%%% -*-BibTeX-*-
%%% ====================================================================
%%%  BibTeX-file{
%%%     author          = "Nelson H. F. Beebe",
%%%     version         = "1.54",
%%%     date            = "09 August 2014",
%%%     time            = "08:56:06 MDT",
%%%     filename        = "ieeesecpriv.bib",
%%%     address         = "University of Utah
%%%                        Department of Mathematics, 110 LCB
%%%                        155 S 1400 E RM 233
%%%                        Salt Lake City, UT 84112-0090
%%%                        USA",
%%%     telephone       = "+1 801 581 5254",
%%%     FAX             = "+1 801 581 4148",
%%%     URL             = "http://www.math.utah.edu/~beebe",
%%%     checksum        = "52515 28867 106664 1134669",
%%%     email           = "beebe at math.utah.edu, beebe at acm.org,
%%%                        beebe at computer.org (Internet)",
%%%     codetable       = "ISO/ASCII",
%%%     keywords        = "bibliography; BibTeX; IEEE Security &
%%%                        Privacy",
%%%     license         = "public domain",
%%%     supported       = "yes",
%%%     docstring       = "This is a COMPLETE BibTeX bibliography for
%%%                        the bimonthly journal IEEE Security & Privacy
%%%                        (no CODEN, ISSN 1540-7993 (print), 1558-4046
%%%                        (electronic)), covering all journal issues
%%%                        from 2003 -- date.
%%%
%%%                        The journal Web page can be found at:
%%%
%%%                            http://www.computer.org/portal/web/csdl/magazines/security
%%%                            http://www.computer.org/portal/web/computingnow/securityandprivacy
%%%                            http://computer.org/security/
%%%
%%%                        with back-issue archives at
%%%
%%%                            http://computer.org/security/archives.htm
%%%
%%%                        The journal is also covered by the IEEE
%%%                        Xplore digital library:
%%%
%%%                            http://ieeexplore.ieee.org/servlet/opac?punumber=8013
%%%
%%%                        At version 1.54, the COMPLETE journal
%%%                        coverage looked like this:
%%%
%%%                             2003 (  96)    2007 ( 112)    2011 ( 115)
%%%                             2004 ( 120)    2008 ( 117)    2012 ( 121)
%%%                             2005 ( 103)    2009 ( 120)    2013 ( 122)
%%%                             2006 ( 118)    2010 ( 116)    2014 (  69)
%%%
%%%                             Article:       1327
%%%                             Book:             2
%%%
%%%                             Total entries: 1329
%%%
%%%                        The initial draft was extracted from the
%%%                        journal Web site.
%%%
%%%                        URL keys in the bibliography point to
%%%                        World Wide Web locations of additional
%%%                        information about the entry.
%%%
%%%                        Spelling has been verified with the UNIX
%%%                        spell and GNU ispell programs using the
%%%                        exception dictionary stored in the companion
%%%                        file with extension .sok.
%%%
%%%                        BibTeX citation tags are uniformly chosen
%%%                        as name:year:abbrev, where name is the
%%%                        family name of the first author or editor,
%%%                        year is a 4-digit number, and abbrev is a
%%%                        3-letter condensation of important title
%%%                        words. Citation tags were automatically
%%%                        generated by software developed for the
%%%                        BibNet Project.
%%%
%%%                        In this bibliography, entries are sorted in
%%%                        publication order, using ``bibsort -byvolume.''
%%%
%%%                        The checksum field above contains a CRC-16
%%%                        checksum as the first value, followed by the
%%%                        equivalent of the standard UNIX wc (word
%%%                        count) utility output of lines, words, and
%%%                        characters.  This is produced by Robert
%%%                        Solovay's checksum utility.",
%%%  }
%%% ====================================================================

@Preamble{
    "\ifx \undefined \booktitle \def \booktitle#1{{{\em #1}}} \fi" #
    "\ifx \undefined \circled \def \circled #1{(#1)}\fi" #
    "\ifx \undefined \reg \def \reg {\circled{R}}\fi"
}

%%% ====================================================================
%%% Acknowledgement abbreviations:

@String{ack-nhfb = "Nelson H. F. Beebe,
                    University of Utah,
                    Department of Mathematics, 110 LCB,
                    155 S 1400 E RM 233,
                    Salt Lake City, UT 84112-0090, USA,
                    Tel: +1 801 581 5254,
                    FAX: +1 801 581 4148,
                    e-mail: \path|beebe@math.utah.edu|,
                            \path|beebe@acm.org|,
                            \path|beebe@computer.org| (Internet),
                    URL: \path|http://www.math.utah.edu/~beebe/|"}

%%% ====================================================================
%%% Journal abbreviations:

@String{j-IEEE-SEC-PRIV = "IEEE Security \& Privacy"}

%%% ====================================================================
%%% Publisher abbreviations:

@String{pub-PEARSON-EDUCATION   = "Pearson Education"}
@String{pub-PEARSON-EDUCATION:adr = "Upper Saddle River, NJ, USA"}

@String{pub-PHPTR               = "Pren{\-}tice-Hall PTR"}
@String{pub-PHPTR:adr           = "Upper Saddle River, NJ 07458, USA"}

%%% ====================================================================
%%% Bibliography entries:

@Article{Cybenko:2003:CNA,
  author =       "George Cybenko",
  title =        "A Critical Need, An Ambitious Mission, a New
                 Magazine",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "1",
  pages =        "5--9",
  month =        jan # "\slash " # feb,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 18:46:48 MST 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/security/j1005.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Miller:2003:LBL,
  author =       "Sandra Kay Miller",
  title =        "Legal Battle Looming for {Internet} Protections Acts",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "1",
  pages =        "10--12",
  month =        jan # "\slash " # feb,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 18:46:48 MST 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j1010.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Andresen:2003:NDS,
  author =       "Scott L. Andresen",
  title =        "New Draft to Secure Cyberspace Leaked",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "1",
  pages =        "13--13",
  month =        jan # "\slash " # feb,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 18:46:48 MST 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j1013.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Garfinkel:2003:RDP,
  author =       "Simson L. Garfinkel and Abhi Shelat",
  title =        "Remembrance of Data Passed: a Study of Disk
                 Sanitization Practices",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "1",
  pages =        "17--27",
  month =        jan # "\slash " # feb,
  year =         "2003",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2003.1176992",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 18:46:48 MST 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j1017.pdf;
                 http://www.computer.org/security/j1017abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Petroni:2003:DMS,
  author =       "Nick L. {Petroni, Jr.} and William A. Arbaugh",
  title =        "The Dangers of Mitigating Security Design Flaws: a
                 Wireless Case Study",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "1",
  pages =        "28--36",
  month =        jan # "\slash " # feb,
  year =         "2003",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2003.1176993",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 18:46:48 MST 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j1028.pdf;
                 http://www.computer.org/security/j1028abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Cowan:2003:SSO,
  author =       "Crispin Cowan",
  title =        "Software Security for Open-Source Systems",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "1",
  pages =        "38--45",
  month =        jan # "\slash " # feb,
  year =         "2003",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2003.1176994",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 18:46:48 MST 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j1038.pdf;
                 http://www.computer.org/security/j1038abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Haines:2003:VSA,
  author =       "Joshua Haines and Dorene Kewley Ryder and Laura Tinnel
                 and Stephen Taylor",
  title =        "Validation of Sensor Alert Correlators",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "1",
  pages =        "46--56",
  month =        jan # "\slash " # feb,
  year =         "2003",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2003.1176995",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 18:46:48 MST 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j1046.pdf;
                 http://www.computer.org/security/j1046abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Howard:2003:IWS,
  author =       "Michael Howard and Steve Lipner",
  title =        "Inside the {Windows} Security Push",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "1",
  pages =        "57--61",
  month =        jan # "\slash " # feb,
  year =         "2003",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2003.1176996",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 18:46:48 MST 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j1057.pdf;
                 http://www.computer.org/security/j1057abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Donner:2003:ABM,
  author =       "Marc Donner",
  title =        "{AI} Bites Man?",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "1",
  pages =        "63--66",
  month =        jan # "\slash " # feb,
  year =         "2003",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2003.1176997",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 18:46:48 MST 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j1063.pdf;
                 http://www.computer.org/security/j1063abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Bishop:2003:WCS,
  author =       "Matt Bishop",
  title =        "What Is Computer Security?",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "1",
  pages =        "67--69",
  month =        jan # "\slash " # feb,
  year =         "2003",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2003.1176998",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 18:46:48 MST 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j1067.pdf;
                 http://www.computer.org/security/j1067abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Ryan:2003:TVS,
  author =       "Daniel J. Ryan",
  title =        "Two Views on Security Software Liability: Let the
                 Legal System Decide",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "1",
  pages =        "70--72",
  month =        jan # "\slash " # feb,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 18:46:48 MST 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j1070.pdf;
                 http://www.computer.org/security/j1070abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Heckman:2003:TVS,
  author =       "Carey Heckman",
  title =        "Two Views on Security Software Liability: Using the
                 Right Legal Tools",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "1",
  pages =        "73--75",
  month =        jan # "\slash " # feb,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 18:46:48 MST 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j1073.pdf;
                 http://www.computer.org/security/j1073abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Lesk:2003:CEE,
  author =       "Michael Lesk",
  title =        "Copyright Extension: {Eldred} v. {Ashcroft}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "1",
  pages =        "76--78",
  month =        jan # "\slash " # feb,
  year =         "2003",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2003.1177000",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 18:46:48 MST 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j1076.pdf;
                 http://www.computer.org/security/j1076abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Hearn:2003:IPC,
  author =       "Jim Hearn",
  title =        "International Participation: The Continuing March
                 Toward Security and Privacy",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "1",
  pages =        "79--81",
  month =        jan # "\slash " # feb,
  year =         "2003",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2003.1177001",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 18:46:48 MST 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j1079.pdf;
                 http://www.computer.org/security/j1079abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Arce:2003:ASW,
  author =       "Iv{\'a}n Arce and Elias Levy",
  title =        "An Analysis of the {Slapper Worm}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "1",
  pages =        "82--87",
  month =        jan # "\slash " # feb,
  year =         "2003",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2003.1177002",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 18:46:48 MST 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j1082.pdf;
                 http://www.computer.org/security/j1082abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Smith:2003:FDS,
  author =       "S. W. Smith",
  title =        "Fairy Dust, Secrets, and the Real World",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "1",
  pages =        "89--93",
  month =        jan # "\slash " # feb,
  year =         "2003",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2003.1177003",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 18:46:48 MST 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j1089.pdf;
                 http://www.computer.org/security/j1089abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Stytz:2003:SPS,
  author =       "Martin R. Stytz and James A. Whittaker",
  title =        "Software Protection: Security's Last Stand?",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "1",
  pages =        "95--98",
  month =        jan # "\slash " # feb,
  year =         "2003",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2003.1177004",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 18:46:48 MST 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j1095.pdf;
                 http://www.computer.org/security/j1095abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Caloyannides:2003:PVI,
  author =       "Michael Caloyannides",
  title =        "Privacy vs. Information Technology",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "1",
  pages =        "100--103",
  month =        jan # "\slash " # feb,
  year =         "2003",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2003.1177005",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 18:46:48 MST 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j1100.pdf;
                 http://www.computer.org/security/j1100abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Schneier:2003:WAS,
  author =       "Bruce Schneier",
  title =        "We Are All Security Consumers",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "1",
  pages =        "104--104",
  month =        jan # "\slash " # feb,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 18:46:48 MST 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j1104.pdf;
                 http://www.computer.org/security/j1104abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Cybenko:2003:ESS,
  author =       "George Cybenko",
  title =        "From the {Editor}: {Sapphire\slash Slammer} Redux",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "2",
  pages =        "6--6",
  month =        mar # "\slash " # apr,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 19:00:16 MST 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j2006.pdf;
                 http://www.computer.org/security/j2006abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Anonymous:2003:LEa,
  author =       "Anonymous",
  title =        "Letters to the {Editor}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "2",
  pages =        "7--10",
  month =        mar # "\slash " # apr,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 19:00:16 MST 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  note =         "See erratum \cite{Anonymous:2003:EHV}.",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j2007.pdf;
                 http://www.computer.org/security/j2007abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Dern:2003:PC,
  author =       "Daniel P. Dern",
  title =        "Privacy Concerns",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "2",
  pages =        "11--13",
  month =        mar # "\slash " # apr,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 19:00:16 MST 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j2011.pdf;
                 http://www.computer.org/security/j2011abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Spitzner:2003:HPT,
  author =       "Lance Spitzner",
  title =        "The {Honeynet Project}: Trapping the Hackers",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "2",
  pages =        "15--23",
  month =        mar # "\slash " # apr,
  year =         "2003",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2003.1193207",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 19:00:16 MST 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j2015.pdf;
                 http://www.computer.org/security/j2015abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Blaze:2003:RAM,
  author =       "Matt Blaze",
  title =        "Rights Amplification in Master-Keyed Mechanical
                 Locks",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "2",
  pages =        "24--32",
  month =        mar # "\slash " # apr,
  year =         "2003",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2003.1193208",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 19:00:16 MST 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j2024.pdf;
                 http://www.computer.org/security/j2024abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Prabhakar:2003:BRS,
  author =       "Salil Prabhakar and Sharath Pankanti and Anil K.
                 Jain",
  title =        "Biometric Recognition: Security and Privacy Concerns",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "2",
  pages =        "33--42",
  month =        mar # "\slash " # apr,
  year =         "2003",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2003.1193209",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 19:00:16 MST 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j2033.pdf;
                 http://www.computer.org/security/j2033abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Burr:2003:SAE,
  author =       "William E. Burr",
  title =        "Selecting the {Advanced Encryption Standard}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "2",
  pages =        "43--52",
  month =        mar # "\slash " # apr,
  year =         "2003",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2003.1193210",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 19:00:16 MST 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j2043.pdf;
                 http://www.computer.org/security/j2043abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Donner:2003:PAN,
  author =       "Marc Donner",
  title =        "Post-Apocalypse Now",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "2",
  pages =        "53--55",
  month =        mar # "\slash " # apr,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 19:00:16 MST 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j2053.pdf;
                 http://www.computer.org/security/j2053abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Davis:2003:TSD,
  author =       "Jim Davis and Melissa Dark",
  title =        "Teaching Students to Design Secure Systems",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "2",
  pages =        "56--58",
  month =        mar # "\slash " # apr,
  year =         "2003",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2003.1193212",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 19:00:16 MST 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j2056.pdf;
                 http://www.computer.org/security/j2056abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{McGraw:2003:GDS,
  author =       "Gary McGraw",
  title =        "From the Ground Up: The {DIMACS Software Security
                 Workshop}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "2",
  pages =        "59--66",
  month =        mar # "\slash " # apr,
  year =         "2003",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2003.1193213",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 19:00:16 MST 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  note =         "See erratum \cite{Anonymous:2003:EHV}.",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j2059.pdf;
                 http://www.computer.org/security/j2059abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Lesk:2003:CEC,
  author =       "Michael Lesk",
  title =        "Copyright Enforcement or Censorship: New Uses for the
                 {DMCA}?",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "2",
  pages =        "67--69",
  month =        mar # "\slash " # apr,
  year =         "2003",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2003.1193214",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 19:00:16 MST 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j2067.pdf;
                 http://www.computer.org/security/j2067abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Hearn:2003:MF,
  author =       "Jim Hearn",
  title =        "Moving Forward?",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "2",
  pages =        "70--71",
  month =        mar # "\slash " # apr,
  year =         "2003",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2003.1193215",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 19:00:16 MST 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j2070.pdf;
                 http://www.computer.org/security/j2070abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Arce:2003:WLR,
  author =       "Iv{\'a}n Arce",
  title =        "The Weakest Link Revisited",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "2",
  pages =        "72--76",
  month =        mar # "\slash " # apr,
  year =         "2003",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2003.1193216",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 19:00:16 MST 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j2072.pdf;
                 http://www.computer.org/security/j2072abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Ball:2003:PPE,
  author =       "Edward Ball and David W. Chadwick and Darren Mundy",
  title =        "Patient Privacy in Electronic Prescription Transfer",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "2",
  pages =        "77--80",
  month =        mar # "\slash " # apr,
  year =         "2003",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2003.1193217",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 19:00:16 MST 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j2077.pdf;
                 http://www.computer.org/security/j2077abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Whittaker:2003:WSA,
  author =       "James Whittaker",
  title =        "Why Secure Applications Are Difficult to Write",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "2",
  pages =        "81--83",
  month =        mar # "\slash " # apr,
  year =         "2003",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2003.1193218",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 19:00:16 MST 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j2081.pdf;
                 http://www.computer.org/security/j2081abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Caloyannides:2003:ESC,
  author =       "Michael A. Caloyannides",
  title =        "Engineering or Sloganeering? The Counterattack on
                 Privacy",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "2",
  pages =        "84--87",
  month =        mar # "\slash " # apr,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 19:00:16 MST 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j2084.pdf;
                 http://www.computer.org/security/j2084abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Schneier:2003:LFD,
  author =       "Bruce Schneier",
  title =        "Locks and Full Disclosure",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "2",
  pages =        "88--88",
  month =        mar # "\slash " # apr,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 19:00:16 MST 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j2088.pdf;
                 http://www.computer.org/security/j2088abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Donner:2003:TSO,
  author =       "Marc Donner",
  title =        "Toward a Security Ontology",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "3",
  pages =        "6--7",
  month =        may # "\slash " # jun,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jun 14 14:56:19 MDT 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j3006.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Anonymous:2003:EHV,
  author =       "Anonymous",
  title =        "Errata: {``On the Horizon'' (vol. 1, no. 2)} and
                 {``Interface'' (vol. 1, no. 2, p. 9)}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "3",
  pages =        "7--7",
  month =        may # "\slash " # jun,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jun 14 14:56:19 MDT 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  note =         "See \cite{McGraw:2003:GDS,Anonymous:2003:LEa}.",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j3008.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Anonymous:2003:N,
  author =       "Anonymous",
  title =        "News",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "3",
  pages =        "8--13",
  month =        may # "\slash " # jun,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jun 14 14:56:19 MDT 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j3008.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Mead:2003:BF,
  author =       "Nancy R. Mead",
  title =        "Building a Foundation",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "3",
  pages =        "14--14",
  month =        may # "\slash " # jun,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jun 14 14:56:19 MDT 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j3014.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Ishitani:2003:MBA,
  author =       "Lucila Ishitani and Virgilio Almeida and Wagner
                 {Meira, Jr.}",
  title =        "Masks: Bringing Anonymity and Personalization
                 Together",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "3",
  pages =        "18--23",
  month =        may # "\slash " # jun,
  year =         "2003",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2003.1203218",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jun 14 14:56:19 MDT 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j3018.pdf;
                 http://www.computer.org/security/j3018abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Aljifri:2003:ITN,
  author =       "Hassan Aljifri",
  title =        "{IP} Traceback: a New Denial-of-Service Deterrent?",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "3",
  pages =        "24--31",
  month =        may # "\slash " # jun,
  year =         "2003",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2003.1203219",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jun 14 14:56:19 MDT 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j3024.pdf;
                 http://www.computer.org/security/j3024abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Provos:2003:HSI,
  author =       "Niels Provos and Peter Honeyman",
  title =        "Hide and Seek: An Introduction to Steganography",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "3",
  pages =        "32--44",
  month =        may # "\slash " # jun,
  year =         "2003",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2003.1203220",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jun 14 14:56:19 MDT 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j3032.pdf;
                 http://www.computer.org/security/j3032abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Matyas:2003:TRU,
  author =       "V{\'a}clav {Maty{\'a}s, Jr.} and Zdenek Riha",
  title =        "Toward Reliable User Authentication through
                 Biometrics",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "3",
  pages =        "45--49",
  month =        may # "\slash " # jun,
  year =         "2003",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2003.1203221",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jun 14 14:56:19 MDT 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j3045.pdf;
                 http://www.computer.org/security/j3045abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Donner:2003:HR,
  author =       "Marc Donner",
  title =        "Hey, Robot!",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "3",
  pages =        "51--55",
  month =        may # "\slash " # jun,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jun 14 14:56:19 MDT 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j3051.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Frincke:2003:WWS,
  author =       "Deborah Frincke",
  title =        "Who Watches the Security Educators?",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "3",
  pages =        "56--58",
  month =        may # "\slash " # jun,
  year =         "2003",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2003.1203223",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jun 14 14:56:19 MDT 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j3056.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Felten:2003:UTC,
  author =       "Edward W. Felten",
  title =        "Understanding Trusted Computing: Will Its Benefits
                 Outweigh Its Drawbacks?",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "3",
  pages =        "60--62",
  month =        may # "\slash " # jun,
  year =         "2003",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2003.1203224",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jun 14 14:56:19 MDT 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j3060.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Lesk:2003:GBU,
  author =       "Michael Lesk",
  title =        "The Good, the Bad, and the Ugly: What Might Change if
                 We Had Good {DRM}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "3",
  pages =        "63--66",
  month =        may # "\slash " # jun,
  year =         "2003",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2003.1203225",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jun 14 14:56:19 MDT 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j3063.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Hearn:2003:SD,
  author =       "Jim Hearn",
  title =        "Slow Dancing",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "3",
  pages =        "67--68",
  month =        may # "\slash " # jun,
  year =         "2003",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2003.1203226",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jun 14 14:56:19 MDT 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j3067.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Levy:2003:PSS,
  author =       "Elias Levy",
  title =        "Poisoning the Software Supply Chain",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "3",
  pages =        "70--73",
  month =        may # "\slash " # jun,
  year =         "2003",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2003.1203227",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jun 14 14:56:19 MDT 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j3070.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Smith:2003:HLH,
  author =       "S. W. Smith",
  title =        "Humans in the Loop: Human-Computer Interaction and
                 Security",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "3",
  pages =        "75--79",
  month =        may # "\slash " # jun,
  year =         "2003",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2003.1203228",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jun 14 14:56:19 MDT 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j3075.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Stytz:2003:CSW,
  author =       "Martin R. Stytz",
  title =        "The Case for Software Warranties",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "3",
  pages =        "80--82",
  month =        may # "\slash " # jun,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jun 14 14:56:19 MDT 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j3080.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Caloyannides:2003:SCF,
  author =       "Michael A. Caloyannides",
  title =        "Society Cannot Function Without Privacy",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "3",
  pages =        "84--86",
  month =        may # "\slash " # jun,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jun 14 14:56:19 MDT 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j3084.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Schneier:2003:GUP,
  author =       "Bruce Schneier",
  title =        "Guilty Until Proven Innocent?",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "3",
  pages =        "88, 87",
  month =        may # "\slash " # jun,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jun 14 14:56:19 MDT 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j3088.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Landwehr:2003:ESC,
  author =       "Carl E. Landwehr",
  title =        "From the {Editor}: Security Cosmology: Moving from
                 {Big Bang} to Worlds in Collusion",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "5",
  pages =        "5--5",
  month =        sep # "\slash " # oct,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 9 07:39:10 MDT 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/05/j5005.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Anonymous:2003:SPW,
  author =       "Anonymous",
  title =        "{Security and Privacy} Welcomes New {Editorial Board}
                 Members",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "5",
  pages =        "6--7",
  month =        sep # "\slash " # oct,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 9 07:39:10 MDT 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/05/j5006.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Goth:2003:Na,
  author =       "Greg Goth and Sandra Kay Miller",
  title =        "News",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "5",
  pages =        "8--11",
  month =        sep # "\slash " # oct,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 9 07:39:10 MDT 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2003/05/j5008.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Andresen:2003:NB,
  author =       "Scott L. Andresen",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "5",
  pages =        "12--13",
  month =        sep # "\slash " # oct,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 9 07:39:10 MDT 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2003/05/j5012.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Anonymous:2003:LEb,
  author =       "Anonymous",
  title =        "Letters to the Editor",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "5",
  pages =        "14--14",
  month =        sep # "\slash " # oct,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 9 07:39:10 MDT 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/05/j5014.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Campbell:2003:CSI,
  author =       "Robert J. Campbell",
  title =        "Crime Scene Investigators: The Next Generation",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "5",
  pages =        "15--15",
