IEEE Security & Privacy cover image for year 2011 issue number 06

IEEE Security & Privacy

Volume 9, Issue 6

Nov.-Dec. 2011

Table of Contents

From the Editors
The Invisible ComputersFreely available from IEEE.pp. 3
Interview
Silver Bullet Talks with Halvar FlakeFreely available from IEEE.pp. 5-8
News Briefs
News BriefsFreely available from IEEE.pp. 9-11
Guest Editors' Introduction
Living with InsecurityFreely available from IEEE.pp. 12-13
Living with Insecurity
Security Dilemma: Healthcare Clinicians at WorkFull-text access may be available. Sign in or learn about subscription options.pp. 14-19
Living with Insecurity
Security Risk Management Using IncentivesFull-text access may be available. Sign in or learn about subscription options.pp. 20-28
Living with Insecurity
Helping Users Deal with Digital Threats: The Online User Supervision ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 29-35
Living with Insecurity
Securing Collaborative Intrusion Detection SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 36-42
Living with Insecurity
Operations with Degraded SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 43-48
Living with Insecurity
Securing Database as a Service: Issues and CompromisesFull-text access may be available. Sign in or learn about subscription options.pp. 49-55
It All Depends
It All Depends, and Increasingly SoFull-text access may be available. Sign in or learn about subscription options.pp. 56-57
Education
The Value of Capture-the-Flag Exercises in Education: An Interview with Chris EagleFull-text access may be available. Sign in or learn about subscription options.pp. 58-60
Privacy Interests
Mobile Devices and Location Privacy: Where Do We Go from Here?Full-text access may be available. Sign in or learn about subscription options.pp. 61-62
Basic Training
Cloud Computing: A Records and Information Management PerspectiveFull-text access may be available. Sign in or learn about subscription options.pp. 63-66
Attack Trends
A Case Study of Intelligence-Driven DefenseFull-text access may be available. Sign in or learn about subscription options.pp. 67-70
Secure Systems
Incident CoordinationFull-text access may be available. Sign in or learn about subscription options.pp. 71-75
Security & Privacy Economics
Cybersecurity and EconomicsFull-text access may be available. Sign in or learn about subscription options.pp. 76-79
Building Security In
Detecting Fraud on WebsitesFull-text access may be available. Sign in or learn about subscription options.pp. 80-85
For Good Measure
Small Is Beautiful, Big Is InevitableFull-text access may be available. Sign in or learn about subscription options.pp. 86-87
ClearText
Security ThinkFreely available from IEEE.pp. 88
Annual Index
Annual IndexFreely available from IEEE.pp. i
Showing 21 out of 21