYs}",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "5",
pages = "44--51",
month = sep # "\slash " # oct,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.126",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Oct 14 17:01:10 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Nance:2009:ETT,
author = "Kara Nance",
title = "Education: Teach Them When They Aren't Looking:
Introducing Security in {CS1}",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "5",
pages = "53--55",
month = sep # "\slash " # oct,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.139",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Oct 14 17:01:10 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Charney:2009:HEO,
author = "Scott Charney",
title = "On the Horizon: The Evolution of Online Identity",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "5",
pages = "56--59",
month = sep # "\slash " # oct,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.140",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Oct 14 17:01:10 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Cate:2009:PIS,
author = "Fred H. Cate",
title = "Privacy Interests: Security, Privacy, and the Role of
Law",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "5",
pages = "60--63",
month = sep # "\slash " # oct,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.135",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Oct 14 17:01:10 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Troutman:2009:CCGb,
author = "Justin Troutman and Vincent Rijmen",
title = "Crypto Corner: Green Cryptography: Cleaner Engineering
through Recycling, Part 2",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "5",
pages = "64--65",
month = sep # "\slash " # oct,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.120",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Oct 14 17:01:10 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Howard:2009:BTM,
author = "Michael Howard",
title = "Basic Training: Managing the Security Wall of Data",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "5",
pages = "66--68",
month = sep # "\slash " # oct,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.127",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Oct 14 17:01:10 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Zanero:2009:ATW,
author = "Stefano Zanero",
title = "Attack Trends: Wireless Malware Propagation: a Reality
Check",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "5",
pages = "70--74",
month = sep # "\slash " # oct,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.142",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Oct 14 17:01:10 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Blaze:2009:SST,
author = "Matt Blaze",
title = "Secure Systems: Taking Surveillance Out of the
Shadows",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "5",
pages = "75--77",
month = sep # "\slash " # oct,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.138",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Oct 14 17:01:10 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Lesk:2009:SPEb,
author = "Michael Lesk",
title = "Security {\&} Privacy Economics: Incentives to
Innovate: Improve the Past or Break with It?",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "5",
pages = "78--81",
month = sep # "\slash " # oct,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.125",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Oct 14 17:01:10 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Gardner:2009:BSP,
author = "Ryan W. Gardner and Matt Bishop and Tadayoshi Kohno",
title = "Building Security In: Are Patched Machines Really
Fixed?",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "5",
pages = "82--85",
month = sep # "\slash " # oct,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.116",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Oct 14 17:01:10 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Geer:2009:GMR,
author = "Daniel E. {Geer, Jr.} and Daniel G. Conway",
title = "For Good Measure: Risk Concentration",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "5",
pages = "86--87",
month = sep # "\slash " # oct,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.132",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Oct 14 17:01:10 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Bellovin:2009:CTS,
author = "Steven M. Bellovin and Daniel G. Conway",
title = "Clear Text: Security as a Systems Property",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "5",
pages = "88--88",
month = sep # "\slash " # oct,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.134",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Wed Oct 14 17:01:10 MDT 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{Schneider:2009:LS,
author = "Fred B. Schneider",
title = "Labeling-in Security",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "6",
pages = "3",
month = nov # "\slash " # dec,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.180",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu May 13 09:49:48 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{McGraw:2009:ISBe,
author = "Gary McGraw",
title = "Interview: {Silver Bullet} Talks with {Fred
Schneider}",
journal = j-IEEE-SEC-PRIV,
volume = "7",
number = "6",
pages = "5--7",
month = nov # "\slash " # dec,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1109/MSP.2009.166",
ISSN = "1540-7993 (print), 1558-4046 (electronic)",
ISSN-L = "1540-7993",
bibdate = "Thu May 13 09:49:48 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Security and Privacy",
journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}
@Article{