  month =        sep # "\slash " # oct,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 9 07:39:10 MDT 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/05/j5015.pdf;
                 http://csdl.computer.org/comp/mags/sp/2003/05/j5015abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{McGrath:2003:MEP,
  author =       "Dennis McGrath",
  title =        "Measuring the 4:11 Effect: The Power Failure and the
                 {Internet}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "5",
  pages =        "16--18",
  month =        sep # "\slash " # oct,
  year =         "2003",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2003.1236230",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 9 07:39:10 MDT 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/05/j5016abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/05/j5016.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Amin:2003:NAE,
  author =       "Massoud Amin",
  title =        "{North America}'s Electricity Infrastructure: Are We
                 Ready for More Perfect Storms?",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "5",
  pages =        "19--25",
  month =        sep # "\slash " # oct,
  year =         "2003",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2003.1236231",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 9 07:39:10 MDT 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/05/j5019abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/05/j5019.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Capek:2003:MCE,
  author =       "Peter G. Capek and David M. Chess and Steve R. White",
  title =        "{Merry Christma}: An Early Network Worm",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "5",
  pages =        "26--34",
  month =        sep # "\slash " # oct,
  year =         "2003",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2003.1236232",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 9 07:39:10 MDT 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/05/j5026abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/05/j5026.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Orman:2003:MWF,
  author =       "Hilarie Orman",
  title =        "The {Morris} Worm: a Fifteen-Year Perspective",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "5",
  pages =        "35--43",
  month =        sep # "\slash " # oct,
  year =         "2003",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2003.1236233",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 9 07:39:10 MDT 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/05/j5035abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/05/j5035.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Oppliger:2003:DED,
  author =       "Rolf Oppliger and Ruedi Rytz",
  title =        "Digital Evidence: Dream and Reality",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "5",
  pages =        "44--48",
  month =        sep # "\slash " # oct,
  year =         "2003",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2003.1236234",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 9 07:39:10 MDT 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/05/j5044abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/05/j5044.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Hariri:2003:IAF,
  author =       "Salim Hariri and Guangzhi Qu and Tushneem Dharmagadda
                 and Modukuri Ramkishore and Cauligi S. Raghavendra",
  title =        "Impact Analysis of Faults and Attacks in Large-Scale
                 Networks",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "5",
  pages =        "49--54",
  month =        sep # "\slash " # oct,
  year =         "2003",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2003.1236235",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 9 07:39:10 MDT 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/05/j5049abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/05/j5049.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Schneider:2003:LPM,
  author =       "Fred B. Schneider",
  title =        "Least Privilege and More",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "5",
  pages =        "55--59",
  month =        sep # "\slash " # oct,
  year =         "2003",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2003.1236236",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 9 07:39:10 MDT 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/05/j5055abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/05/j5055.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Lenarcic:2003:DBT,
  author =       "John Lenarcic",
  title =        "The Dinosaur and the Butterfly: a Tale of Computer
                 Ethics",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "5",
  pages =        "61--63",
  month =        sep # "\slash " # oct,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 9 07:39:10 MDT 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/05/j5061abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/05/j5061.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Ragsdale:2003:IAW,
  author =       "Dan Ragsdale and Don Welch and Ron Dodge",
  title =        "Information Assurance the {West Point} Way",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "5",
  pages =        "64--67",
  month =        sep # "\slash " # oct,
  year =         "2003",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2003.1236238",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 9 07:39:10 MDT 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/05/j5064abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/05/j5064.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Mead:2003:SFH,
  author =       "Nancy R. Mead",
  title =        "{SEHAS 2003}: The Future of High-Assurance Systems",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "5",
  pages =        "68--72",
  month =        sep # "\slash " # oct,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 9 07:39:10 MDT 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/05/j5068abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/05/j5068.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Lesk:2003:CLR,
  author =       "Michael Lesk",
  title =        "{Chicken Little} and the Recorded Music Crisis",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "5",
  pages =        "73--75",
  month =        sep # "\slash " # oct,
  year =         "2003",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2003.1236239",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 9 07:39:10 MDT 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/05/j5073abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/05/j5073.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Hearn:2003:WW,
  author =       "Jim Hearn",
  title =        "What Works?",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "5",
  pages =        "76--77",
  month =        sep # "\slash " # oct,
  year =         "2003",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2003.1236240",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 9 07:39:10 MDT 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/05/j5076abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/05/j5076.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Arce:2003:RG,
  author =       "Iv{\'a}n Arce",
  title =        "The Rise of the Gadgets",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "5",
  pages =        "78--81",
  month =        sep # "\slash " # oct,
  year =         "2003",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2003.1236241",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 9 07:39:10 MDT 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/05/j5078abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/05/j5078.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Camp:2003:AD,
  author =       "Jean Camp",
  title =        "Access Denied",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "5",
  pages =        "82--85",
  month =        sep # "\slash " # oct,
  year =         "2003",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2003.1236242",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 9 07:39:10 MDT 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/05/j5082abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/05/j5082.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Stytz:2003:CPC,
  author =       "Martin Stytz and James A. Whittaker",
  title =        "Caution: This Product Contains Security Code",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "5",
  pages =        "86--88",
  month =        sep # "\slash " # oct,
  year =         "2003",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2003.1236243",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 9 07:39:10 MDT 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/05/j5086abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/05/j5086.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{McCarty:2003:AIT,
  author =       "Bill McCarty",
  title =        "Automated Identity Theft",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "5",
  pages =        "89--92",
  month =        sep # "\slash " # oct,
  year =         "2003",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2003.1236244",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 9 07:39:10 MDT 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/05/j5089abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/05/j5089.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Caloyannides:2003:KOC,
  author =       "Michael Caloyannides",
  title =        "Keeping Offline Computer Usage Private",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "5",
  pages =        "93--95",
  month =        sep # "\slash " # oct,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 9 07:39:10 MDT 2003",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/05/j5093abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/05/j5093.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Cybenko:2003:EPI,
  author =       "George Cybenko",
  title =        "From the {Editors}: Privacy Is the Issue",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "6",
  pages =        "5--7",
  month =        nov # "\slash " # dec,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jan 27 18:07:01 MST 2004",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/06/j6005.pdf;
                 http://csdl.computer.org/comp/mags/sp/2003/06/j6005abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6005.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Goth:2003:Nb,
  author =       "Greg Goth and Benjamin J. Alfonsi",
  title =        "News",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "6",
  pages =        "8--13",
  month =        nov # "\slash " # dec,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jan 27 18:07:01 MST 2004",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/06/j6008abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6008.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6008.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Geer:2003:M,
  author =       "Daniel E. {Geer, Jr.} and Dave Aucsmith and James A.
                 Whittaker",
  title =        "Monoculture",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "6",
  pages =        "14--17",
  month =        nov # "\slash " # dec,
  year =         "2003",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2003.1253563",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jan 27 18:07:01 MST 2004",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/06/j6014abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6014.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6014.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Garfinkel:2003:EBI,
  author =       "Simson L. Garfinkel",
  title =        "Email-Based Identification and Authentication: An
                 Alternative to {PKI}?",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "6",
  pages =        "20--26",
  month =        nov # "\slash " # dec,
  year =         "2003",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2003.1253564",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jan 27 18:07:01 MST 2004",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/06/j6020abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6020.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6020.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Agrawal:2003:MAD,
  author =       "Dakshi Agrawal and Dogan Kesdogan",
  title =        "Measuring Anonymity: The Disclosure Attack",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "6",
  pages =        "27--34",
  month =        nov # "\slash " # dec,
  year =         "2003",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2003.1253565",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jan 27 18:07:01 MST 2004",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/06/j6027abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6027.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6027.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Seigneur:2003:PRD,
  author =       "Jean-Marc Seigneur and Christian Damsgaard Jensen",
  title =        "Privacy Recovery with Disposable Email Addresses",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "6",
  pages =        "35--39",
  month =        nov # "\slash " # dec,
  year =         "2003",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2003.1253566",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jan 27 18:07:01 MST 2004",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/06/j6035abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6035.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6035.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Rezgui:2003:PWF,
  author =       "Abdelmounaam Rezgui and Athman Bouguettaya and Mohamed
                 Y. Eltoweissy",
  title =        "Privacy on the {Web}: Facts, Challenges, and
                 Solutions",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "6",
  pages =        "40--49",
  month =        nov # "\slash " # dec,
  year =         "2003",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2003.1253567",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jan 27 18:07:01 MST 2004",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/06/j6040abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6040.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6040.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Cranor:2003:PMP,
  author =       "Lorrie Faith Cranor",
  title =        "{P3P}: Making Privacy Policies More Useful",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "6",
  pages =        "50--55",
  month =        nov # "\slash " # dec,
  year =         "2003",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2003.1253568",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jan 27 18:07:01 MST 2004",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/06/j6050abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6050.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6050.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Quarterman:2003:UIG,
  author =       "John S. Quarterman",
  title =        "The Ultimate in Instant Gratification",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "6",
  pages =        "56--58",
  month =        nov # "\slash " # dec,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jan 27 18:07:01 MST 2004",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/06/j6056abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6056.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6056.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Irvine:2003:TCS,
  author =       "Cynthia E. Irvine",
  title =        "Teaching Constructive Security",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "6",
  pages =        "59--61",
  month =        nov # "\slash " # dec,
  year =         "2003",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2003.1253570",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jan 27 18:07:01 MST 2004",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/06/j6059abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6059.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6059.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Wing:2003:CAL,
  author =       "Jeannette M. Wing",
  title =        "A Call to Action: Look Beyond the Horizon",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "6",
  pages =        "62--67",
  month =        nov # "\slash " # dec,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jan 27 18:07:01 MST 2004",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/06/j6062abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6062.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6062.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Lesk:2003:FFI,
  author =       "Michael Lesk",
  title =        "Feist and Facts: If Data Is Protected, Will It Be More
                 or Less Available?",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "6",
  pages =        "68--70",
  month =        nov # "\slash " # dec,
  year =         "2003",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2003.1253572",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jan 27 18:07:01 MST 2004",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/06/j6068abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6068.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6068.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Levy:2003:COP,
  author =       "Elias Levy",
  title =        "Crossover: Online Pests Plaguing the Offline World",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "6",
  pages =        "71--73",
  month =        nov # "\slash " # dec,
  year =         "2003",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2003.1253573",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jan 27 18:07:01 MST 2004",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/06/j6071abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6071.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6071.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Smith:2003:FTH,
  author =       "S. W. Smith and Jothy Rosenberg and Adam Golodner",
  title =        "A Funny Thing Happened on the Way to the Marketplace",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "6",
  pages =        "74--78",
  month =        nov # "\slash " # dec,
  year =         "2003",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2003.1253574",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jan 27 18:07:01 MST 2004",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/06/j6074abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6074.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6074.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{McCarty:2003:HAR,
  author =       "Bill McCarty",
  title =        "The {Honeynet} Arms Race",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "6",
  pages =        "79--82",
  month =        nov # "\slash " # dec,
  year =         "2003",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2003.1253575",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jan 27 18:07:01 MST 2004",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/06/j6079abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6079.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6079.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Anonymous:2003:AII,
  author =       "Anonymous",
  title =        "2003 Annual Index {IEEE Security \& Privacy Volume
                 1}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "6",
  pages =        "83--88",
  month =        nov # "\slash " # dec,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jan 27 18:07:01 MST 2004",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/06/j6083.pdf;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6083.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Caloyannides:2003:DER,
  author =       "Michael A. Caloyannides",
  title =        "Digital `Evidence' and Reasonable Doubt",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "6",
  pages =        "89--91",
  month =        nov # "\slash " # dec,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jan 27 18:07:01 MST 2004",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/06/j6089abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6089.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6089.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Schneier:2003:AH,
  author =       "Bruce Schneier",
  title =        "Airplane Hackers",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "1",
  number =       "6",
  pages =        "92--92",
  month =        nov # "\slash " # dec,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jan 27 18:07:01 MST 2004",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/06/j6092abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6092.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6092.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Schneider:2004:END,
  author =       "Fred B. Schneider",
  title =        "From the {Editors}: The Next Digital Divide",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "1",
  pages =        "5--5",
  month =        jan # "\slash " # feb,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2004.1264838",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 3 11:48:25 MST 2004",
  bibsource =    "http://www.computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/01/j1005.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Anonymous:2004:RT,
  author =       "Anonymous",
  title =        "Reviewer Thanks",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "1",
  pages =        "6--6",
  month =        jan # "\slash " # feb,
  year =         "2004",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 3 11:48:25 MST 2004",
  bibsource =    "http://www.computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/01/j1006.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Weber:2004:LED,
  author =       "Daniel Weber and Jean Camp and Tom {Van Vleck} and Bob
                 Bruen and James Whittaker",
  title =        "Letters to the {Editors}: Digital Rights Management;
                 Change the Game?; No Clear Answers",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "1",
  pages =        "7--9",
  month =        jan # "\slash " # feb,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2004.1264840",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 3 11:48:25 MST 2004",
  bibsource =    "http://www.computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/01/j1007.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Palmer:2004:EBM,
  author =       "Charles C. Palmer",
  title =        "{Editorial Board} Member Profile: Can We Win the
                 Security Game?",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "1",
  pages =        "10--12",
  month =        jan # "\slash " # feb,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2004.1264842",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 3 11:48:25 MST 2004",
  bibsource =    "http://www.computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/01/j1010abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/01/j1010.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Goth:2004:NVS,
  author =       "Greg Goth and Pam Frost Gorder",
  title =        "News: {E}-Voting Security: The Electoral Dialect Gets
                 Hot; Balancing Video-Game Piracy Issues",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "1",
  pages =        "14--17",
  month =        jan # "\slash " # feb,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2004.1264844",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 3 11:48:25 MST 2004",
  bibsource =    "http://www.computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/01/j1014abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/01/j1014.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Andresen:2004:NPP,
  author =       "Scott L. Andresen",
  title =        "NewsBriefs: Policy; Privacy; Security",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "1",
  pages =        "18--19",
  month =        jan # "\slash " # feb,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2004.1264846",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 3 11:48:25 MST 2004",
  bibsource =    "http://www.computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/01/j1020abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/01/j1020.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Stytz:2004:BRW,
  author =       "Martin R. Stytz",
  title =        "Book Reviews: Wireless World Order [{{\em How Secure
                 Is Your Wireless Network? Safeguarding Your Wi-Fi LAN}
                 by Lee Barken}]; No Need to Fear [{{\em Beyond Fear:
                 Thinking Sensibly About Security in an Uncertain
                 World}, by Bruce Schneier}]",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "1",
  pages =        "20--21",
  month =        jan # "\slash " # feb,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2004.1264847",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 3 11:48:25 MST 2004",
  bibsource =    "http://www.computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/01/j1020abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/01/j1020.pdf",
  acknowledgement = ack-nhfb,
  doi-1 =        "http://dx.doi.org/10.1109/MSECP.2004.1264848",
  fjournal =     "IEEE Security and Privacy",
}

@Article{Dill:2004:GEI,
  author =       "David L. Dill and Aviel D. Rubin",
  title =        "{Guest Editors}' Introduction: {E}-Voting Security",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "1",
  pages =        "22--23",
  month =        jan # "\slash " # feb,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2004.1264849",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 3 11:48:25 MST 2004",
  bibsource =    "http://www.computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/01/j1022.pdf;
                 http://csdl.computer.org/comp/mags/sp/2004/01/j1022abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Evans:2004:VES,
  author =       "David Evans and Nathanael Paul",
  title =        "{E}-Voting: Election Security: Perception and
                 Reality",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "1",
  pages =        "24--31",
  month =        jan # "\slash " # feb,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2004.1264850",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 3 11:48:25 MST 2004",
  bibsource =    "http://www.computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/01/j1024abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/01/j1024.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Bannet:2004:VHV,
  author =       "Jonathan Bannet and David W. Price and Algis Rudys and
                 Justin Singer and Dan S. Wallach",
  title =        "{E}-Voting: Hack-a-Vote: Security Issues with
                 Electronic Voting Systems",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "1",
  pages =        "32--37",
  month =        jan # "\slash " # feb,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2004.1264851",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 3 11:48:25 MST 2004",
  bibsource =    "http://www.computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/01/j1032abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/01/j1032.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Chaum:2004:VSB,
  author =       "David Chaum",
  title =        "{E}-Voting: Secret-Ballot Receipts: True
                 Voter-Verifiable Elections",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "1",
  pages =        "38--47",
  month =        jan # "\slash " # feb,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2004.1264852",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 3 11:48:25 MST 2004",
  bibsource =    "http://www.computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/01/j1038abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/01/j1038.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Sklavos:2004:CRC,
  author =       "Nicolas Sklavos and Nikolay Moldovyan and Vladimir
                 Gorodetsky and Odysseas Koufopavlou",
  title =        "Conference Reports: Computer Network Security: Report
                 from {MMM-ACNS}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "1",
  pages =        "49--52",
  month =        jan # "\slash " # feb,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2004.1264853",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 3 11:48:25 MST 2004",
  bibsource =    "http://www.computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/01/j1049abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/01/j1049.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Donner:2004:BTG,
  author =       "Marc Donner",
  title =        "Biblio Tech: {Die Gedanken Sind Frei}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "1",
  pages =        "53--55",
  month =        jan # "\slash " # feb,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2004.1264854",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 3 11:48:25 MST 2004",
  bibsource =    "http://www.computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/01/j1053abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/01/j1053.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Grimaila:2004:EMB,
  author =       "Michael Russell Grimaila",
  title =        "Education: Maximizing Business Information Security's
                 Educational Value",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "1",
  pages =        "56--60",
  month =        jan # "\slash " # feb,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2004.1264855",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 3 11:48:25 MST 2004",
  bibsource =    "http://www.computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/01/j1056abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/01/j1056.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Lesk:2004:DRM,
  author =       "Michael Lesk",
  title =        "Digital Rights: Micropayments: An Idea Whose Time Has
                 Passed Twice?",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "1",
  pages =        "61--63",
  month =        jan # "\slash " # feb,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2004.1264856",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 3 11:48:25 MST 2004",
  bibsource =    "http://www.computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/01/j1061abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/01/j1061.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Hearn:2004:GPD,
  author =       "Jim Hearn",
  title =        "Global Perspectives: Does the Common Criteria Paradigm
                 Have a Future?",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "1",
  pages =        "64--65",
  month =        jan # "\slash " # feb,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2004.1264857",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 3 11:48:25 MST 2004",
  bibsource =    "http://www.computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/01/j1064abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/01/j1064.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Arce:2004:ATM,
  author =       "Iv{\'a}n Arce",
  title =        "Attack Trends: More Bang For the Bug: An Account of
                 2003's Attack Trends",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "1",
  pages =        "66--68",
  month =        jan # "\slash " # feb,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2004.1264858",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 3 11:48:25 MST 2004",
  bibsource =    "http://www.computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/01/j1066abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/01/j1066.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Smith:2004:SSG,
  author =       "Sean W. Smith and Eugene H. Spafford",
  title =        "Secure Systems: Grand Challenges in Information
                 Security: Process and Output",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "1",
  pages =        "69--71",
  month =        jan # "\slash " # feb,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2004.1264859",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 3 11:48:25 MST 2004",
  bibsource =    "http://www.computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/01/j1069abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/01/j1069.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Stytz:2004:CDD,
  author =       "Martin R. Stytz",
  title =        "Considering Defense in Depth for Software
                 Applications",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "1",
  pages =        "72--75",
  month =        jan # "\slash " # feb,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2004.1264860",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 3 11:48:25 MST 2004",
  bibsource =    "http://www.computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/01/j1072abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/01/j1072.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Krawetz:2004:HFA,
  author =       "Neal Krawetz",
  title =        "The {Honeynet} Files: Anti-Honeypot Technology",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "1",
  pages =        "76--79",
  month =        jan # "\slash " # feb,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2004.1264861",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 3 11:48:25 MST 2004",
  bibsource =    "http://www.computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/01/j1076abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/01/j1076.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Caloyannides:2004:PMO,
  author =       "Michael A. Caloyannides",
  title =        "Privacy Matters: Online Monitoring: Security or Social
                 Control?",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "1",
  pages =        "81--83",
  month =        jan # "\slash " # feb,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2004.1264862",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 3 11:48:25 MST 2004",
  bibsource =    "http://www.computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/01/j1081abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/01/j1081.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Schneier:2004:CTV,
  author =       "Bruce Schneier",
  title =        "Clear Text: Voting Security and Technology",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "1",
  pages =        "84--84",
  month =        jan # "\slash " # feb,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2004.1264863",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 3 11:48:25 MST 2004",
  bibsource =    "http://www.computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/01/j1084abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/01/j1084.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Cybenko:2004:EDB,
  author =       "George Cybenko",
  title =        "From the Editors: Don't Bring a Knife to a Gunfight",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "2",
  pages =        "5--5",
  month =        mar # "\slash " # apr,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2004.1281233",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 8 08:08:03 MDT 2004",
  bibsource =    "http://www.computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/02/j2005.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Fischmann:2004:LEE,
  author =       "Matthias Fischmann and Matthias Bauer and Simson
                 Garfinkel",
  title =        "Letters to the Editor: {EBIA} vs. {PKI}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "2",
  pages =        "6--7",
  month =        mar # "\slash " # apr,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2004.1281234",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 8 08:08:03 MDT 2004",
  bibsource =    "http://www.computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/02/j2006.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Stytz:2004:BRH,
  author =       "Martin R. Stytz",
  title =        "Book Reviews: Hacking for Understanding: {{\em
                 Hacking: The Art of Exploitation}, by Jon Erickson}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "2",
  pages =        "8--8",
  month =        mar # "\slash " # apr,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2004.1281235",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 8 08:08:03 MDT 2004",
  bibsource =    "http://www.computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/02/j2008.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Goth:2004:NHU,
  author =       "Greg Goth and Benjamin J. Alfonsi and Scott L.
