Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
IEEE Security & Privacy
Current Issue
Past Issues
Issue 2011.06
Early Access
About
Write for Us
Peer Review
OtR Podcast
Get Access
Generate Citations
IEEE Security & Privacy
Volume 9, Issue 6
Nov.-Dec. 2011
Log in to access my content
Table of Contents
From the Editors
The Invisible Computers
Freely available from IEEE.
pp. 3
by
Marc Donner
Interview
Silver Bullet Talks with Halvar Flake
Freely available from IEEE.
pp. 5-8
by
Gary McGraw
News Briefs
News Briefs
Freely available from IEEE.
pp. 9-11
by
Lee Garber
Guest Editors' Introduction
Living with Insecurity
Freely available from IEEE.
pp. 12-13
by
William Arbaugh
,
Deborah A. Frincke
Living with Insecurity
Security Dilemma: Healthcare Clinicians at Work
Full-text access may be available. Sign in or learn about subscription options.
pp. 14-19
by
Rosa R. Heckle
Living with Insecurity
Security Risk Management Using Incentives
Full-text access may be available. Sign in or learn about subscription options.
pp. 20-28
by
Debin Liu
,
Ninghui Li
,
XiaoFeng Wang
,
L. Jean Camp
Living with Insecurity
Helping Users Deal with Digital Threats: The Online User Supervision Architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 29-35
by
Antonio Manuel Fernández Villamor
,
Antonio Manuel Fernández Villamor
,
Juan Yelmo
,
Juan C. Yelmo
Living with Insecurity
Securing Collaborative Intrusion Detection Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 36-42
by
Steven Cheung
Living with Insecurity
Operations with Degraded Security
Full-text access may be available. Sign in or learn about subscription options.
pp. 43-48
by
Simson L. Garfinkel
,
George Dinolt
Living with Insecurity
Securing Database as a Service: Issues and Compromises
Full-text access may be available. Sign in or learn about subscription options.
pp. 49-55
by
Joel Weis
,
Jim Alves-Foss
It All Depends
It All Depends, and Increasingly So
Full-text access may be available. Sign in or learn about subscription options.
pp. 56-57
by
Mohamed Kaâniche
,
Aad van Moorsel
Education
The Value of Capture-the-Flag Exercises in Education: An Interview with Chris Eagle
Full-text access may be available. Sign in or learn about subscription options.
pp. 58-60
by
Cynthia Irvine
Privacy Interests
Mobile Devices and Location Privacy: Where Do We Go from Here?
Full-text access may be available. Sign in or learn about subscription options.
pp. 61-62
by
Tara Whalen
Basic Training
Cloud Computing: A Records and Information Management Perspective
Full-text access may be available. Sign in or learn about subscription options.
pp. 63-66
by
Kirsten Ferguson-Boucher
Attack Trends
A Case Study of Intelligence-Driven Defense
Full-text access may be available. Sign in or learn about subscription options.
pp. 67-70
by
Dan Guido
Secure Systems
Incident Coordination
Full-text access may be available. Sign in or learn about subscription options.
pp. 71-75
by
Kathleen M. Moriarty
Security & Privacy Economics
Cybersecurity and Economics
Full-text access may be available. Sign in or learn about subscription options.
pp. 76-79
by
Michael Lesk
Building Security In
Detecting Fraud on Websites
Full-text access may be available. Sign in or learn about subscription options.
pp. 80-85
by
Robert Fly
For Good Measure
Small Is Beautiful, Big Is Inevitable
Full-text access may be available. Sign in or learn about subscription options.
pp. 86-87
by
Daniel E. Geer Jr.
ClearText
Security Think
Freely available from IEEE.
pp. 88
by
Steven M. Bellovin
Annual Index
Annual Index
Freely available from IEEE.
pp. i
Showing 21 out of 21
Announcements
S&P Reviewer Thanks
Spread the Word about Your Research through Social Media
Seeking 2026 Editors in Chief
Calls for Papers
CLOSED: Special Issue on Cybercrime and Online Harms
Special Issue on Security and Privacy of Generative AI
IEEE Security & Privacy
Special Issue on Privacy As Contextual Integrity
Trending
Evaluating the Effectiveness of Memory Safety Sanitizers
Emanuel Q. Vintila, +2 more
Understanding the Efficacy of Phishing Training in Practice
Grant Ho, +9 more
PyLingual: Toward Perfect Decompilation of Evolving High-Level Languages
Josh Wiedemeier, +6 more
Understanding the Impact of AI-Generated Deepfakes on Public Opinion, Political Discourse, and Personal Security in Social Media
Prakash L. Kharvi
Proof-of-Learning: Definitions and Practice
Hengrui Jia, +6 more
WireWatch: Measuring the Security of Proprietary Network Encryption in the Global Android Ecosystem
Mona Wang, +4 more
SoK: Eternal War in Memory
Laszlo Szekeres, +3 more
Flash: A Comprehensive Approach to Intrusion Detection via Provenance Graph Representation Learning
Mati Ur Rehman, +2 more
A Wall Behind A Wall: Emerging Regional Censorship in China
Mingshi Wu, +4 more
No Privacy Left Outside: On the (In-)Security of TEE-Shielded DNN Partition for On-Device ML
Ziqi Zhang, +7 more
Security and Privacy Experiences of First- and Second-Generation Pakistani Immigrants to the US: Perceptions, Practices, Challenges, and Parent-Child Dynamics
Warda Usman, +5 more
Contextual Integrity, Explained: A More Usable Privacy Definition
Nathan Malkin
Computing on Encrypted Data
Nigel Smart
Why Is Johnny Getting Groomed in Roblox?
Alyssa Chan, +2 more
Deep Learning on Private Data
M. Sadegh Riazi, +2 more
Google Android: A Comprehensive Security Assessment
Asaf Shabtai, +5 more