                 Andresen",
  title =        "News: How Useful Are Attack Trend Resources?",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "2",
  pages =        "9--11",
  month =        mar # "\slash " # apr,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2004.1281236",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 8 08:08:03 MDT 2004",
  bibsource =    "http://www.computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/02/j2009.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Jiwnani:2004:SMN,
  author =       "Kanta Jiwnani and Marvin Zelkowitz",
  title =        "Susceptibility Matrix: a New Aid to Software
                 Auditing",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "2",
  pages =        "16--21",
  month =        mar # "\slash " # apr,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2004.1281240",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 8 08:08:03 MDT 2004",
  bibsource =    "http://www.computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/02/j2016abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/02/j2016.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Byers:2004:ILC,
  author =       "Simon Byers",
  title =        "Information Leakage Caused by Hidden Data in Published
                 Documents",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "2",
  pages =        "23--27",
  month =        mar # "\slash " # apr,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2004.1281241",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 8 08:08:03 MDT 2004",
  bibsource =    "http://www.computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/02/j2023abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/02/j2023.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Gruteser:2004:PPC,
  author =       "Marco Gruteser and Xuan Liu",
  title =        "Protecting Privacy in Continuous Location-Tracking
                 Applications",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "2",
  pages =        "28--34",
  month =        mar # "\slash " # apr,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2004.1281242",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 8 08:08:03 MDT 2004",
  bibsource =    "http://www.computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/02/j2028abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/02/j2028.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Anton:2004:FPP,
  author =       "Annie I. Ant{\'o}n and Julia B. Earp and Qingfeng He
                 and William Stufflebeam and Davide Bolchini and
                 University of Lugano and Carlos Jensen",
  title =        "Financial Privacy Policies and the Need for
                 Standardization",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "2",
  pages =        "36--45",
  month =        mar # "\slash " # apr,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2004.1281243",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 8 08:08:03 MDT 2004",
  bibsource =    "http://www.computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/02/j2036abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/02/j2036.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Popli:2004:ACC,
  author =       "Ashish Popli",
  title =        "{ACM Computer and Communication Security Conference}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "2",
  pages =        "46--47",
  month =        mar # "\slash " # apr,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2004.1281244",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 8 08:08:03 MDT 2004",
  bibsource =    "http://www.computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/02/j2046abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/02/j2046.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Weis:2004:RPW,
  author =       "Stephen A. Weis",
  title =        "{RFID} Privacy Workshop: Concerns, Consensus, and
                 Questions",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "2",
  pages =        "48--50",
  month =        mar # "\slash " # apr,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2004.1281245",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 8 08:08:03 MDT 2004",
  bibsource =    "http://www.computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/02/j2048abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/02/j2048.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Donner:2004:HBS,
  author =       "Marc Donner",
  title =        "Hacking the Best-Seller List",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "2",
  pages =        "51--53",
  month =        mar # "\slash " # apr,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2004.1281246",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 8 08:08:03 MDT 2004",
  bibsource =    "http://www.computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/02/j2051abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/02/j2051.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Bishop:2004:TRP,
  author =       "Matt Bishop and Deb Frincke",
  title =        "Teaching Robust Programming",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "2",
  pages =        "54--57",
  month =        mar # "\slash " # apr,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2004.1281247",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 8 08:08:03 MDT 2004",
  bibsource =    "http://www.computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/02/j2054abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/02/j2054.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Payne:2004:RIS,
  author =       "Jeffery E. Payne",
  title =        "Regulation and Information Security: Can {Y2K} Lessons
                 Help Us?",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "2",
  pages =        "58--61",
  month =        mar # "\slash " # apr,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2004.1281248",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 8 08:08:03 MDT 2004",
  bibsource =    "http://www.computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/02/j2058abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/02/j2058.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Lesk:2004:SLC,
  author =       "Michael Lesk",
  title =        "Shedding Light on Creativity: The History of
                 Photography",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "2",
  pages =        "62--64",
  month =        mar # "\slash " # apr,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2004.1281249",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 8 08:08:03 MDT 2004",
  bibsource =    "http://www.computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/02/j2062abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/02/j2062.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Levy:2004:CBT,
  author =       "Elias Levy",
  title =        "Criminals Become Tech Savvy",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "2",
  pages =        "65--68",
  month =        mar # "\slash " # apr,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2004.1281250",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 8 08:08:03 MDT 2004",
  bibsource =    "http://www.computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/02/j2065abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/02/j2065.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Wayner:2004:PCC,
  author =       "Peter Wayner",
  title =        "The Power of Candy-Coated Bits",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "2",
  pages =        "69--72",
  month =        mar # "\slash " # apr,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2004.1281251",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 8 08:08:03 MDT 2004",
  bibsource =    "http://www.computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/02/j2069abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/02/j2069.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Trope:2004:WC,
  author =       "Roland L. Trope",
  title =        "A Warranty of Cyberworthiness",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "2",
  pages =        "73--76",
  month =        mar # "\slash " # apr,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2004.1281252",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 8 08:08:03 MDT 2004",
  bibsource =    "http://www.computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/02/j2073abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/02/j2073.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Chamales:2004:HCR,
  author =       "George Chamales",
  title =        "The {Honeywall CD-ROM}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "2",
  pages =        "77--79",
  month =        mar # "\slash " # apr,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2004.1281253",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 8 08:08:03 MDT 2004",
  bibsource =    "http://www.computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/02/j2077abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/02/j2077.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{McGraw:2004:SS,
  author =       "Gary McGraw",
  title =        "Software Security",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "2",
  pages =        "80--83",
  month =        mar # "\slash " # apr,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2004.1281254",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 8 08:08:03 MDT 2004",
  bibsource =    "http://www.computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/02/j2080abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/02/j2080.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Caloyannides:2004:CCF,
  author =       "Michael A. Caloyannides",
  title =        "The Cost of Convenience: a {Faustian} Deal",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "2",
  pages =        "84--87",
  month =        mar # "\slash " # apr,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2004.1281255",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 8 08:08:03 MDT 2004",
  bibsource =    "http://www.computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/02/j2084abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/02/j2084.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Donner:2004:EWD,
  author =       "Marc Donner",
  title =        "From the Editors: Whose Data Are These, Anyway?",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "3",
  pages =        "5--6",
  month =        may # "\slash " # jun,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.12",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:23 MDT 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/03/j3005.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Pfleeger:2004:BRG,
  author =       "Shari Lawrence Pfleeger",
  title =        "Book Reviews: a Gift of Impact: {{\em A Gift of Fire:
                 The Social, Legal, and Ethical Issues for Computers and
                 the Internet}, by Sara Baase (Prentice-Hall 2002, ISBN
                 0-13-008215-5)}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "3",
  pages =        "7--7",
  month =        may # "\slash " # jun,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.5",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:23 MDT 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/03/j3007.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Li:2004:LEI,
  author =       "Hong-Lok Li and Stan Bush",
  title =        "Letters to the Editor: Interface: Usability,
                 efficiency --- or privacy?; Does piracy increase
                 sales?",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "3",
  pages =        "8--9",
  month =        may # "\slash " # jun,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.15",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:23 MDT 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/03/j3008.htm;
                 j3008.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Goth:2004:NRC,
  author =       "Greg Goth and Scott L. Andresen",
  title =        "News: {Richard Clarke} Talks Cybersecurity and
                 {JELL-O}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "3",
  pages =        "11--15",
  month =        may # "\slash " # jun,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.18",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:23 MDT 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/03/j3011.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/03/j3011.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Davis:2004:PPS,
  author =       "Noopur Davis and Watts Humphrey and Samuel T.
                 {Redwine, Jr.} and Gerlinde Zibulski and Gary McGraw",
  title =        "Processes for Producing Secure Software: Summary of
                 {US National Cybersecurity Summit Subgroup Report}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "3",
  pages =        "18--25",
  month =        may # "\slash " # jun,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.21",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:23 MDT 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/03/j3018.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/03/j3018.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Arbaugh:2004:GEI,
  author =       "William A. Arbaugh",
  title =        "{Guest Editor}'s Introduction: Wired on Wireless",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "3",
  pages =        "26--27",
  month =        may # "\slash " # jun,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.14",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:23 MDT 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/03/j3026.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Hu:2004:SSW,
  author =       "Yih-Chun Hu and Adrian Perrig",
  title =        "A Survey of Secure Wireless Ad Hoc Routing",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "3",
  pages =        "28--39",
  month =        may # "\slash " # jun,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.1",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:23 MDT 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/03/j3028.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/03/j3028.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Johnston:2004:OIS,
  author =       "David Johnston and Jesse Walker",
  title =        "Overview of {IEEE 802.16} Security",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "3",
  pages =        "40--48",
  month =        may # "\slash " # jun,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.20",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:23 MDT 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/03/j3040.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/03/j3040.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Hubaux:2004:SPS,
  author =       "Jean-Pierre Hubaux and Srdjan Capkun and Jun Luo",
  title =        "The Security and Privacy of Smart Vehicles",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "3",
  pages =        "49--55",
  month =        may # "\slash " # jun,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.26",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:23 MDT 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/03/j3049.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/03/j3049.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Branch:2004:AWL,
  author =       "Joel W. Branch and Nick L. {Petroni, Jr.} and Leendert
                 {Van Doorn} and David Safford",
  title =        "Autonomic 802.11 Wireless {LAN} Security Auditing",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "3",
  pages =        "56--65",
  month =        may # "\slash " # jun,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.4",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:23 MDT 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/03/j3056.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/03/j3056.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Donner:2004:CC,
  author =       "Marc Donner",
  title =        "Cult Classics",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "3",
  pages =        "66--68",
  month =        may # "\slash " # jun,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.11",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:23 MDT 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/03/j3066.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/03/j3066.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Frincke:2004:GCK,
  author =       "Deborah A. Frincke and Matt Bishop",
  title =        "Guarding the Castle Keep: Teaching with the Fortress
                 Metaphor",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "3",
  pages =        "69--72",
  month =        may # "\slash " # jun,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.13",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:23 MDT 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/03/j3069.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/03/j3069.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Stolfo:2004:WAE,
  author =       "Salvatore J. Stolfo",
  title =        "Worm and Attack Early Warning",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "3",
  pages =        "73--75",
  month =        may # "\slash " # jun,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.28",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:23 MDT 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/03/j3073.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/03/j3073.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Lesk:2004:DRC,
  author =       "Michael Lesk",
  title =        "Digital Rights: Copyright and Creativity",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "3",
  pages =        "76--78",
  month =        may # "\slash " # jun,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.6",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:23 MDT 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/03/j3076.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/03/j3076.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Arce:2004:KC,
  author =       "Iva{\'a}n Arce",
  title =        "The Kernel Craze",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "3",
  pages =        "79--81",
  month =        may # "\slash " # jun,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.25",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:23 MDT 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/03/j3079.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/03/j3079.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Vilardo:2004:OIS,
  author =       "Mark F. Vilardo",
  title =        "Online Impersonation in Securities Scams",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "3",
  pages =        "82--85",
  month =        may # "\slash " # jun,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.19",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:23 MDT 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/03/j3082.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/03/j3082.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Ford:2004:WS,
  author =       "Richard Ford",
  title =        "The Wrong Stuff?",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "3",
  pages =        "86--89",
  month =        may # "\slash " # jun,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.27",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:23 MDT 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/03/j3086.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/03/j3086.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Hope:2004:MAC,
  author =       "Paco Hope and Gary McGraw and Annie I. Ant{\'o}n",
  title =        "Misuse and Abuse Cases: Getting Past the Positive",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "3",
  pages =        "90--92",
  month =        may # "\slash " # jun,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.17",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:23 MDT 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/03/j3090.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/03/j3090.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Caloyannides:2004:SC,
  author =       "Michael A. Caloyannides",
  title =        "Security or Cosmetology?",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "3",
  pages =        "93--95",
  month =        may # "\slash " # jun,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.23",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:23 MDT 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/03/j3093.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/03/j3093.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Schneier:2004:SC,
  author =       "Bruce Schneier",
  title =        "Security and Compliance",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "3",
  pages =        "96--96",
  month =        may # "\slash " # jun,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.22",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:23 MDT 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/03/j3096.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/03/j3096.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Donner:2004:EWL,
  author =       "Marc Donner",
  title =        "From the Editors: a Witty Lesson",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "4",
  pages =        "5--5",
  month =        jul # "\slash " # aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.44",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:24 MDT 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/04/j4005.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Spencer:2004:LEI,
  author =       "Brad Spencer and Michael A. Caloyannides",
  title =        "Letters to the Editor: Interface: Machine Gun or
                 Blunderbuss?; Usability or privacy redux; Erratum",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "4",
  pages =        "7--8",
  month =        jul # "\slash " # aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.51",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:24 MDT 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/04/j4007.htm;
                 j4007.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Forbes:2004:BRN,
  author =       "Scott Forbes",
  title =        "Book Reviews: {{\em A .NET Gold Mine: .NET Security
                 and Cryptography}, by Peter Thorsteinson and G. Gnana
                 Arun Ganesh (Prentice-Hall 2004, ISBN 0-13-100851-X)}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "4",
  pages =        "10--10",
  month =        jul # "\slash " # aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.38",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:24 MDT 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/04/j4010.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Stone:2004:NDB,
  author =       "Adam Stone and Benjamin Alfonsi and Scott L.
                 Andresen",
  title =        "News: The Delicate Balance: Security and Privacy;
                 Corporate Security Under Siege; NewsBriefs",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "4",
  pages =        "12--13",
  month =        jul # "\slash " # aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.53",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:24 MDT 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/04/j4012.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Arce:2004:GEI,
  author =       "Iv{\'a}an Arce and Gary McGraw",
  title =        "{Guest Editors}' Introduction: Why Attacking Systems
                 Is a Good Idea",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "4",
  pages =        "17--19",
  month =        jul # "\slash " # aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.46",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:24 MDT 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/04/j4017.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Pincus:2004:BSS,
  author =       "Jonathan Pincus and Brandon Baker",
  title =        "Beyond Stack Smashing: Recent Advances in Exploiting
                 Buffer Overruns",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "4",
  pages =        "20--27",
  month =        jul # "\slash " # aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.36",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:24 MDT 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/04/j4020.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/04/j4020.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Meinel:2004:CTC,
  author =       "Carolyn P. Meinel",
  title =        "{Cybercrime Treaty} Could Chill Research",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "4",
  pages =        "28--32",
  month =        jul # "\slash " # aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.40",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:24 MDT 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/04/j4028.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/04/j4028.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{White:2004:AUF,
  author =       "Greg White and Art Conklin",
  title =        "The Appropriate Use of Force-on-Force Cyberexercises",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "4",
  pages =        "33--37",
  month =        jul # "\slash " # aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.58",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:24 MDT 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/04/j4033.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/04/j4033.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Ring:2004:TLS,
  author =       "Sandra Ring and Eric Cole",
  title =        "Taking a Lesson from Stealthy Rootkits",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "4",
  pages =        "38--45",
  month =        jul # "\slash " # aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.57",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:24 MDT 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/04/j4038.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/04/j4038.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Shannon:2004:SWW,
  author =       "Colleen Shannon and David Moore",
  title =        "The Spread of the Witty Worm",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "4",
  pages =        "46--50",
  month =        jul # "\slash " # aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.59",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:24 MDT 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/04/j4046.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/04/j4046.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Donner:2004:DEM,
  author =       "Marc Donner",
  title =        "Deus Est Machina",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "4",
  pages =        "51--53",
  month =        jul # "\slash " # aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2004.1281246",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:24 MDT 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/04/j4051.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/04/j4051.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Frincke:2004:BS,
  author =       "Deborah Frincke and Matt Bishop",
  title =        "Back to School",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "4",
  pages =        "54--56",
  month =        jul # "\slash " # aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.35",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:24 MDT 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/04/j4054.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/04/j4054.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Elliott:2004:QC,
  author =       "Chip Elliott",
  title =        "Quantum Cryptography",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "4",
  pages =        "57--61",
  month =        jul # "\slash " # aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.54",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:24 MDT 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/04/j4057.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/04/j4057.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Lesk:2004:BSS,
  author =       "Michael Lesk",
  title =        "Bigger Share of a Smaller Pie",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "4",
  pages =        "62--64",
  month =        jul # "\slash " # aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2004.1281249",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:24 MDT 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/04/j4062.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/04/j4062.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Levy:2004:AZ,
  author =       "Elias Levy",
  title =        "Approaching Zero",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "4",
  pages =        "65--66",
  month =        jul # "\slash " # aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2004.1281250",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:24 MDT 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/04/j4065.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/04/j4065.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Guida:2004:DUP,
  author =       "Richard Guida and Robert Stahl and Thomas Bunt and
                 Gary Secrest and Joseph Moorcones",
  title =        "Deploying and Using Public Key Technology: Lessons
                 Learned in Real Life",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "4",
  pages =        "67--71",
  month =        jul # "\slash " # aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.41",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:24 MDT 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/04/j4067.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/04/j4067.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Raynal:2004:HFPa,
  author =       "Frederic Raynal and Yann Berthier and Philippe Biondi
                 and Danielle Kaminsky",
  title =        "Honeypot Forensics Part {I}: Analyzing the Network",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "4",
  pages =        "72--78",
  month =        jul # "\slash " # aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.47",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:24 MDT 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/04/j4072.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/04/j4072.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Verdon:2004:RAS,
  author =       "Denis Verdon and Gary McGraw",
  title =        "Risk Analysis in Software Design",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "4",
  pages =        "79--84",
  month =        jul # "\slash " # aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.55",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:24 MDT 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/04/j4079.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/04/j4079.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Caloyannides:2004:PRC,
  author =       "Michael A. Caloyannides",
  title =        "Is Privacy Really Constraining Security or Is this a
                 Red Herring?",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "4",
  pages =        "86--87",
  month =        jul # "\slash " # aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.50",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:24 MDT 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/04/j4086.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/04/j4086.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Schneier:2004:CPW,
  author =       "Bruce Schneier",
  title =        "Customers, Passwords, and {Web} Sites",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "4",
  pages =        "88--88",
  month =        jul # "\slash " # aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.39",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:24 MDT 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/04/j4088.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/04/j4088.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Schneider:2004:TSI,
  author =       "Fred Schneider",
  title =        "Time Out for Station Identification",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "5",
  pages =        "5--5",
  month =        sep # "\slash " # oct,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.88",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/05/j5005.pdf;
                 http://csdl.computer.org/dl/mags/sp/2004/05/j5005.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Anonymous:2004:LE,
  author =       "Anonymous",
  title =        "Letters to the {Editor}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "5",
  pages =        "6--7",
  month =        sep # "\slash " # oct,
  year =         "2004",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/05/j5006.pdf;
                 http://csdl.computer.org/dl/mags/sp/2004/05/j5006.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Goth:2004:Na,
  author =       "Greg Goth",
  title =        "News",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "5",
  pages =        "8--11",
  month =        sep # "\slash " # oct,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.79",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/05/j5008.pdf;
                 http://csdl.computer.org/dl/mags/sp/2004/05/j5008.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Anonymous:2004:PCP,
  author =       "Anonymous",
  title =        "Protecting Consumers' Private Health Information",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "5",
  pages =        "12--12",
  month =        sep # "\slash " # oct,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.82",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/05/j5012.pdf;
                 http://csdl.computer.org/dl/mags/sp/2004/05/j5012.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Cranor:2004:GEI,
  author =       "Lorrie Faith Cranor and Simson Garfinkel",
  title =        "{Guest Editors}' Introduction: Secure or Usable?",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "5",
  pages =        "16--18",
  month =        sep # "\slash " # oct,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.69",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/05/j5016.pdf;
                 http://csdl.computer.org/dl/mags/sp/2004/05/j5016.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Balfanz:2004:SUS,
  author =       "Dirk Balfanz and Glenn Durfee and Rebecca E. Grinter
                 and D. K. Smetters",
  title =        "In Search of Usable Security: Five Lessons from the
                 Field",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "5",
  pages =        "19--24",
  month =        sep # "\slash " # oct,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.71",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/05/j5019.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/05/j5019.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Yan:2004:PMS,
  author =       "Jeff Yan and Alan Blackwell and Ross Anderson and
                 Alasdair Grant",
  title =        "Password Memorability and Security: Empirical
                 Results",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "5",
  pages =        "25--31",
  month =        sep # "\slash " # oct,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.81",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/05/j5025.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/05/j5025.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Just:2004:DEC,
  author =       "Mike Just",
  title =        "Designing and Evaluating Challenge-Question Systems",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "5",
  pages =        "32--39",
  month =        sep # "\slash " # oct,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.80",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/05/j5032.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/05/j5032.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Peacock:2004:TPK,
  author =       "Alen Peacock and Xian Ke and Matthew Wilkerson",
  title =        "Typing Patterns: a Key to User Identification",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "5",
  pages =        "40--47",
  month =        sep # "\slash " # oct,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.89",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/extras/j5040x1.pdf;
                 http://csdl.computer.org/comp/mags/sp/2004/extras/j5040x2.pdf;
                 http://csdl.computer.org/dl/mags/sp/2004/05/j5040.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/05/j5040.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Yee:2004:ASU,
  author =       "Ka-Ping Yee",
  title =        "Aligning Security and Usability",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "5",
  pages =        "48--55",
  month =        sep # "\slash " # oct,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.64",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/05/j5048.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/05/j5048.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Donner:2004:JG,
  author =       "Marc Donner",
  title =        "{Jennifer Government}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "5",
  pages =        "57--59",
  month =        sep # "\slash " # oct,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.74",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/05/j5057.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/05/j5057.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Frincke:2004:JSE,
  author =       "Deborah Frincke and Matt Bishop",
  title =        "Joining the Security Education Community",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "5",
  pages =        "61--63",
  month =        sep # "\slash " # oct,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.75",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/05/j5061.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/05/j5061.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Saydjari:2004:MSR,
  author =       "O. Sami Saydjari",
  title =        "Multilevel Security: Reprise",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "5",
  pages =        "64--67",
  month =        sep # "\slash " # oct,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.78",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/05/j5064.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/05/j5064.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Andrews:2004:CS,
  author =       "Mike Andrews and James A. Whittaker",
  title =        "Computer Security",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "5",
  pages =        "68--71",
  month =        sep # "\slash " # oct,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.66",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/05/j5068.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/05/j5068.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Arce:2004:SG,
  author =       "Iv{\'a}n Arce",
  title =        "The Shellcode Generation",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "5",
  pages =        "72--76",
  month =        sep # "\slash " # oct,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.87",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/05/j5072.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/05/j5072.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Raynal:2004:HFPb,
  author =       "Frederic Raynal and Yann Berthier and Philippe Biondi
                 and Danielle Kaminsky",
  title =        "Honeypot Forensics, Part {II}: Analyzing the
                 Compromised Host",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "5",
  pages =        "77--80",
  month =        sep # "\slash " # oct,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.70",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/05/j5077.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/05/j5077.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{McGraw:2004:SST,
  author =       "Gary McGraw and Bruce Potter",
  title =        "Software Security Testing",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "5",
  pages =        "81--85",
  month =        sep # "\slash " # oct,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.84",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/05/j5081.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/05/j5081.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Caloyannides:2004:SPT,
  author =       "Michael A. Caloyannides",
  title =        "Speech Privacy Technophobes Need Not Apply",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "5",
  pages =        "86--87",
  month =        sep # "\slash " # oct,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.85",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/05/j5086.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/05/j5086.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Schneier:2004:SSP,
  author =       "Bruce Schneier",
  title =        "{SIMS}: Solution, or Part of the Problem?",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "5",
  pages =        "88--88",
  month =        sep # "\slash " # oct,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.83",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/05/j5088.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/05/j5088.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Cybenko:2004:SA,
  author =       "George Cybenko",
  title =        "Security Alchemy",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "6",
  pages =        "5--5",
  month =        nov # "\slash " # dec,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.110",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/06/j6005.pdf;
                 http://csdl.computer.org/dl/mags/sp/2004/06/j6005.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Forbes:2004:PLR,
  author =       "Scott Forbes",
  title =        "Privacy Law Resource for Students and Professionals",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "6",
  pages =        "7--7",
  month =        nov # "\slash " # dec,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.107",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/06/j6007.pdf;
                 http://csdl.computer.org/dl/mags/sp/2004/06/j6007.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Goth:2004:Nb,
  author =       "Greg Goth and Benjamin Alfonsi",
  title =        "News",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "6",
  pages =        "8--9",
  month =        nov # "\slash " # dec,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.106",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/06/j6008.pdf;
                 http://csdl.computer.org/dl/mags/sp/2004/06/j6008.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Anton:2004:IJP,
  author =       "Annie I. Ant{\'o}n and Qingfeng He and David L.
                 Baumer",
  title =        "Inside {JetBlue}'s Privacy Policy Violations",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "6",
  pages =        "12--18",
  month =        nov # "\slash " # dec,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.103",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/06/j6012.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/06/j6012.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Vaidya:2004:PPD,
  author =       "Jaideep Vaidya and Chris Clifton",
  title =        "Privacy-Preserving Data Mining: Why, How, and When",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "6",
  pages =        "19--27",
  month =        nov # "\slash " # dec,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.108",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/06/j6019.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/06/j6019.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Shankar:2004:COS,
  author =       "K. S. Shankar and Helmut Kurth",
  title =        "Certifying Open Source---The {Linux} Experience",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "6",
  pages =        "28--33",
  month =        nov # "\slash " # dec,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.96",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/06/j6028.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/06/j6028.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Bakken:2004:DOA,
  author =       "David E. Bakken and Rupa Parameswaran and Douglas M.
                 Blough and Andy A. Franz and Ty J. Palmer",
  title =        "Data Obfuscation: Anonymity and Desensitization of
                 Usable Data Sets",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "6",
  pages =        "34--41",
  month =        nov # "\slash " # dec,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.97",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/06/j6034.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/06/j6034.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Aslam:2004:KTI,
  author =       "Javed Aslam and Sergey Bratus and David Kotz and Ron
                 Peterson and Brett Tofel and Daniela Rus",
  title =        "The {Kerf Toolkit} for Intrusion Analysis",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "6",
  pages =        "42--52",
  month =        nov # "\slash " # dec,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.113",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/06/j6042.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/06/j6042.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Donner:2004:UFL,
  author =       "Marc Donner",
  title =        "Use the Force, {Luke}!",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "6",
  pages =        "53--55",
  month =        nov # "\slash " # dec,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSECP.2004.1264854",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/06/j6053.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/06/j6053.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Frincke:2004:ADP,
  author =       "Deborah Frincke and Matt Bishop",
  title =        "Academic Degrees and Professional Certification",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "6",
  pages =        "56--58",
  month =        nov # "\slash " # dec,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.91",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/06/j6056.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/06/j6056.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Evans:2004:RBS,
  author =       "Shelby Evans and David Heinbuch and Elizabeth Kyule
                 and John Piorkowski and James Wallner",
  title =        "Risk-based Systems Security Engineering: Stopping
                 Attacks with Intention",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "6",
  pages =        "59--62",
  month =        nov # "\slash " # dec,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.109",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/06/j6059.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/06/j6059.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Howard:2004:BMS,
  author =       "Michael Howard",
  title =        "Building More Secure Software with Improved
                 Development Processes",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "6",
  pages =        "63--65",
  month =        nov # "\slash " # dec,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.95",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/06/j6063.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/06/j6063.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Levy:2004:II,
  author =       "Elias Levy",
  title =        "Interface Illusions",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "6",
  pages =        "66--69",
  month =        nov # "\slash " # dec,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.104",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/06/j6066.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/06/j6066.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Somayaji:2004:HWE,
  author =       "Anil Somayaji",
  title =        "How to Win and Evolutionary Arms Race",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "6",
  pages =        "70--72",
  month =        nov # "\slash " # dec,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.100",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/06/j6070.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/06/j6070.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Levine:2004:UHP,
  author =       "John G. Levine and Julian B. Grizzard and Henry L.
                 Owen",
  title =        "Using Honeynets to Protect Large Enterprise Networks",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "6",
  pages =        "73--75",
  month =        nov # "\slash " # dec,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.115",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/06/j6073.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/06/j6073.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Chess:2004:SAS,
  author =       "Brian Chess and Gary McGraw",
  title =        "Static Analysis for Security",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "6",
  pages =        "76--79",
  month =        nov # "\slash " # dec,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.111",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/06/j6076.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/06/j6076.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Anonymous:2004:AI,
  author =       "Anonymous",
  title =        "2004 Annual Index",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "6",
  pages =        "80--85",
  month =        nov # "\slash " # dec,
  year =         "2004",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/06/j6080.pdf;
                 http://csdl.computer.org/dl/mags/sp/2004/06/j6080.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Caloyannides:2004:ESC,
  author =       "Michael Caloyannides",
  title =        "Enhancing Security: Not for the Conformist",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "2",
  number =       "6",
  pages =        "88, 86--87",
  month =        nov # "\slash " # dec,
  year =         "2004",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2004.98",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "http://computer.org/security/sp2004/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/06/j6088.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/06/j6088.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Landwehr:2005:CPP,
  author =       "C. Landwehr",
  title =        "Changing the Puzzle Pieces",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "1",
  pages =        "3--4",
  month =        jan # "\slash " # feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.9",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30310/01392686.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30310&arnumber=1392686&count=17&index=0",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Sytz:2005:SAI,
  author =       "M. R. Sytz",
  title =        "Studying Attacks to Improve Software Defense",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "1",
  pages =        "11--11",
  month =        jan # "\slash " # feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.25",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30310/01392692.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30310&arnumber=1392692&count=17&index=1",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Anderson:2005:GEI,
  author =       "R. Anderson and B. Schneier",
  title =        "{Guest Editors}' Introduction: Economics of
                 Information Security",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "1",
  pages =        "12--13",
  month =        jan # "\slash " # feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.14",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30310/01392693.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30310&arnumber=1392693&count=17&index=2",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Rescorla:2005:FSH,
  author =       "E. Rescorla",
  title =        "Is finding security holes a good idea?",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "1",
  pages =        "14--19",
  month =        jan # "\slash " # feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.17",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30310/01392694.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30310&arnumber=1392694&count=17&index=3",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Arora:2005:ESV,
  author =       "A. Arora and R. Telang",
  title =        "Economics of software vulnerability disclosure",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "1",
  pages =        "20--25",
  month =        jan # "\slash " # feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.12",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30310/01392695.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30310&arnumber=1392695&count=17&index=4",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Acquisti:2005:PRI,
  author =       "A. Acquisti and J. Grossklags",
  title =        "Privacy and rationality in individual decision
                 making",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "1",
  pages =        "26--33",
  month =        jan # "\slash " # feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.22",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30310/01392696.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30310&arnumber=1392696&count=17&index=5",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Varian:2005:DDC,
  author =       "H. Varian and F. Wallenberg and G. Woroch",
  title =        "The demographics of the do-not-call list [security of
                 data]",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "1",
  pages =        "34--39",
  month =        jan # "\slash " # feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.28",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30310/01392697.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30310&arnumber=1392697&count=17&index=6",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Schechter:2005:TEM,
  author =       "S. E. Schechter",
  title =        "Toward econometric models of the security risk from
                 remote attacks",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "1",
  pages =        "40--44",
  month =        jan # "\slash " # feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.30",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30310/01392698.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30310&arnumber=1392698&count=17&index=7",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Danezis:2005:ERC,
  author =       "G. Danezis and R. Anderson",
  title =        "The economics of resisting censorship",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "1",
  pages =        "45--50",
  month =        jan # "\slash " # feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.29",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30310/01392699.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30310&arnumber=1392699&count=17&index=8",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Linn:2005:TWU,
  author =       "J. Linn",
  title =        "Technology and {Web} user data privacy --- a survey of
                 risks and countermeasures",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "1",
  pages =        "52--58",
  month =        jan # "\slash " # feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.27",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30310/01392701.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30310&arnumber=1392701&count=17&index=9",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Yasinsac:2005:CAE,
  author =       "A. Yasinsac and M. Burmester",
  title =        "Centers of academic excellence: a case study",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "1",
  pages =        "62--65",
  month =        jan # "\slash " # feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.8",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30310/01392703.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30310&arnumber=1392703&count=17&index=10",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Thompson:2005:APT,
  author =       "H. H. Thompson",
  title =        "Application penetration testing",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "1",
  pages =        "66--69",
  month =        jan # "\slash " # feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.3",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30310/01392704.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30310&arnumber=1392704&count=17&index=11",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Arce:2005:BP,
  author =       "I. Arce",
  title =        "Bad peripherals",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "1",
  pages =        "70--73",
  month =        jan # "\slash " # feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.6",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30310/01392705.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30310&arnumber=1392705&count=17&index=12",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Adams:2005:BSW,
  author =       "C. Adams",
  title =        "Building secure {Web}-based environments:
                 understanding research interrelationships through a
                 construction metaphor",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "1",
  pages =        "74--77",
  month =        jan # "\slash " # feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.7",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30310/01392706.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30310&arnumber=1392706&count=17&index=13",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Trope:2005:DDF,
  author =       "R. L. Trope",
  title =        "Directors' digital fiduciary duties",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "1",
  pages =        "78--82",
  month =        jan # "\slash " # feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.11",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30310/01392707.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30310&arnumber=1392707&count=17&index=14",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Arkin:2005:SPT,
  author =       "B. Arkin and S. Stender and G. McGraw",
  title =        "Software penetration testing",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "1",
  pages =        "84--87",
  month =        jan # "\slash " # feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.23",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30310/01392709.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30310&arnumber=1392709&count=17&index=15",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Schneier:2005:AE,
  author =       "B. Schneier",
  title =        "Authentication and Expiration",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "1",
  pages =        "88--88",
  month =        jan # "\slash " # feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.4",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30310/01392710.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30310&arnumber=1392710&count=17&index=16",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Donner:2005:WN,
  author =       "M. Donner",
  title =        "What's in a Name?",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "2",
  pages =        "4--5",
  month =        mar # "\slash " # apr,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.56",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30742/01423949.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30742&arnumber=1423949&count=15&index=0",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Weiss:2005:C,
  author =       "S. A. Weiss",
  title =        "{Crypto 2004}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "2",
  pages =        "11--13",
  month =        mar # "\slash " # apr,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.39",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30742/01423953.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30742&arnumber=1423953&count=15&index=1",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Iverson:2005:FC,
  author =       "R. Iverson",
  title =        "A Framework to Consider",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "2",
  pages =        "14--14",
  month =        mar # "\slash " # apr,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.31",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30742/01423954.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30742&arnumber=1423954&count=15&index=2",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Oppliger:2005:DTC,
  author =       "R. Oppliger and R. Rytz",
  title =        "Does trusted computing remedy computer security
                 problems?",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "2",
  pages =        "16--19",
  month =        mar # "\slash " # apr,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.40",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30742/01423956.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30742&arnumber=1423956&count=15&index=3",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Iliev:2005:PCP,
  author =       "A. Iliev and S. W. Smith",
  title =        "Protecting client privacy with trusted computing at
                 the server",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "2",
  pages =        "20--28",
  month =        mar # "\slash " # apr,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.49",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30742/01423957.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30742&arnumber=1423957&count=15&index=4",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Jutla:2005:SAO,
  author =       "D. N. Jutla and P. Bodorik",
  title =        "Sociotechnical architecture for online privacy",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "2",
  pages =        "29--39",
  month =        mar # "\slash " # apr,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.50",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30742/01423958.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30742&arnumber=1423958&count=15&index=5",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Pfleeger:2005:CSP,
  author =       "S. L. Pfleeger and G. Bloom",
  title =        "Canning {SPAM}: Proposed solutions to unwanted email",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "2",
  pages =        "40--47",
  month =        mar # "\slash " # apr,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.38",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30742/01423959.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30742&arnumber=1423959&count=15&index=6",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Dodge:2005:TEU,
  author =       "R. Dodge and D. Ragsdale",
  title =        "Technology education at the {US Military Academy}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "2",
  pages =        "49--53",
  month =        mar # "\slash " # apr,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.52",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30742/01423961.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30742&arnumber=1423961&count=15&index=7",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Maxion:2005:MFE,
  author =       "R. A. Maxion and R. R. M. Roberts",
  title =        "Methodological foundations: enabling the next
                 generation of security",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "2",
  pages =        "54--57",
  month =        mar # "\slash " # apr,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.47",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30742/01423962.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30742&arnumber=1423962&count=15&index=8",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Oehlert:2005:VAF,
  author =       "P. Oehlert",
  title =        "Violating assumptions with fuzzing",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "2",
  pages =        "58--62",
  month =        mar # "\slash " # apr,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.55",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30742/01423963.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30742&arnumber=1423963&count=15&index=9",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Levy:2005:WPG,
  author =       "E. Levy",
  title =        "Worm propagation and generic attacks",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "2",
  pages =        "63--65",
  month =        mar # "\slash " # apr,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.57",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30742/01423964.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30742&arnumber=1423964&count=15&index=10",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Smith:2005:TMS,
  author =       "S. W. Smith",
  title =        "{Turing} is from {Mars}, {Shannon} is from {Venus}:
                 computer science and computer engineering",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "2",
  pages =        "66--69",
  month =        mar # "\slash " # apr,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.54",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30742/01423965.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30742&arnumber=1423965&count=15&index=11",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Power:2005:ASM,
  author =       "E. M. Power and R. L. Trope",
  title =        "Averting security missteps in outsourcing",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "2",
  pages =        "70--73",
  month =        mar # "\slash " # apr,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.36",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30742/01423966.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30742&arnumber=1423966&count=15&index=12",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Barnum:2005:KSS,
  author =       "S. Barnum and G. McGraw",
  title =        "Knowledge for software security",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "2",
  pages =        "74--78",
  month =        mar # "\slash " # apr,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.45",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30742/01423967.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30742&arnumber=1423967&count=15&index=13",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Geer:2005:PSP,
  author =       "D. {Geer, Jr.}",
  title =        "The Problem Statement is the Problem",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "2",
  pages =        "80--80",
  month =        mar # "\slash " # apr,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.53",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30742/01423969.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30742&arnumber=1423969&count=15&index=14",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Schneider:2005:IDW,
  author =       "F. B. Schneider",
  title =        "It Depends on What You Pay",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "3",
  pages =        "3--3",
  month =        may # "\slash " # jun,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.72",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/31002/01439491.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439491&count=20&index=0",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Stytz:2005:UB,
  author =       "M. R. Stytz",
  title =        "Under the {Black Hat}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "3",
  pages =        "5--5",
  month =        may # "\slash " # jun,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.83",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/31002/01439493.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439493&count=20&index=1",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{McLaughlin:2005:IHS,
  author =       "L. McLaughlin",
  title =        "Interview: Holistic Security",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "3",
  pages =        "6--8",
  month =        may # "\slash " # jun,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.71",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/31002/01439494.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439494&count=20&index=2",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Landau:2005:OCS,
  author =       "S. Landau and M. R. Stytz",
  title =        "Overview of cyber security: a crisis of
                 prioritization",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "3",
  pages =        "9--11",
  month =        may # "\slash " # jun,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.76",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/31002/01439495.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439495&count=20&index=3",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Amin:2005:GEI,
  author =       "M. Amin",
  title =        "{Guest Editor}'s Introduction: Infrastructure
                 Security--Reliability and Dependability of Critical
                 Systems",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "3",
  pages =        "15--17",
  month =        may # "\slash " # jun,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.68",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/31002/01439497.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439497&count=20&index=4",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Sahinoglu:2005:SMP,
  author =       "M. Sahinoglu",
  title =        "Security meter: a practical decision-tree model to
                 quantify risk",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "3",
  pages =        "18--24",
  month =        may # "\slash " # jun,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.81",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/31002/01439498.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439498&count=20&index=5",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Cai:2005:CIW,
  author =       "Min Cai and Kai Hwang and Yu-Kwong Kwok and Shanshan
                 Song and Yu Chen",
  title =        "Collaborative {Internet} worm containment",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "3",
  pages =        "25--33",
  month =        may # "\slash " # jun,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.63",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/31002/01439499.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439499&count=20&index=6",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Garfinkel:2005:RPO,
  author =       "S. L. Garfinkel and A. Juels and R. Pappu",
  title =        "{RFID} privacy: an overview of problems and proposed
                 solutions",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "3",
  pages =        "34--43",
  month =        may # "\slash " # jun,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.78",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/31002/01439500.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439500&count=20&index=7",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Walsh:2005:CSV,
  author =       "T. J. Walsh and D. R. Kuhn",
  title =        "Challenges in securing voice over {IP}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "3",
  pages =        "44--49",
  month =        may # "\slash " # jun,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.62",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/31002/01439501.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439501&count=20&index=8",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Senior:2005:EVP,
  author =       "A. Senior and S. Pankanti and A. Hampapur and L. Brown
                 and Ying-Li Tian and A. Ekin and J. Connell and Chiao
                 Fe Shu and M. Lu",
  title =        "Enabling video privacy through computer vision",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "3",
  pages =        "50--57",
  month =        may # "\slash " # jun,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.65",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/31002/01439502.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439502&count=20&index=9",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Donner:2005:YGF,
  author =       "M. Donner",
  title =        "A young geek's fancy turns to\ldots{} science fiction?
                 [Book recommendations]",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "3",
  pages =        "58--60",
  month =        may # "\slash " # jun,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.59",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/31002/01439503.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439503&count=20&index=10",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Irvine:2005:CGI,
  author =       "C. E. Irvine and M. F. Thompson and K. Allen",
  title =        "{CyberCIEGE}: gaming for information assurance",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "3",
  pages =        "61--64",
  month =        may # "\slash " # jun,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.64",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/31002/01439504.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439504&count=20&index=11",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Snow:2005:FWI,
  author =       "B. Snow",
  title =        "Four ways to improve security",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "3",
  pages =        "65--67",
  month =        may # "\slash " # jun,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.66",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/31002/01439505.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439505&count=20&index=12",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Gutmann:2005:WHC,
  author =       "P. Gutmann and D. Naccache and C. C. Palmer",
  title =        "When hashes collide [applied cryptography]",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "3",
  pages =        "68--71",
  month =        may # "\slash " # jun,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.84",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/31002/01439506.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439506&count=20&index=13",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Ford:2005:MMR,
  author =       "R. Ford",
  title =        "Malcode mysteries revealed [computer viruses and
                 worms]",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "3",
  pages =        "72--75",
  month =        may # "\slash " # jun,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.73",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/31002/01439507.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439507&count=20&index=14",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Holz:2005:SVB,
  author =       "T. Holz",
  title =        "A short visit to the bot zoo [malicious bots
                 software]",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "3",
  pages =        "76--79",
  month =        may # "\slash " # jun,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.58",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/31002/01439508.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439508&count=20&index=15",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Salka:2005:PLS,
  author =       "C. Salka",
  title =        "Programming languages and systems security",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "3",
  pages =        "80--83",
  month =        may # "\slash " # jun,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.77",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/31002/01439509.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439509&count=20&index=16",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Lesk:2005:SBF,
  author =       "M. Lesk",
  title =        "Salute the broadcast flag [digital protection for {TV}
                 recording]",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "3",
  pages =        "84--87",
  month =        may # "\slash " # jun,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.79",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/31002/01439510.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439510&count=20&index=17",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Taylor:2005:ASS,
  author =       "D. Taylor and G. McGraw",
  title =        "Adopting a software security improvement program",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "3",
  pages =        "88--91",
  month =        may # "\slash " # jun,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.60",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/31002/01439511.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439511&count=20&index=18",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Bellovin:2005:SPE,
  author =       "S. Bellovin",
  title =        "Security and Privacy: Enemies or Allies?",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "3",
  pages =        "92--92",
  month =        may # "\slash " # jun,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.80",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/31002/01439512.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439512&count=20&index=19",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Cybenko:2005:OEM,
  author =       "George Cybenko",
  title =        "The One-Eyed Man Is King",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "4",
  pages =        "4--5",
  month =        jul # "\slash " # aug,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.108",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:38:09 MST 2005",
  bibsource =    "http://computer.org/security/sp2005/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2005/04/j4004.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Paul:2005:CLV,
  author =       "Nathanael Paul",
  title =        "A Closer Look at Viruses and Worms",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "4",
  pages =        "7",
  month =        jul # "\slash " # aug,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.86",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:38:09 MST 2005",
  bibsource =    "http://computer.org/security/sp2005/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2005/04/j4007.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Alfonsi:2005:AAV,
  author =       "Benjamin Alfonsi",
  title =        "Alliance Addresses {VoIP} Security",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "4",
  pages =        "8",
  month =        jul # "\slash " # aug,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.92",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:38:09 MST 2005",
  bibsource =    "http://computer.org/security/sp2005/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2005/04/j4008.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Apvrille:2005:SSD,
  author =       "Axelle Apvrille and Makan Pourzandi",
  title =        "Secure Software Development by Example",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "4",
  pages =        "10--17",
  month =        jul # "\slash " # aug,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.103",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:38:09 MST 2005",
  bibsource =    "http://computer.org/security/sp2005/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Ray:2005:TAA,
  author =       "Helayne T. Ray and Raghunath Vemuri and Hariprasad R.
                 Kantubhukta",
  title =        "Toward an Automated Attack Model for {Red} Teams",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "4",
  pages =        "18--25",
  month =        jul # "\slash " # aug,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.111",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:38:09 MST 2005",
  bibsource =    "http://computer.org/security/sp2005/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Bailey:2005:BWT,
  author =       "Michael Bailey and Evan Cooke and Farnam Jahanian and
                 David Watson and Jose Nazario",
  title =        "The {Blaster Worm}: Then and Now",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "4",
  pages =        "26--31",
  month =        jul # "\slash " # aug,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.106",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:38:09 MST 2005",
  bibsource =    "http://computer.org/security/sp2005/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Lekkas:2005:HRS,
  author =       "Dimitrios Lekkas and Diomidis Spinellis",
  title =        "Handling and Reporting Security Advisories: a
                 Scorecard Approach",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "4",
  pages =        "32--41",
  month =        jul # "\slash " # aug,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.98",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:38:09 MST 2005",
  bibsource =    "http://computer.org/security/sp2005/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Gattiker:2005:E,
  author =       "Urs E. Gattiker",
  title =        "{EICAR 2005}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "4",
  pages =        "45--48",
  month =        jul # "\slash " # aug,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.96",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:38:09 MST 2005",
  bibsource =    "http://computer.org/security/sp2005/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Bishop:2005:HEL,
  author =       "Matt Bishop and Deborah Frincke",
  title =        "A Human Endeavor: Lessons from {Shakespeare} and
                 Beyond",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "4",
  pages =        "49--51",
  month =        jul # "\slash " # aug,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.87",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:38:09 MST 2005",
  bibsource =    "http://computer.org/security/sp2005/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Mulvenon:2005:TCS,
  author =       "James Mulvenon",
  title =        "Toward a Cyberconflict Studies Research Agenda",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "4",
  pages =        "52--55",
  month =        jul # "\slash " # aug,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.110",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:38:09 MST 2005",
  bibsource =    "http://computer.org/security/sp2005/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Gutmann:2005:SU,
  author =       "Peter Gutmann and Ian Grigg",
  title =        "Security Usability",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "4",
  pages =        "56--58",
  month =        jul # "\slash " # aug,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.104",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:38:09 MST 2005",
  bibsource =    "http://computer.org/security/sp2005/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Allen:2005:CF,
  author =       "William H. Allen",
  title =        "Computer Forensics",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "4",
  pages =        "59--62",
  month =        jul # "\slash " # aug,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.95",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:38:09 MST 2005",
  bibsource =    "http://computer.org/security/sp2005/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Arce:2005:LB,
  author =       "Iv{\'a}n Arce",
  title =        "The Land of the Blind",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "4",
  pages =        "63--67",
  month =        jul # "\slash " # aug,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.107",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:38:09 MST 2005",
  bibsource =    "http://computer.org/security/sp2005/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Sinclair:2005:TPT,
  author =       "Sara Sinclair and S. W. Smith",
  title =        "The {TIPPI} Point: Toward Trustworthy Interfaces",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "4",
  pages =        "68--71",
  month =        jul # "\slash " # aug,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.109",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:38:09 MST 2005",
  bibsource =    "http://computer.org/security/sp2005/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Stytz:2005:PPP,
  author =       "Martin R. Stytz",
  title =        "Protecting Personal Privacy: Hauling Down the {Jolly
                 Roger}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "4",
  pages =        "72--74",
  month =        jul # "\slash " # aug,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.102",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:38:09 MST 2005",
  bibsource =    "http://computer.org/security/sp2005/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Mead:2005:PSS,
  author =       "Nancy R. Mead and Gary McGraw",
  title =        "A Portal for Software Security",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "4",
  pages =        "75--79",
  month =        jul # "\slash " # aug,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.88",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:38:09 MST 2005",
  bibsource =    "http://computer.org/security/sp2005/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Donner:2005:TAN,
  author =       "Marc Donner",
  title =        "There Ain't No Inside, There Ain't No
                 Outside\ldots{}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "5",
  pages =        "4--5",
  month =        sep # "\slash " # oct,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.135",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:37:34 MST 2005",
  bibsource =    "http://computer.org/security/sp2005/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2005/05/j5004.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Webb:2005:BSS,
  author =       "Katharine W. Webb",
  title =        "Biometric Security Solutions",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "5",
  pages =        "7",
  month =        sep # "\slash " # oct,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.117",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:37:34 MST 2005",
  bibsource =    "http://computer.org/security/sp2005/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2005/05/j5007.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Drinan:2005:NBa,
  author =       "Heather Drinan and Brent Kesler",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "5",
  pages =        "8--10",
  month =        sep # "\slash " # oct,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.130",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:37:34 MST 2005",
  bibsource =    "http://computer.org/security/sp2005/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2005/05/j5008.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{McLaughlin:2005:AGP,
  author =       "Laurianne McLaughlin",
  title =        "From {AWK} to {Google}: {Peter Weinberger} Talks
                 Search",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "5",
  pages =        "11--13",
  month =        sep # "\slash " # oct,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.123",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:37:34 MST 2005",
  bibsource =    "http://computer.org/security/sp2005/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2005/05/j5011.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Carminati:2005:EPI,
  author =       "Barbara Carminati and Elena Ferrari and Patrick C. K.
                 Hung",
  title =        "Exploring Privacy Issues in {Web} Services Discovery
                 Agencies",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "5",
  pages =        "14--21",
  month =        sep # "\slash " # oct,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.121",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:37:34 MST 2005",
  bibsource =    "http://computer.org/security/sp2005/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Huberman:2005:VP,
  author =       "Bernardo A. Huberman and Eytan Adar and Leslie R.
                 Fine",
  title =        "Valuating Privacy",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "5",
  pages =        "22--25",
  month =        sep # "\slash " # oct,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.137",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:37:34 MST 2005",
  bibsource =    "http://computer.org/security/sp2005/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Hoffman:2005:ENC,
  author =       "Lance J. Hoffman and Tim Rosenberg and Ronald Dodge
                 and Daniel Ragsdale",
  title =        "Exploring a National Cybersecurity Exercise for
                 Universities",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "5",
  pages =        "27--33",
  month =        sep # "\slash " # oct,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.120",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:37:34 MST 2005",
  bibsource =    "http://computer.org/security/sp2005/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Schneider:2005:ITS,
  author =       "Fred B. Schneider and Lidong Zhou",
  title =        "Implementing Trustworthy Services Using Replicated
                 State Machines",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "5",
  pages =        "34--43",
  month =        sep # "\slash " # oct,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.125",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:37:34 MST 2005",
  bibsource =    "http://computer.org/security/sp2005/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Reeder:2005:S,
  author =       "Robert W. Reeder and Fahd Arshad",
  title =        "Soups 2005",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "5",
  pages =        "47--50",
  month =        sep # "\slash " # oct,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.131",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:37:34 MST 2005",
  bibsource =    "http://computer.org/security/sp2005/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Kuper:2005:SS,
  author =       "Peter Kuper",
  title =        "The State of Security",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "5",
  pages =        "51--53",
  month =        sep # "\slash " # oct,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.134",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:37:34 MST 2005",
  bibsource =    "http://computer.org/security/sp2005/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Bishop:2005:TSP,
  author =       "Matt Bishop and Deborah A. Frincke",
  title =        "Teaching Secure Programming",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "5",
  pages =        "54--56",
  month =        sep # "\slash " # oct,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.133",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:37:34 MST 2005",
  bibsource =    "http://computer.org/security/sp2005/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Miller:2005:TPC,
  author =       "Ann Miller",
  title =        "Trends in Process Control Systems Security",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "5",
  pages =        "57--60",
  month =        sep # "\slash " # oct,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.136",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:37:34 MST 2005",
  bibsource =    "http://computer.org/security/sp2005/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Naccache:2005:FF,
  author =       "David Naccache",
  title =        "Finding Faults",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "5",
  pages =        "61--65",
  month =        sep # "\slash " # oct,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.122",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:37:34 MST 2005",
  bibsource =    "http://computer.org/security/sp2005/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Torr:2005:DTM,
  author =       "Peter Torr",
  title =        "Demystifying the Threat-Modeling Process",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "5",
  pages =        "66--70",
  month =        sep # "\slash " # oct,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.119",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:37:34 MST 2005",
  bibsource =    "http://computer.org/security/sp2005/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Nicol:2005:MSS,
  author =       "David M. Nicol",
  title =        "Modeling and Simulation in Security Evaluation",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "5",
  pages =        "71--74",
  month =        sep # "\slash " # oct,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.129",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:37:34 MST 2005",
  bibsource =    "http://computer.org/security/sp2005/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{vanWyk:2005:BGB,
  author =       "Kenneth R. van Wyk and Gary McGraw",
  title =        "Bridging the Gap between Software Development and
                 Information Security",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "5",
  pages =        "75--79",
  month =        sep # "\slash " # oct,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.118",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:37:34 MST 2005",
  bibsource =    "http://computer.org/security/sp2005/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Geer:2005:WPS,
  author =       "Dan Geer",
  title =        "When Is a Product a Security Product?",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "5",
  pages =        "80",
  month =        sep # "\slash " # oct,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.138",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:37:34 MST 2005",
  bibsource =    "http://computer.org/security/sp2005/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2005/05/j5080.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Libicki:2005:RCG,
  author =       "Martin Libicki",
  title =        "Are {RFIDs} Coming to Get You?",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "6",
  pages =        "6--6",
  month =        nov # "\slash " # dec,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.142",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:30 MST 2006",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33104/01556529.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33104&arnumber=1556529",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Drinan:2005:NBb,
  author =       "Heather Drinan and Nancy Fontaine and Brent Kesler",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "6",
  pages =        "7--8",
  month =        nov # "\slash " # dec,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.154",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:41 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{McLaughlin:2005:WGR,
  author =       "Laurianne McLaughlin",
  title =        "Winning the Game of Risk: {Neumann}'s Take on Sound
                 Design",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "6",
  pages =        "9--12",
  month =        nov # "\slash " # dec,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.164",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:30 MST 2006",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33104/01556531.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33104&arnumber=1556531",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Sherr:2005:SVW,
  author =       "Michah Sherr and Eric Cronin and Sandy Clark and Matt
                 Blaze",
  title =        "Signaling vulnerabilities in wiretapping systems",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "6",
  pages =        "13--25",
  month =        nov # "\slash " # dec,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.160",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:30 MST 2006",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33104/01556532.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33104&arnumber=1556532",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Landau:2005:SWI,
  author =       "Susan Landau",
  title =        "Security, wiretapping, and the {Internet}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "6",
  pages =        "26--33",
  month =        nov # "\slash " # dec,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.158",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:30 MST 2006",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33104/01556533.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33104&arnumber=1556533",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Campbell:2005:DSD,
  author =       "Philip L. Campbell",
  title =        "The denial-of-service dance",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "6",
  pages =        "34--40",
  month =        nov # "\slash " # dec,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.162",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:30 MST 2006",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33104/01556534.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33104&arnumber=1556534",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Sidiroglou:2005:CNW,
  author =       "Stelios Sidiroglou and Angelos D. Keromytis",
  title =        "Countering network worms through automatic patch
                 generation",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "6",
  pages =        "41--49",
  month =        nov # "\slash " # dec,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.144",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:30 MST 2006",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33104/01556535.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33104&arnumber=1556535",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Conti:2005:FCD,
  author =       "Gregory Conti and Mustaque Ahamad",
  title =        "A framework for countering denial-of-information
                 attacks",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "6",
  pages =        "50--56",
  month =        nov # "\slash " # dec,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.140",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:30 MST 2006",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33104/01556536.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33104&arnumber=1556536",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Keikkila:2005:SE,
  author =       "Faith M. Keikkila",
  title =        "{SecureWorld Expo 2005}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "6",
  pages =        "57--60",
  month =        nov # "\slash " # dec,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.156",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:30 MST 2006",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33104/01556537.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33104&arnumber=1556537",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Sheoran:2005:DSI,
  author =       "Pinny Sheoran and Oria Friesen and Barbara J. {Huffman
                 de Bel{\'o}n}",
  title =        "Developing and Sustaining Information Assurance: The
                 Role of Community Colleges (Part 1)",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "6",
  pages =        "61--63",
  month =        nov # "\slash " # dec,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.145",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:30 MST 2006",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33104/01556538.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33104&arnumber=1556538",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Borg:2005:ECC,
  author =       "Scott Borg",
  title =        "Economically complex cyberattacks",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "6",
  pages =        "64--67",
  month =        nov # "\slash " # dec,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.146",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:30 MST 2006",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33104/01556539.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33104&arnumber=1556539",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Marin:2005:NSB,
  author =       "Gerald A. Marin",
  title =        "Network security basics",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "6",
  pages =        "68--72",
  month =        nov # "\slash " # dec,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.153",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:30 MST 2006",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33104/01556540.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33104&arnumber=1556540",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Smith:2005:PSS,
  author =       "S. W. Smith",
  title =        "Pretending that systems are secure",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "6",
  pages =        "73--76",
  month =        nov # "\slash " # dec,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.155",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:30 MST 2006",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33104/01556541.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33104&arnumber=1556541",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Power:2005:ARG,
  author =       "E. Michael Power and Roland L. Trope",
  title =        "Acting responsibly with geospatial data",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "6",
  pages =        "77--80",
  month =        nov # "\slash " # dec,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.141",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:30 MST 2006",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33104/01556542.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33104&arnumber=1556542",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Tsipenyuk:2005:SPK,
  author =       "Katrina Tsipenyuk and Brian Chess and Gary McGraw",
  title =        "Seven pernicious kingdoms: a taxonomy of software
                 security errors",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "6",
  pages =        "81--84",
  month =        nov # "\slash " # dec,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.159",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:30 MST 2006",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33104/01556543.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33104&arnumber=1556543",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Phillips:2005:SSR,
  author =       "Ted Phillips and Ttom Karygiannis and Rick Kuhn",
  title =        "Security standards for the {RFID} market",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "6",
  pages =        "85--89",
  month =        nov # "\slash " # dec,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.157",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:30 MST 2006",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33104/01556544.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33104&arnumber=1556544",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Anonymous:2005:AI,
  author =       "Anonymous",
  title =        "2005 Annual Index",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "6",
  pages =        "90--95",
  month =        nov # "\slash " # dec,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.139",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:41 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Schneier:2005:ZS,
  author =       "Bruce Schneier",
  title =        "The {Zotob} Storm",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "3",
  number =       "6",
  pages =        "96--96",
  month =        nov # "\slash " # dec,
  year =         "2005",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2005.163",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:30 MST 2006",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33104/01556546.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33104&arnumber=1556546",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Cybenko:2006:WJC,
  author =       "George Cybenko",
  title =        "Why {Johnny} Can't Evaluate Security Risk",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "1",
  pages =        "5--5",
  month =        jan # "\slash " # feb,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.30",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:31 MST 2006",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33481/01588814.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33481&arnumber=1588814",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Anonymous:2006:STS,
  author =       "Anonymous",
  title =        "Special Thanks to {S\&P}'s Reviewers",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "1",
  pages =        "7--8",
  month =        jan # "\slash " # feb,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.21",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:31 MST 2006",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Diffie:2006:CAS,
  author =       "Whitfield Diffie",
  title =        "Chattering about {SIGINT}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "1",
  pages =        "9--9",
  month =        jan # "\slash " # feb,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.9",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:31 MST 2006",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33481/01588817.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33481&arnumber=1588817",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{McLaughlin:2006:PZW,
  author =       "Laurianne McLaughlin",
  title =        "{Philip Zimmermann} on {What's Next after PGP?}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "1",
  pages =        "10--13",
  month =        jan # "\slash " # feb,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.20",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:31 MST 2006",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33481/01588818.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33481&arnumber=1588818",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Drinan:2006:NB,
  author =       "Heather Drinan and Nancy Fontaine and Brent Kesler",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "1",
  pages =        "14--16",
  month =        jan # "\slash " # feb,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.19",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:31 MST 2006",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33481/01588819.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33481&arnumber=1588819",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Felten:2006:DRM,
  author =       "Edward W. Felten and J. Alex Halderman",
  title =        "Digital Rights Management, Spyware, and Security",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "1",
  pages =        "18--23",
  month =        jan # "\slash " # feb,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.12",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:31 MST 2006",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33481/01588821.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33481&arnumber=1588821",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Levine:2006:DCK,
  author =       "John G. Levine and Julian B. Grizzard and Henry L.
                 Owen",
  title =        "Detecting and Categorizing Kernel-Level Rootkits to
                 Aid Future Detection",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "1",
  pages =        "24--32",
  month =        jan # "\slash " # feb,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.11",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:31 MST 2006",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33481/01588822.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33481&arnumber=1588822",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Kshetri:2006:SEC,
  author =       "Nir Kshetri",
  title =        "The Simple Economics of Cybercrimes",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "1",
  pages =        "33--39",
  month =        jan # "\slash " # feb,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.27",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:31 MST 2006",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33481/01588823.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33481&arnumber=1588823",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Cheung:2006:DSA,
  author =       "Steven Cheung",
  title =        "Denial of Service against the {Domain Name System}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "1",
  pages =        "40--45",
  month =        jan # "\slash " # feb,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.10",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:31 MST 2006",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33481/01588824.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33481&arnumber=1588824",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Black:2006:SAI,
  author =       "John Black and Martin Cochran and Ryan Gardner",
  title =        "A Security Analysis of the {Internet Chess Club}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "1",
  pages =        "46--52",
  month =        jan # "\slash " # feb,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.2",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:31 MST 2006",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33481/01588825.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33481&arnumber=1588825",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Rechberger:2006:NCW,
  author =       "Christian Rechberger and Vincent Rijmen and Nicolas
                 Sklavos",
  title =        "The {NIST Cryptographic Workshop on Hash Functions}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "1",
  pages =        "54--56",
  month =        jan # "\slash " # feb,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.26",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:31 MST 2006",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33481/01588827.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33481&arnumber=1588827;
                 http://www.csrc.nist.gov/pki/HashWorkshop/",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  remark =       "October 31--November 1, 2005 Gaithersburg, MD, USA.
                 Second workshop August 24--25, 2006, Santa Barbara, CA,
                 USA.",
}

@Article{Rosenberg:2006:TNR,
  author =       "Timothy Rosenberg and Lance J. Hoffman",
  title =        "Taking Networks on the Road: Portable Solutions for
                 Security Educators",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "1",
  pages =        "57--60",
  month =        jan # "\slash " # feb,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.25",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:31 MST 2006",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33481/01588828.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33481&arnumber=1588828",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Anonymous:2006:EC,
  author =       "Anonymous",
  title =        "2006 Editorial Calendar",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "1",
  pages =        "61--61",
  month =        jan # "\slash " # feb,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.1",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:31 MST 2006",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Gligor:2006:IAT,
  author =       "Virgil D. Gligor and Tom Haigh and Dick Kemmerer and
                 Carl Landwehr and Steve Lipner and John McLean",
  title =        "Information Assurance Technology Forecast 2005",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "1",
  pages =        "62--69",
  month =        jan # "\slash " # feb,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.14",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:31 MST 2006",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33481/01588830.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33481&arnumber=1588830",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Coron:2006:WC,
  author =       "Jean-Sebastien Coron",
  title =        "What Is Cryptography?",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "1",
  pages =        "70--73",
  month =        jan # "\slash " # feb,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.29",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:31 MST 2006",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33481/01588831.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33481&arnumber=1588831",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Seacord:2006:SCC,
  author =       "Robert Seacord",
  title =        "Secure Coding in {C} and {C++}: Of Strings and
                 Integers",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "1",
  pages =        "74--76",
  month =        jan # "\slash " # feb,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.22",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:31 MST 2006",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33481/01588832.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33481&arnumber=1588832",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Ruiu:2006:LIS,
  author =       "Dragos Ruiu",
  title =        "Learning from Information Security History",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "1",
  pages =        "77--79",
  month =        jan # "\slash " # feb,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.17",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:31 MST 2006",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33481/01588833.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33481&arnumber=1588833",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Epstein:2006:SSS,
  author =       "Jeremy Epstein and Scott Matsumoto and Gary McGraw",
  title =        "Software Security and {SOA}: {Danger, Will
                 Robinson}!",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "1",
  pages =        "80--83",
  month =        jan # "\slash " # feb,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.23",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:31 MST 2006",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33481/01588834.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33481&arnumber=1588834",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Chandramouli:2006:CSD,
  author =       "Ramaswamy Chandramouli and Scott Rose",
  title =        "Challenges in Securing the {Domain Name System}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "1",
  pages =        "84--87",
  month =        jan # "\slash " # feb,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.8",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:31 MST 2006",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33481/01588835.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33481&arnumber=1588835",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Bellovin:2006:UW,
  author =       "Steve Bellovin",
  title =        "Unconventional Wisdom",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "1",
  pages =        "88--88",
  month =        jan # "\slash " # feb,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.28",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:31 MST 2006",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33481/01588836.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33481&arnumber=1588836",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Donner:2006:ID,
  author =       "Marc Donner",
  title =        "The Impending Debate",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "2",
  pages =        "4--5",
  month =        mar # "\slash " # apr,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.55",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 3 07:36:16 MDT 2006",
  bibsource =    "http://computer.org/security/sp2006/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2006/02/j2004.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Felker:2006:IWG,
  author =       "Mikhael Felker",
  title =        "{Internet} War Games: Power of the Masses",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "2",
  pages =        "7",
  month =        mar # "\slash " # apr,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.44",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 3 07:36:16 MDT 2006",
  bibsource =    "http://computer.org/security/sp2006/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2006/02/j2007.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Kesler:2006:NBa,
  author =       "Brent Kesler and Heather Drinan and Nancy Fontaine",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "2",
  pages =        "8--13",
  month =        mar # "\slash " # apr,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.47",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 3 07:36:16 MDT 2006",
  bibsource =    "http://computer.org/security/sp2006/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2006/02/j2008.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Hole:2006:CSO,
  author =       "Kjell J. Hole and Vebj{\o}rn Moen and Thomas
                 Tj{\o}stheim",
  title =        "Case Study: Online Banking Security",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "2",
  pages =        "14--20",
  month =        mar # "\slash " # apr,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.36",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 3 07:36:16 MDT 2006",
  bibsource =    "http://computer.org/security/sp2006/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Hiltgen:2006:SIB,
  author =       "Alain Hiltgen and Thorsten Kramp and Thomas Weigold",
  title =        "Secure {Internet} Banking Authentication",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "2",
  pages =        "21--29",
  month =        mar # "\slash " # apr,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.50",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 3 07:36:16 MDT 2006",
  bibsource =    "http://computer.org/security/sp2006/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Wang:2006:CFC,
  author =       "WenJie Wang and Yufei Yuan and Norm Archer",
  title =        "A Contextual Framework for Combating Identity Theft",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "2",
  pages =        "30--38",
  month =        mar # "\slash " # apr,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.31",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 3 07:36:16 MDT 2006",
  bibsource =    "http://computer.org/security/sp2006/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Hwang:2006:SES,
  author =       "David D. Hwang and Patrick Schaumont and Kris Tiri and
                 Ingrid Verbauwhede",
  title =        "Securing Embedded Systems",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "2",
  pages =        "40--49",
  month =        mar # "\slash " # apr,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.51",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 3 07:36:16 MDT 2006",
  bibsource =    "http://computer.org/security/sp2006/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Keblawi:2006:ACC,
  author =       "Feisal Keblawi and Dick Sullivan",
  title =        "Applying the Common Criteria in Systems Engineering",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "2",
  pages =        "50--55",
  month =        mar # "\slash " # apr,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.35",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 3 07:36:16 MDT 2006",
  bibsource =    "http://computer.org/security/sp2006/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Kuper:2006:WIF,
  author =       "Peter Kuper",
  title =        "A Warning to Industry---Fix It or Lose It",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "2",
  pages =        "56--60",
  month =        mar # "\slash " # apr,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.32",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 3 07:36:16 MDT 2006",
  bibsource =    "http://computer.org/security/sp2006/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Bishop:2006:WOY,
  author =       "Matt Bishop and Deborah A. Frincke",
  title =        "Who Owns Your Computer?",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "2",
  pages =        "61--63",
  month =        mar # "\slash " # apr,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.56",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 3 07:36:16 MDT 2006",
  bibsource =    "http://computer.org/security/sp2006/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Gennaro:2006:RC,
  author =       "Rosario Gennaro",
  title =        "Randomness in Cryptography",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "2",
  pages =        "64--67",
  month =        mar # "\slash " # apr,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.49",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 3 07:36:16 MDT 2006",
  bibsource =    "http://computer.org/security/sp2006/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Whittaker:2006:HTA,
  author =       "James A. Whittaker and Richard Ford",
  title =        "How to Think about Security",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "2",
  pages =        "68--71",
  month =        mar # "\slash " # apr,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.39",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 3 07:36:16 MDT 2006",
  bibsource =    "http://computer.org/security/sp2006/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Holz:2006:NTA,
  author =       "Thorsten Holz and Simon Marechal and Fr{\'e}d{\'e}ric
                 Raynal",
  title =        "New Threats and Attacks on the {World Wide Web}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "2",
  pages =        "72--75",
  month =        mar # "\slash " # apr,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.46",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 3 07:36:16 MDT 2006",
  bibsource =    "http://computer.org/security/sp2006/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Bradner:2006:EEE,
  author =       "Scott Bradner",
  title =        "The End of End-to-End Security?",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "2",
  pages =        "76--79",
  month =        mar # "\slash " # apr,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.54",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 3 07:36:16 MDT 2006",
  bibsource =    "http://computer.org/security/sp2006/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Lesk:2006:SIF,
  author =       "Michael Lesk",
  title =        "Should Indexing Be Fair Use? {The} Battle over
                 {Google} Book Search",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "2",
  pages =        "80--83",
  month =        mar # "\slash " # apr,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.52",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 3 07:36:16 MDT 2006",
  bibsource =    "http://computer.org/security/sp2006/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  abstract =     "In late 2004, Google announced as part of its Library
                 Project that it would scan millions of books into a
                 searchable online database accessible to anyone using
                 Google Book Search (http://books.google.com). In
                 response, the US Authors Guild and the Association of
                 American Publishers (AAP) sued Google, claiming its
                 book scanning is ``massive copyright infringement.''
                 Google says its indexing is a legitimate fair use. As
                 in all such discussions, two different questions arise:
                 What does the law say? What would be good public
                 policy?",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Steven:2006:AES,
  author =       "John Steven",
  title =        "Adopting an Enterprise Software Security Framework",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "2",
  pages =        "84--87",
  month =        mar # "\slash " # apr,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.33",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 3 07:36:16 MDT 2006",
  bibsource =    "http://computer.org/security/sp2006/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Burr:2006:CHS,
  author =       "William E. Burr",
  title =        "Cryptographic Hash Standards: Where Do We Go from
                 Here?",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "2",
  pages =        "88--91",
  month =        mar # "\slash " # apr,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.37",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 3 07:36:16 MDT 2006",
  bibsource =    "http://computer.org/security/sp2006/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Anonymous:2006:ISPa,
  author =       "Anonymous",
  title =        "{IEEE Security \& Privacy} 2006 Editorial Calendar",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "2",
  pages =        "92",
  month =        mar # "\slash " # apr,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.41",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:42 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Schneider:2006:HD,
  author =       "Fred B. Schneider",
  title =        "Here Be Dragons",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "3",
  pages =        "3",
  month =        may # "\slash " # jun,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.68",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:08 MDT 2006",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2006/03/j3003.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Pfleeger:2006:EYW,
  author =       "Shari Lawrence Pfleeger",
  title =        "Everything You Wanted to Know about Privacy (But Were
                 Afraid to Ask)",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "3",
  pages =        "5",
  month =        may # "\slash " # jun,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.65",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:08 MDT 2006",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2006/03/j3005.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Kesler:2006:NBb,
  author =       "Brent Kesler and Heather Drinan",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "3",
  pages =        "6--10",
  month =        may # "\slash " # jun,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.76",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:08 MDT 2006",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2006/03/j3006.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{McGraw:2006:ISBa,
  author =       "Gary McGraw",
  title =        "Interview: {Silver Bullet} Speaks to {Avi Rubin}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "3",
  pages =        "11--13",
  month =        may # "\slash " # jun,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.78",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:08 MDT 2006",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Dempsey:2006:GEI,
  author =       "James X. Dempsey and Ira Rubinstein",
  title =        "{Guest Editors}' Introduction: Lawyers and
                 Technologists---Joined at the Hip?",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "3",
  pages =        "15--19",
  month =        may # "\slash " # jun,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.67",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:08 MDT 2006",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2006/03/j3015.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Bellia:2006:FAE,
  author =       "Patricia L. Bellia",
  title =        "The {Fourth Amendment} and Emerging Communications
                 Technologies",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "3",
  pages =        "20--28",
  month =        may # "\slash " # jun,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.80",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:08 MDT 2006",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Gidari:2006:DRW,
  author =       "Albert Gidari",
  title =        "Designing the Right Wiretap Solution: Setting
                 Standards under {CALEA}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "3",
  pages =        "29--36",
  month =        may # "\slash " # jun,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.62",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:08 MDT 2006",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Egan:2006:BBF,
  author =       "Erin Egan and Tim Jucovy",
  title =        "Building a Better Filter: How To Create a Safer
                 {Internet} and Avoid the Litigation Trap",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "3",
  pages =        "37--44",
  month =        may # "\slash " # jun,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.59",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:08 MDT 2006",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Curran:2006:CSS,
  author =       "Charles D. Curran",
  title =        "Combating Spam, Spyware, and Other Desktop Intrusions:
                 Legal Considerations in Operating Trusted Intermediary
                 Technologies",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "3",
  pages =        "45--51",
  month =        may # "\slash " # jun,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.60",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:08 MDT 2006",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Schaffer:2006:WVB,
  author =       "Gregory P. Schaffer",
  title =        "Worms and Viruses and Botnets, Oh My!: Rational
                 Responses to Emerging {Internet} Threats",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "3",
  pages =        "52--58",
  month =        may # "\slash " # jun,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.83",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:08 MDT 2006",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Sheoran:2006:DSI,
  author =       "Pinny Sheoran and Oris Friesen and Barbara J. {Huffman
                 de Bel{\'o}n}",
  title =        "Developing and Sustaining Information Assurance: The
                 Role of Community Colleges, Part 2",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "3",
  pages =        "60--65",
  month =        may # "\slash " # jun,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.63",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:08 MDT 2006",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Bloomfield:2006:IWG,
  author =       "Robin E. Bloomfield and Sofia Guerra and Ann Miller
                 and Marcelo Masera and Charles B. Weinstock",
  title =        "International Working Group on Assurance Cases (for
                 Security)",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "3",
  pages =        "66--68",
  month =        may # "\slash " # jun,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.73",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:08 MDT 2006",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Paterson:2006:LTT,
  author =       "Kenneth G. Paterson and Arnold K. L. Yau",
  title =        "Lost in Translation: Theory and Practice in
                 Cryptography",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "3",
  pages =        "69--72",
  month =        may # "\slash " # jun,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.74",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:08 MDT 2006",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Aura:2006:WYS,
  author =       "Tuomas Aura",
  title =        "Why You Shouldn't Study Security",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "3",
  pages =        "74--76",
  month =        may # "\slash " # jun,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.82",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:08 MDT 2006",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Stytz:2006:DSS,
  author =       "Martin R. Stytz and Sheila B. Banks",
  title =        "Dynamic Software Security Testing",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "3",
  pages =        "77--79",
  month =        may # "\slash " # jun,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.64",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:08 MDT 2006",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Chandra:2006:PTW,
  author =       "Pravir Chandra and Brian Chess and John Steven",
  title =        "Putting the Tools to Work: How to Succeed with Source
                 Code Analysis",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "3",
  pages =        "80--83",
  month =        may # "\slash " # jun,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.77",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:08 MDT 2006",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Anderson:2006:WSP,
  author =       "Anne Anderson",
  title =        "{Web} Services Policies (Abstract)",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "3",
  pages =        "84--87",
  month =        may # "\slash " # jun,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.81",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:08 MDT 2006",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Geer:2006:CA,
  author =       "Daniel E. {Geer, Jr.}",
  title =        "Convergence (Abstract)",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "3",
  pages =        "88--88",
  month =        may # "\slash " # jun,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.61",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:08 MDT 2006",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Landwehr:2006:SP,
  author =       "Carl E. Landwehr",
  title =        "Speaking of Privacy",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "4",
  pages =        "4--5",
  month =        jul # "\slash " # aug,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.105",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:16 MDT 2006",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2006/04/j4004.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Kesler:2006:NBc,
  author =       "Brent Kesler and Heather Drinan",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "4",
  pages =        "6--8",
  month =        jul # "\slash " # aug,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.100",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:16 MDT 2006",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2006/04/j4006.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Pfleeger:2006:WWW,
  author =       "Charles P. Pfleeger and Shari Lawrence Pfleeger",
  title =        "Why We Won't Review Books by Hackers",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "4",
  pages =        "9",
  month =        jul # "\slash " # aug,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.111",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:16 MDT 2006",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2006/04/j4009.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{McGraw:2006:ISBb,
  author =       "Gary McGraw",
  title =        "Interview: {Silver Bullet} Speaks with {Dan Geer}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "4",
  pages =        "10--13",
  month =        jul # "\slash " # aug,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.104",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:16 MDT 2006",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Andrews:2006:GEI,
  author =       "Mike Andrews",
  title =        "{Guest Editor}'s Introduction: The State of {Web}
                 Security",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "4",
  pages =        "14--15",
  month =        jul # "\slash " # aug,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.88",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:16 MDT 2006",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2006/04/j4014.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Meier:2006:WAS,
  author =       "J. D. Meier",
  title =        "{Web} Application Security Engineering",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "4",
  pages =        "16--24",
  month =        jul # "\slash " # aug,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.109",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:16 MDT 2006",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Viega:2006:WAS,
  author =       "John Viega and Jeremy Epstein",
  title =        "Why Applying Standards to {Web} Services Is Not
                 Enough",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "4",
  pages =        "25--31",
  month =        jul # "\slash " # aug,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.110",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:16 MDT 2006",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Curphey:2006:WAS,
  author =       "Mark Curphey and Rudolph Araujo",
  title =        "{Web} Application Security Assessment Tools",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "4",
  pages =        "32--41",
  month =        jul # "\slash " # aug,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.108",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:16 MDT 2006",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Verdon:2006:SPS,
  author =       "Denis Verdon",
  title =        "Security Policies and the Software Developer",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "4",
  pages =        "42--49",
  month =        jul # "\slash " # aug,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.103",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:16 MDT 2006",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Brooks:2006:KAN,
  author =       "Richard R. Brooks and Christopher Vutsinas",
  title =        "{Kafka} in the Academy: a Note on Ethics in {IA}
                 Education",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "4",
  pages =        "50--53",
  month =        jul # "\slash " # aug,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.96",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:16 MDT 2006",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Verissimo:2006:ITM,
  author =       "Paulo E. Ver{\'\i}ssimo and Nuno F. Neves and
                 Christian Cachin and Jonathan Poritz and David Powell
                 and Yves Deswarte and Robert Stroud and Ian Welch",
  title =        "Intrusion-Tolerant Middleware: The Road to Automatic
                 Security",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "4",
  pages =        "54--62",
  month =        jul # "\slash " # aug,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.95",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:16 MDT 2006",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Trope:2006:LLC,
  author =       "Roland L. Trope and E. Michael Power",
  title =        "Lessons for Laptops for the {18th Century}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "4",
  pages =        "64--68",
  month =        jul # "\slash " # aug,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.97",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:16 MDT 2006",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Rieback:2006:RMT,
  author =       "Melanie R. Rieback and Bruno Crispo and Andrew S.
                 Tanenbaum",
  title =        "{RFID} Malware: Truth vs. Myth",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "4",
  pages =        "70--72",
  month =        jul # "\slash " # aug,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.102",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:16 MDT 2006",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Howard:2006:PPS,
  author =       "Michael Howard",
  title =        "A Process for Performing Security Code Reviews",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "4",
  pages =        "74--79",
  month =        jul # "\slash " # aug,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.84",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:16 MDT 2006",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Arce:2006:VHV,
  author =       "Ivan Arce",
  title =        "Voices, {I} Hear Voices",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "4",
  pages =        "80--83",
  month =        jul # "\slash " # aug,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.107",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:16 MDT 2006",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Herzog:2006:APA,
  author =       "Jonathan Herzog",
  title =        "Applying Protocol Analysis to Security Device
                 Interfaces",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "4",
  pages =        "84--87",
  month =        jul # "\slash " # aug,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.85",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:16 MDT 2006",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Peterson:2006:IIM,
  author =       "Gunnar Peterson",
  title =        "Introduction to Identity Management Risk Metrics",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "4",
  pages =        "88--91",
  month =        jul # "\slash " # aug,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.94",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:16 MDT 2006",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Robbins:2006:MIP,
  author =       "Jim Robbins and John T. Sabo",
  title =        "Managing Information Privacy: Developing a Context for
                 Security and Privacy Standards Convergence",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "4",
  pages =        "92--95",
  month =        jul # "\slash " # aug,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.98",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:16 MDT 2006",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Bellovin:2006:BSI,
  author =       "Steven M. Bellovin",
  title =        "On the Brittleness of Software and the Infeasibility
                 of Security Metrics",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "4",
  pages =        "96--96",
  month =        jul # "\slash " # aug,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.101",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:16 MDT 2006",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Donner:2006:ITO,
  author =       "Marc Donner",
  title =        "Insecurity through Obscurity",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "5",
  pages =        "4",
  month =        sep # "\slash " # oct,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.123",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:29 MDT 2006",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2006/05/j5004.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Anonymous:2006:LE,
  author =       "Anonymous",
  title =        "Letters to the Editor",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "5",
  pages =        "5",
  month =        sep # "\slash " # oct,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.127",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:29 MDT 2006",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2006/05/j5005.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{MacDonald:2006:CBT,
  author =       "Geraldine MacDonald",
  title =        "Cross-Border Transaction Liability",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "5",
  pages =        "7",
  month =        sep # "\slash " # oct,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.116",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:29 MDT 2006",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2006/05/j5007.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Ortega:2006:NBa,
  author =       "Brandi Ortega",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "5",
  pages =        "8--10",
  month =        sep # "\slash " # oct,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.129",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:29 MDT 2006",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2006/05/j5008.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{McGraw:2006:ISBc,
  author =       "Gary McGraw",
  title =        "Interview: {Silver Bullet} Speaks to {Marcus Ranum}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "5",
  pages =        "11--14",
  month =        sep # "\slash " # oct,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.126",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:29 MDT 2006",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Geiger:2006:SSD,
  author =       "Matthew Geiger and Lorrie Faith Cranor",
  title =        "Scrubbing Stubborn Data: An Evaluation of
                 Counter-Forensic Privacy Tools",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "5",
  pages =        "16--25",
  month =        sep # "\slash " # oct,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.132",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:29 MDT 2006",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Thibadeau:2006:TCD,
  author =       "Robert Thibadeau",
  title =        "Trusted Computing for Disk Drives and Other
                 Peripherals",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "5",
  pages =        "26--33",
  month =        sep # "\slash " # oct,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.136",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:29 MDT 2006",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Shaunghe:2006:EPS,
  author =       "Peng Shaunghe and Han Zhen",
  title =        "Enhancing {PC} Security with a {U}-Key",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "5",
  pages =        "34--39",
  month =        sep # "\slash " # oct,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.118",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:29 MDT 2006",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Jacoby:2006:UBC,
  author =       "Grant A. Jacoby and Randy Marchany and Nathaniel J.
                 {Davis IV}",
  title =        "Using Battery Constraints within Mobile Hosts to
                 Improve Network Security",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "5",
  pages =        "40--49",
  month =        sep # "\slash " # oct,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.139",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:29 MDT 2006",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Randell:2006:VTT,
  author =       "Brian Randell and Peter Y. A. Ryan",
  title =        "Voting Technologies and Trust",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "5",
  pages =        "50--56",
  month =        sep # "\slash " # oct,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.140",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:29 MDT 2006",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Weis:2006:PET,
  author =       "Stephen A. Weis",
  title =        "Privacy Enhancing Technologies",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "5",
  pages =        "59",
  month =        sep # "\slash " # oct,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.130",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:29 MDT 2006",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2006/05/j5059.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Slay:2006:CSE,
  author =       "Jill Slay and Benjamin Turnbull",
  title =        "Computer Security Education and Research in
                 {Australia}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "5",
  pages =        "60--63",
  month =        sep # "\slash " # oct,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.115",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:29 MDT 2006",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Martin:2006:FSP,
  author =       "Luther Martin",
  title =        "Fitting Square Pegs into Round Holes",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "5",
  pages =        "64--66",
  month =        sep # "\slash " # oct,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.120",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:29 MDT 2006",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Gordon:2006:UAV,
  author =       "Sarah Gordon",
  title =        "Understanding the Adversary: Virus Writers and
                 Beyond",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "5",
  pages =        "67--70",
  month =        sep # "\slash " # oct,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.137",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:29 MDT 2006",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Levy:2006:WCS,
  author =       "Elias Levy",
  title =        "Worst-Case Scenario",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "5",
  pages =        "71--73",
  month =        sep # "\slash " # oct,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.141",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:29 MDT 2006",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Trope:2006:ITM,
  author =       "Roland L. Trope",
  title =        "Immaterial Transfers with Material Consequences",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "5",
  pages =        "74--78",
  month =        sep # "\slash " # oct,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.122",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:29 MDT 2006",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{vanWyk:2006:EFS,
  author =       "Kenneth R. van Wyk and John Steven",
  title =        "Essential Factors for Successful Software Security
                 Awareness Training",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "5",
  pages =        "80--83",
  month =        sep # "\slash " # oct,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.119",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:29 MDT 2006",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Montgomery:2006:TSR,
  author =       "Doug Montgomery and Sandra Murphy",
  title =        "Toward Secure Routing Infrastructures",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "5",
  pages =        "84--87",
  month =        sep # "\slash " # oct,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.135",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:29 MDT 2006",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Schneier:2006:UND,
  author =       "Bruce Schneier",
  title =        "University Networks and Data Security",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "5",
  pages =        "88--88",
  month =        sep # "\slash " # oct,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.138",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:29 MDT 2006",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Cybenko:2006:WLS,
  author =       "George Cybenko",
  title =        "Weak Links, Strong Ties",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "6",
  pages =        "3",
  month =        nov # "\slash " # dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.170",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:42 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Anonymous:2006:M,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "6",
  pages =        "4",
  month =        nov # "\slash " # dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.158",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:42 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Spafford:2006:DIB,
  author =       "Eugene Spafford",
  title =        "Desert Island Books",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "6",
  pages =        "5",
  month =        nov # "\slash " # dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.150",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:42 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Ortega:2006:NBb,
  author =       "Brandi Ortega",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "6",
  pages =        "6--9",
  month =        nov # "\slash " # dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.160",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:42 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{McGraw:2006:SBS,
  author =       "Gary McGraw",
  title =        "Silver Bullet Speaks with {Ed Felten}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "6",
  pages =        "10--13",
  month =        nov # "\slash " # dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.164",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:42 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Anonymous:2006:RC,
  author =       "Anonymous",
  title =        "{RSA{\reg} Conference 2007}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "6",
  pages =        "14",
  month =        nov # "\slash " # dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.162",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:42 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Garfinkel:2006:GEI,
  author =       "Simson Garfinkel and Michael D. Smith",
  title =        "{Guest Editors}' Introduction: Data Surveillance",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "6",
  pages =        "15--17",
  month =        nov # "\slash " # dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.154",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:42 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Popp:2006:CTT,
  author =       "Robert Popp and John Poindexter",
  title =        "Countering Terrorism through Information and Privacy
                 Protection Technologies",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "6",
  pages =        "18--27",
  month =        nov # "\slash " # dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.147",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:42 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Jonas:2006:TFI,
  author =       "Jeff Jonas",
  title =        "Threat and Fraud Intelligence, {Las Vegas} Style",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "6",
  pages =        "28--34",
  month =        nov # "\slash " # dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.169",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:42 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Anonymous:2006:ICS,
  author =       "Anonymous",
  title =        "{IEEE Computer Society Distance Learning Campus}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "6",
  pages =        "35",
  month =        nov # "\slash " # dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.155",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:42 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Chaboya:2006:NID,
  author =       "David J. Chaboya and Richard A. Raines and Rusty O.
                 Baldwin and Barry E. Mullins",
  title =        "Network Intrusion Detection: Automated and Manual
                 Methods Prone to Attack and Evasion",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "6",
  pages =        "36--43",
  month =        nov # "\slash " # dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.159",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:42 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Lee:2006:EPI,
  author =       "Vincent C. S. Lee and Linyi Shao",
  title =        "Estimating Potential {IT} Security Losses: An
                 Alternative Quantitative Approach",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "6",
  pages =        "44--52",
  month =        nov # "\slash " # dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.151",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:42 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Tsai:2006:S,
  author =       "Janice Y. Tsai and Serge Egelman",
  title =        "{Soups 2006}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "6",
  pages =        "53--55",
  month =        nov # "\slash " # dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.165",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:42 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Rubin:2006:CSE,
  author =       "Bradley S. Rubin and Donald Cheung",
  title =        "Computer Security Education and Research: Handle with
                 Care",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "6",
  pages =        "56--59",
  month =        nov # "\slash " # dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.146",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:42 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Porras:2006:PEG,
  author =       "Phillip A. Porras",
  title =        "Privacy-Enabled Global Threat Monitoring",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "6",
  pages =        "60--63",
  month =        nov # "\slash " # dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.161",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:42 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Tomaszewski:2006:YSY,
  author =       "John P. Tomaszewski",
  title =        "Are You Sure You Had a Privacy Incident?",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "6",
  pages =        "64--66",
  month =        nov # "\slash " # dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.143",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:42 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Gratzer:2006:CLE,
  author =       "Vanessa Gratzer and David Naccache",
  title =        "Cryptography, Law Enforcement, and Mobile
                 Communications",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "6",
  pages =        "67--70",
  month =        nov # "\slash " # dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.148",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:42 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Ladd:2006:SPS,
  author =       "David Ladd",
  title =        "A Software Procurement and Security Primer",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "6",
  pages =        "71--73",
  month =        nov # "\slash " # dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.142",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:42 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Kiely:2006:SSM,
  author =       "Laree Kiely and Terry V. Benzel",
  title =        "Systemic Security Management",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "6",
  pages =        "74--77",
  month =        nov # "\slash " # dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.167",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:42 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Suchan:2006:SWL,
  author =       "William Suchan and Edward Sobiesk",
  title =        "Strengthening the Weakest Link in Digital Protection",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "6",
  pages =        "78--80",
  month =        nov # "\slash " # dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.166",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:42 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Peterson:2006:DMW,
  author =       "Gunnar Peterson and John Steven",
  title =        "Defining Misuse within the Development Process",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "6",
  pages =        "81--84",
  month =        nov # "\slash " # dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.149",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:42 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Mell:2006:CVS,
  author =       "Peter Mell and Karen Scarfone and Sasha Romanosky",
  title =        "Common Vulnerability Scoring System",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "6",
  pages =        "85--89",
  month =        nov # "\slash " # dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.145",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:42 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Anonymous:2006:ISPb,
  author =       "Anonymous",
  title =        "{IEEE Security \& Privacy} 2006 Annual Index, Volume
                 4",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "6",
  pages =        "90--95",
  month =        nov # "\slash " # dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.156",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:42 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Geer:2006:EE,
  author =       "Daniel E. {Geer, Jr.}",
  title =        "Evidently Evidentiary",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "4",
  number =       "6",
  pages =        "96",
  month =        nov # "\slash " # dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2006.152",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:42 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Landwehr:2007:NCN,
  author =       "Carl E. Landwehr",
  title =        "New Challenges for the {New Year}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "1",
  pages =        "3--4",
  month =        jan # "\slash " # feb,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.13",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Anonymous:2007:STS,
  author =       "Anonymous",
  title =        "Special Thanks to {S\&P}'s Reviewers",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "1",
  pages =        "6--7",
  month =        jan # "\slash " # feb,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.19",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Anderson:2007:SSS,
  author =       "Ross Anderson",
  title =        "Software Security: State of the Art",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "1",
  pages =        "8",
  month =        jan # "\slash " # feb,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.18",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{McGraw:2007:SBSa,
  author =       "Gary McGraw",
  title =        "Silver Bullet Speaks with {John Stewart}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "1",
  pages =        "9--11",
  month =        jan # "\slash " # feb,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.17",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Ortega:2007:NBa,
  author =       "Brandi Ortega",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "1",
  pages =        "12--15",
  month =        jan # "\slash " # feb,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.14",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Oppliger:2007:PCM,
  author =       "Rolf Oppliger",
  title =        "Providing Certified Mail Services on the {Internet}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "1",
  pages =        "16--22",
  month =        jan # "\slash " # feb,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.15",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Aime:2007:DWN,
  author =       "Marco Domenico Aime and Giorgio Calandriello and
                 Antonio Lioy",
  title =        "Dependability in Wireless Networks: Can We Rely on
                 {WiFi?}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "1",
  pages =        "23--29",
  month =        jan # "\slash " # feb,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.4",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Woody:2007:COS,
  author =       "Carol Woody and Christopher Alberts",
  title =        "Considering Operational Security Risk during System
                 Development",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "1",
  pages =        "30--35",
  month =        jan # "\slash " # feb,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.3",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Baker:2007:ISU,
  author =       "Wade H. Baker and Linda Wallace",
  title =        "Is Information Security Under Control?: Investigating
                 Quality in Information Security Management",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "1",
  pages =        "36--44",
  month =        jan # "\slash " # feb,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.11",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Anton:2007:HEW,
  author =       "Annie I. Ant{\'o}n and Julia B. Eart and Matthew W.
                 Vail and Neha Jain and Carrie M. Gheen and Jack M.
                 Frink",
  title =        "{HIPAA}'s Effect on {Web} Site Privacy Policies",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "1",
  pages =        "45--52",
  month =        jan # "\slash " # feb,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.7",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Bishop:2007:ALO,
  author =       "Matt Bishop and Deborah A. Frincke",
  title =        "Achieving Learning Objectives through {E}-Voting Case
                 Studies",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "1",
  pages =        "53--56",
  month =        jan # "\slash " # feb,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.1",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Iyer:2007:TAA,
  author =       "Ravishankar K. Iyer and Zbigniew Kalbarczyk and
                 Karthik Pattabiraman and William Healey and Wen-Mei W.
                 Hwu and Peter Klemperer and Reza Farivar",
  title =        "Toward Application-Aware Security and Reliability",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "1",
  pages =        "57--62",
  month =        jan # "\slash " # feb,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.23",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Geiselmann:2007:SPH,
  author =       "Willi Geiselmann and Rainer Steinwandt",
  title =        "Special-Purpose Hardware in Cryptanalysis: The Case of
                 1,024-Bit {RSA}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "1",
  pages =        "63--66",
  month =        jan # "\slash " # feb,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.20",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Ford:2007:HS,
  author =       "Richard Ford and William H. Allen",
  title =        "How Not to Be Seen",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "1",
  pages =        "67--69",
  month =        jan # "\slash " # feb,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.8",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{ODonnell:2007:EMS,
  author =       "Adam J. O'Donnell",
  title =        "The Evolutionary Microcosm of Stock Spam",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "1",
  pages =        "70--72",
  month =        jan # "\slash " # feb,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.22",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{DeLooze:2007:PWS,
  author =       "Lori DeLooze",
  title =        "Providing {Web} Service Security in a Federated
                 Environment",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "1",
  pages =        "73--75",
  month =        jan # "\slash " # feb,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.16",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Morris:2007:WWY,
  author =       "John Morris and Jon Peterson",
  title =        "Who's Watching You Now?",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "1",
  pages =        "76--79",
  month =        jan # "\slash " # feb,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.24",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Bellovin:2007:DCC,
  author =       "Steve Bellovin",
  title =        "{DRM}, Complexity, and Correctness",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "1",
  pages =        "80",
  month =        jan # "\slash " # feb,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.5",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Schneider:2007:TCC,
  author =       "Fred Schneider",
  title =        "Trusted Computing in Context",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "2",
  pages =        "4--5",
  month =        mar # "\slash " # apr,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.47",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Ortega:2007:NBb,
  author =       "Brandi Ortega",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "2",
  pages =        "7--10",
  month =        mar # "\slash " # apr,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.38",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{McGraw:2007:SBSb,
  author =       "Gary McGraw",
  title =        "Silver Bullet Speaks with {Dorothy Denning}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "2",
  pages =        "11--14",
  month =        mar # "\slash " # apr,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.41",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Arce:2007:SPY,
  author =       "Iv{\'a}n Arce",
  title =        "A Surprise Party (on Your Computer)?",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "2",
  pages =        "15--16",
  month =        mar # "\slash " # apr,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.27",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Carettoni:2007:SBM,
  author =       "Luca Carettoni and Claudio Merloni and Stefano
                 Zanero",
  title =        "Studying {Bluetooth} Malware Propagation: The
                 {BlueBag} Project",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "2",
  pages =        "17--25",
  month =        mar # "\slash " # apr,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.43",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Gratzer:2007:AVQ,
  author =       "Vanessa Gratzer and David Naccache",
  title =        "Alien vs. {Quine}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "2",
  pages =        "26--31",
  month =        mar # "\slash " # apr,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.28",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Willems:2007:TAD,
  author =       "Carsten Willems and Thorsten Holz and Felix Freiling",
  title =        "Toward Automated Dynamic Malware Analysis Using
                 {CWSandbox}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "2",
  pages =        "32--39",
  month =        mar # "\slash " # apr,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.45",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Lyda:2007:UEA,
  author =       "Robert Lyda and James Hamrock",
  title =        "Using Entropy Analysis to Find Encrypted and Packed
                 Malware",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "2",
  pages =        "40--45",
  month =        mar # "\slash " # apr,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.48",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Bruschi:2007:CNS,
  author =       "Danilo Bruschi and Lorenzo Martignoni and Mattia
                 Monga",
  title =        "Code Normalization for Self-Mutating Malware",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "2",
  pages =        "46--54",
  month =        mar # "\slash " # apr,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.31",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Bhargav-Spantzel:2007:TNI,
  author =       "Abhilasha Bhargav-Spantzel and Anna C. Squicciarini
                 and Elisa Bertino",
  title =        "Trust Negotiation in Identity Management",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "2",
  pages =        "55--63",
  month =        mar # "\slash " # apr,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.46",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Theoharidou:2007:CBK,
  author =       "Marianthi Theoharidou and Dimitris Gritazalis",
  title =        "Common Body of Knowledge for Information Security",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "2",
  pages =        "64--67",
  month =        mar # "\slash " # apr,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.32",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Martin:2007:SCE,
  author =       "Keye Martin",
  title =        "Secure Communication without Encryption?",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "2",
  pages =        "68--71",
  month =        mar # "\slash " # apr,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.39",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Power:2007:SBB,
  author =       "E. Michael Power and Jonathan Gilhen and Roland L.
                 Trope",
  title =        "Setting Boundaries at Borders: Reconciling Laptop
                 Searches and Privacy",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "2",
  pages =        "72--75",
  month =        mar # "\slash " # apr,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.40",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Tsang:2007:WCT,
  author =       "Patrick P. Tsang",
  title =        "When Cryptographers Turn Lead into Gold",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "2",
  pages =        "76--79",
  month =        mar # "\slash " # apr,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.49",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Kapadia:2007:CSU,
  author =       "Apu Kapadia",
  title =        "A Case (Study) For Usability in Secure Email
                 Communication",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "2",
  pages =        "80--84",
  month =        mar # "\slash " # apr,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.25",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Lesk:2007:SKW,
  author =       "Michael Lesk",
  title =        "{South Korea}'s Way to the Future",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "2",
  pages =        "85--87",
  month =        mar # "\slash " # apr,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.42",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Nichols:2007:MFD,
  author =       "Elizabeth A. Nichols and Gunnar Peterson",
  title =        "A Metrics Framework to Drive Application Security
                 Improvement",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "2",
  pages =        "88--91",
  month =        mar # "\slash " # apr,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.26",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Chandramouli:2007:ISS,
  author =       "Ramaswamy Chandramouli and Philip Lee",
  title =        "Infrastructure Standards for Smart {ID} Card
                 Deployment",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "2",
  pages =        "92--96",
  month =        mar # "\slash " # apr,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.34",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Landwehr:2007:FTI,
  author =       "Carl E. Landwehr",
  title =        "Food for Thought: Improving the Market for Assurance",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "3",
  pages =        "3--4",
  month =        may # "\slash " # jun,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.60",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:44 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{McGraw:2007:SBTa,
  author =       "Gary McGraw",
  title =        "Silver Bullet Talks with {Becky Bace}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "3",
  pages =        "6--9",
  month =        may # "\slash " # jun,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.70",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:44 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Ortega:2007:NBc,
  author =       "Brandi Ortega",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "3",
  pages =        "10--12",
  month =        may # "\slash " # jun,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.67",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:44 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Pfleeger:2007:GEI,
  author =       "Shari Lawrence Pfleeger and Roland L. Trope and
                 Charles C. Palmer",
  title =        "{Guest Editors}' Introduction: Managing Organizational
                 Security",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "3",
  pages =        "13--15",
  month =        may # "\slash " # jun,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.62",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:44 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Johnson:2007:EIS,
  author =       "M. Eric Johnson and Eric Goetz",
  title =        "Embedding Information Security into the Organization",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "3",
  pages =        "16--24",
  month =        may # "\slash " # jun,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.59",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:44 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Pfleeger:2007:IBC,
  author =       "Shari Lawrence Pfleeger and Martin Libicki and Michael
                 Webber",
  title =        "{I}'ll Buy That! Cybersecurity in the {Internet}
                 Marketplace",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "3",
  pages =        "25--31",
  month =        may # "\slash " # jun,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.64",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:44 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Trope:2007:CSD,
  author =       "Roland L. Trope and E. Michael Power and Vincent I.
                 Polley and Bradford C. Morley",
  title =        "A Coherent Strategy for Data Security through Data
                 Governance",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "3",
  pages =        "32--39",
  month =        may # "\slash " # jun,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.51",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:44 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Rosenblum:2007:WAC,
  author =       "David Rosenblum",
  title =        "What Anyone Can Know: The Privacy Risks of Social
                 Networking Sites",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "3",
  pages =        "40--49",
  month =        may # "\slash " # jun,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.75",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:44 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Baer:2007:CIS,
  author =       "Walter S. Baer and Andrew Parkinson",
  title =        "Cyberinsurance in {IT} Security Management",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "3",
  pages =        "50--56",
  month =        may # "\slash " # jun,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.57",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:44 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Swart:2007:ESC,
  author =       "Richard S. Swart and Robert F. Erbacher",
  title =        "Educating Students to Create Trustworthy Systems",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "3",
  pages =        "58--61",
  month =        may # "\slash " # jun,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.58",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:44 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Carpenter:2007:HVA,
  author =       "Matthew Carpenter and Tom Liston and Ed Skoudis",
  title =        "Hiding Virtualization from Attackers and Malware",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "3",
  pages =        "62--65",
  month =        may # "\slash " # jun,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.63",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:44 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Sobiesk:2007:CFW,
  author =       "Edward Sobiesk and Gregory Conti",
  title =        "The Cost of Free {Web} Tools",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "3",
  pages =        "66--68",
  month =        may # "\slash " # jun,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.74",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:44 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Lysyanskaya:2007:AI,
  author =       "Anna Lysyanskaya",
  title =        "Authentication without Identification",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "3",
  pages =        "69--71",
  month =        may # "\slash " # jun,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.52",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:44 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Knutson:2007:BPS,
  author =       "Tina R. Knutson",
  title =        "Building Privacy into Software Products and Services",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "3",
  pages =        "72--74",
  month =        may # "\slash " # jun,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.55",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:44 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Ahmad:2007:CSS,
  author =       "David Ahmad",
  title =        "The Contemporary Software Security Landscape",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "3",
  pages =        "75--77",
  month =        may # "\slash " # jun,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.73",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:44 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Sasse:2007:REB,
  author =       "M. Angela Sasse",
  title =        "Red-Eye Blink, Bendy Shuffle, and the Yuck Factor: a
                 User Experience of Biometric Airport Systems",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "3",
  pages =        "78--81",
  month =        may # "\slash " # jun,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.69",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:44 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Gagnon:2007:SPT,
  author =       "Michael N. Gagnon and Stephen Taylor and Anup K.
                 Ghosh",
  title =        "Software Protection through Anti-Debugging",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "3",
  pages =        "82--84",
  month =        may # "\slash " # jun,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.71",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:44 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Peeters:2007:CES,
  author =       "Johan Peeters and Paul Dyson",
  title =        "Cost-Effective Security",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "3",
  pages =        "85--87",
  month =        may # "\slash " # jun,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.56",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:44 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Schneier:2007:NCS,
  author =       "Bruce Schneier",
  title =        "Nonsecurity Considerations in Security Decisions",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "3",
  pages =        "88",
  month =        may # "\slash " # jun,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.68",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:44 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Donner:2007:CE,
  author =       "Marc Donner",
  title =        "Cyberassault on Estonia",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "4",
  pages =        "4",
  month =        jul # "\slash " # aug,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.78",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:45 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Ortega:2007:NBd,
  author =       "Brandi Ortega",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "4",
  pages =        "6--9",
  month =        jul # "\slash " # aug,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.93",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:45 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{McGraw:2007:SBTb,
  author =       "Gary McGraw and Ross Anderson",
  title =        "Silver Bullet Talks with {Ross Anderson}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "4",
  pages =        "10--13",
  month =        jul # "\slash " # aug,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.94",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:45 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{English:2007:MAC,
  author =       "Jennifer English and David Coe and Rhonda Gaede and
                 David Hyde and Jeffrey Kulick",
  title =        "{MEMS}-Assisted Cryptography for {CPI} Protection",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "4",
  pages =        "14--21",
  month =        jul # "\slash " # aug,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.90",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:45 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Heikkila:2007:ESC,
  author =       "Faith M. Heikkila",
  title =        "Encryption: Security Considerations for Portable Media
                 Devices",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "4",
  pages =        "22--27",
  month =        jul # "\slash " # aug,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.80",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:45 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Jones:2007:ESV,
  author =       "Jeffrey R. Jones",
  title =        "Estimating Software Vulnerabilities",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "4",
  pages =        "28--32",
  month =        jul # "\slash " # aug,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.81",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:45 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Kim:2007:SFD,
  author =       "Jangbok Kim and Kihyun Chung and Kyunghee Choi",
  title =        "Spam Filtering With Dynamically Updated {URL}
                 Statistics",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "4",
  pages =        "33--39",
  month =        jul # "\slash " # aug,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.95",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:45 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Dimitriadis:2007:IMC,
  author =       "Christos K. Dimitriadis",
  title =        "Improving Mobile Core Network Security with
                 Honeynets",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "4",
  pages =        "40--47",
  month =        jul # "\slash " # aug,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.85",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:45 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Peisert:2007:SP,
  author =       "Sean Peisert and Matt Bishop",
  title =        "{I} Am a Scientist, Not a Philosopher!",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "4",
  pages =        "48--51",
  month =        jul # "\slash " # aug,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.84",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:45 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Franz:2007:CUT,
  author =       "Michael Franz",
  title =        "Containing the Ultimate {Trojan} Horse",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "4",
  pages =        "52--56",
  month =        jul # "\slash " # aug,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.77",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:45 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{IntVeld:2007:DSA,
  author =       "Sophie {In 't Veld}",
  title =        "Data Sharing across the {Atlantic}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "4",
  pages =        "58--61",
  month =        jul # "\slash " # aug,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.79",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:45 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Aciicmez:2007:MAC,
  author =       "Onur Acii{\c{c}}mez and Jean-Pierre Seifert and
                 {\c{C}}etin Kaya Ko{\c{c}}",
  title =        "Micro-Architectural Cryptanalysis",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "4",
  pages =        "62--64",
  month =        jul # "\slash " # aug,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.91",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:45 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Allen:2007:MWC,
  author =       "William H. Allen",
  title =        "Mixing Wheat with the Chaff: Creating Useful Test Data
                 for {IDS} Evaluation",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "4",
  pages =        "65--67",
  month =        jul # "\slash " # aug,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.92",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:45 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Arce:2007:GVM,
  author =       "Iv{\'a}n Arce",
  title =        "Ghost in the Virtual Machine",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "4",
  pages =        "68--71",
  month =        jul # "\slash " # aug,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.83",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:45 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  abstract =     "Virtual machines and virtualization technologies
                 aren't new to the computing world---they've been used
                 for at least 40 years. Recently, the availability of
                 virtualization software for low-cost computer equipment
                 and the promise of both tangible reductions on total
                 cost of ownership and rapid return on investment on
                 virtualization projects have moved many organizations
                 to adopt it as a key component of their IT strategy. In
                 this installment of Attack Trends, I'll look at this
                 technology trend with an eye toward security and
                 analyze past and present advances in offensive security
                 tools and techniques",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Bratus:2007:WHL,
  author =       "Sergey Bratus",
  title =        "What Hackers Learn that the Rest of Us Don't: Notes on
                 Hacker Curriculum",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "4",
  pages =        "72--75",
  month =        jul # "\slash " # aug,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.101",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:45 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Lesk:2007:NFL,
  author =       "Michael Lesk",
  title =        "The New Front Line: {Estonia} under Cyberassault",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "4",
  pages =        "76--79",
  month =        jul # "\slash " # aug,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.98",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:45 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Gupta:2007:UAG,
  author =       "Suvajit Gupta and Joel Winstead",
  title =        "Using Attack Graphs to Design Systems",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "4",
  pages =        "80--83",
  month =        jul # "\slash " # aug,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.100",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:45 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Bramhall:2007:UCI,
  author =       "Pete Bramhall and Marit Hansen and Kai Rannenberg and
                 Thomas Roessler",
  title =        "User-Centric Identity Management: New Trends in
                 Standardization and Regulation",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "4",
  pages =        "84--87",
  month =        jul # "\slash " # aug,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.99",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:45 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Geer:2007:EBW,
  author =       "Daniel E. Geer",
  title =        "The End of Black and White",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "4",
  pages =        "88",
  month =        jul # "\slash " # aug,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.97",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:45 MDT 2007",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Schneider:2007:TSP,
  author =       "Fred B. Schneider",
  title =        "Technology Scapegoats and Policy Saviors",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "5",
  pages =        "3--4",
  month =        sep # "\slash " # oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.124",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2007/05/msp2007050003.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Anonymous:2007:I,
  author =       "Anonymous",
  title =        "Interface",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "5",
  pages =        "5",
  month =        sep # "\slash " # oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.113",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2007/05/msp2007050005.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Pfleeger:2007:SL,
  author =       "Shari Lawrence Pfleeger",
  title =        "Spooky Lessons",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "5",
  pages =        "7",
  month =        sep # "\slash " # oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.122",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2007/05/msp2007050007.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{McGraw:2007:ISBa,
  author =       "Gary McGraw",
  title =        "Interview: {Silver Bullet} Talks with {Annie
                 Ant{\'o}n}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "5",
  pages =        "8--11",
  month =        sep # "\slash " # oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.121",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Ortega:2007:NBe,
  author =       "Brandi Ortega",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "5",
  pages =        "12--14",
  month =        sep # "\slash " # oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.115",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2007/05/msp2007050012.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Otto:2007:CDH,
  author =       "Paul N. Otto and Annie I. Ant{\'o}n and David L.
                 Baumer",
  title =        "The {ChoicePoint} Dilemma: How Data Brokers Should
                 Handle the Privacy of Personal Information",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "5",
  pages =        "15--23",
  month =        sep # "\slash " # oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.126",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Vassilev:2007:PBW,
  author =       "Apostol T. Vassilev and Bertrand du Castel and Asad M.
                 Ali",
  title =        "Personal Brokerage of {Web} Service Access",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "5",
  pages =        "24--31",
  month =        sep # "\slash " # oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.118",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Mabry:2007:USE,
  author =       "Frank J. Mabry and John R. James and Aaron J.
                 Ferguson",
  title =        "{Unicode} Steganographic Exploits: Maintaining
                 Enterprise Border Security",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "5",
  pages =        "32--39",
  month =        sep # "\slash " # oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.128",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  abstract =     "Unicode is rapidly becoming the preferred means for
                 representing symbols used in creating multimedia
                 content, especially for information that's presented in
                 multiple languages. This article discusses a Unicode
                 vulnerability that makes such content susceptible to
                 being used for creation of covert channel
                 communications. We also developed a solution
                 architecture, the Unified Secure Message Augmentation
                 (USMA) service. The USMA service incorporates rules (in
                 an XML vocabulary) that we can apply to Unicode
                 transmissions that will detect an attempt to transmit a
                 potential exploit, alert network managers to the
                 presence of the Unicode anomaly, and take action to
                 mitigate the exploit.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Mullins:2007:HCD,
  author =       "Barry E. Mullins and Timothy H. Lacey and Robert F.
                 Mills and Joseph E. Trechter and Samuel D. Bass",
  title =        "How the Cyber Defense Exercise Shaped an
                 Information-Assurance Curriculum",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "5",
  pages =        "40--49",
  month =        sep # "\slash " # oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.111",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Oshri:2007:ISS,
  author =       "Ilan Oshri and Julia Kotlarsky and Corey Hirsch",
  title =        "An Information Security Strategy for Networkable
                 Devices",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "5",
  pages =        "50--56",
  month =        sep # "\slash " # oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.104",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Caulkins:2007:OIS,
  author =       "Jonathan Caulkins and Eric D. Hough and Nancy R. Mead
                 and Hassan Osman",
  title =        "Optimizing Investments in Security Countermeasures: a
                 Practical Tool for Fixed Budgets",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "5",
  pages =        "57--60",
  month =        sep # "\slash " # oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.117",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Ryan:2007:PGE,
  author =       "Julie J. C. H. Ryan",
  title =        "Plagiarism, Graduate Education, and Information
                 Security",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "5",
  pages =        "62--65",
  month =        sep # "\slash " # oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.119",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Fraser:2007:CRU,
  author =       "David Fraser",
  title =        "The {Canadian} Response to the {USA Patriot Act}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "5",
  pages =        "66--68",
  month =        sep # "\slash " # oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.125",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Gratzer:2007:TNS,
  author =       "Vanessa Gratzer and David Naccache",
  title =        "Trust on a Nationwide Scale",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "5",
  pages =        "69--71",
  month =        sep # "\slash " # oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.127",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Solomon:2007:BPR,
  author =       "Dianne Solomon",
  title =        "Balancing Privacy and Risk in the {E}-Messaging
                 World",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "5",
  pages =        "72--75",
  month =        sep # "\slash " # oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.105",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{McGraw:2007:OGS,
  author =       "Gary McGraw and Greg Hoglund",
  title =        "Online Games and Security",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "5",
  pages =        "76--79",
  month =        sep # "\slash " # oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.116",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Dushin:2007:HMC,
  author =       "Fred Dushin and Eric Newcomer",
  title =        "Handling Multiple Credentials in a Heterogeneous {SOA}
                 Environment",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "5",
  pages =        "80--82",
  month =        sep # "\slash " # oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.110",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Dingledine:2007:DLL,
  author =       "Roger Dingledine and Nick Mathewson and Paul
                 Syverson",
  title =        "Deploying Low-Latency Anonymity: Design Challenges and
                 Social Factors",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "5",
  pages =        "83--87",
  month =        sep # "\slash " # oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.108",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Bellovin:2007:SC,
  author =       "Steve Bellovin",
  title =        "Seers and Craftspeople",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "5",
  pages =        "88",
  month =        sep # "\slash " # oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.120",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://bell.computer.org/dlcomments/",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Landwehr:2007:RTC,
  author =       "Carl E. Landwehr",
  title =        "Revolution through Competition?",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "6",
  pages =        "3--4",
  month =        nov # "\slash " # dec,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.174",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2007/06/msp2007060003.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Ortega:2007:NBf,
  author =       "Brandi Ortega",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "6",
  pages =        "6--7",
  month =        nov # "\slash " # dec,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.172",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2007/06/msp2007060006.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{McGraw:2007:ISBb,
  author =       "Gary McGraw",
  title =        "Interview: {Silver Bullet} Talks with {Mikko
                 Hypp{\"o}nen}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "6",
  pages =        "8--11",
  month =        nov # "\slash " # dec,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.177",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Stytz:2007:WN,
  author =       "Martin R. Stytz",
  title =        "What Are the Numbers?",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "6",
  pages =        "12",
  month =        nov # "\slash " # dec,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.183",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2007/06/msp2007060012.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Jakobsson:2007:WCP,
  author =       "Markus Jakobsson and Sid Stamm",
  title =        "{Web} Camouflage: Protecting Your Clients from
                 Browser-Sniffing Attacks",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "6",
  pages =        "16--24",
  month =        nov # "\slash " # dec,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.182",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Hole:2007:LNA,
  author =       "Kjell J. Hole and Vebj{\o}rn Moen and Andr{\'e} N.
                 Klingsheim and Knut M. Tande",
  title =        "Lessons from the {Norwegian} {ATM} System",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "6",
  pages =        "25--31",
  month =        nov # "\slash " # dec,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.168",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Piazzalunga:2007:SSM,
  author =       "Ugo Piazzalunga and Paolo Salvaneschi and Francesco
                 Balducci and Pablo Jacomuzzi and Cristiano Moroncelli",
  title =        "Security Strength Measurement for Dongle-Protected
                 Software",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "6",
  pages =        "32--40",
  month =        nov # "\slash " # dec,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.176",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Li:2007:CAS,
  author =       "Ninghui Li and Ji-Won Byun and Elisa Bertino",
  title =        "A Critique of the {ANSI Standard} on Role-Based Access
                 Control",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "6",
  pages =        "41--49",
  month =        nov # "\slash " # dec,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.158",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Ferraiolo:2007:RSR,
  author =       "David Ferraiolo and Rick Kuhn and Ravi Sandhu",
  title =        "{RBAC} Standard Rationale: Comments on {``A Critique
                 of the ANSI Standard on Role-Based Access Control''}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "6",
  pages =        "51--53",
  month =        nov # "\slash " # dec,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.173",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Petratos:2007:WIS,
  author =       "Pythagoras Petratos",
  title =        "Weather, Information Security, and Markets",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "6",
  pages =        "54--57",
  month =        nov # "\slash " # dec,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.181",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Power:2007:DCP,
  author =       "E. Michael Power",
  title =        "Developing a Culture of Privacy: a Case Study",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "6",
  pages =        "58--60",
  month =        nov # "\slash " # dec,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.163",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Vaudenay:2007:PT,
  author =       "Serge Vaudenay",
  title =        "{E}-Passport Threats",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "6",
  pages =        "61--64",
  month =        nov # "\slash " # dec,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.164",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Ford:2007:HSI,
  author =       "Richard Ford and William H. Allen",
  title =        "How Not to Be Seen {II}: The Defenders Fight Back",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "6",
  pages =        "65--68",
  month =        nov # "\slash " # dec,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.166",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{McKinney:2007:VB,
  author =       "David McKinney",
  title =        "Vulnerability Bazaar",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "6",
  pages =        "69--73",
  month =        nov # "\slash " # dec,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.180",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Perrone:2007:CCD,
  author =       "Luiz Felipe Perrone",
  title =        "Could a Caveman Do It? {The} Surprising Potential of
                 Simple Attacks",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "6",
  pages =        "74--77",
  month =        nov # "\slash " # dec,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.162",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Stytz:2007:WEW,
  author =       "Martin R. Stytz",
  title =        "Who Are the Experts, and What Have They Done for Us
                 Lately?",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "6",
  pages =        "78--80",
  month =        nov # "\slash " # dec,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.184",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Steven:2007:M,
  author =       "John Steven and Gunnar Peterson",
  title =        "{Metricon 2.0}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "6",
  pages =        "81--83",
  month =        nov # "\slash " # dec,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.171",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Bishop:2007:APT,
  author =       "Matt Bishop",
  title =        "About Penetration Testing",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "6",
  pages =        "84--87",
  month =        nov # "\slash " # dec,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.159",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Schneier:2007:DSI,
  author =       "Bruce Schneier",
  title =        "The Death of the Security Industry",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "5",
  number =       "6",
  pages =        "88",
  month =        nov # "\slash " # dec,
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2007.179",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Donner:2008:CLB,
  author =       "Marc Donner",
  title =        "Charge of the Light Brigade",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "1",
  pages =        "5--5",
  month =        jan # "\slash " # feb,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.7",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2008/01/msp2008010005.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Ortega:2008:NBa,
  author =       "Brandi Ortega",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "1",
  pages =        "6--8",
  month =        jan # "\slash " # feb,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.16",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2008/01/msp2008010006.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Spafford:2008:JPA,
  author =       "Eugene Spafford",
  title =        "{James P. Anderson}: An Information Security Pioneer",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "1",
  pages =        "9",
  month =        jan # "\slash " # feb,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.15",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2008/01/msp2008010009.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{McGraw:2008:ISBa,
  author =       "Gary McGraw",
  title =        "Interview: {Silver Bullet} Talks with {Eugene
                 Spafford}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "1",
  pages =        "10--15",
  month =        jan # "\slash " # feb,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.22",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2008/01/msp2008010010.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Bellovin:2008:IAT,
  author =       "Steven M. Bellovin and Terry V. Benzel and Bob Blakley
                 and Dorothy E. Denning and Whitfield Diffie and Jeremy
                 Epstein and Paulo Ver{\'\i}ssimo",
  title =        "{Information Assurance Technology Forecast 2008}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "1",
  pages =        "16--23",
  month =        jan # "\slash " # feb,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.13",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Bellovin:2008:RCS,
  author =       "Steven M. Bellovin and Matt Blaze and Whitfield Diffie
                 and Susan Landau and Peter G. Neumann and Jennifer
                 Rexford",
  title =        "Risking Communications Security: Potential Hazards of
                 the {Protect America Act}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "1",
  pages =        "24--33",
  month =        jan # "\slash " # feb,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.17",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Pearson:2008:SIT,
  author =       "Siani Pearson and Marco Casassa-Mont and Manny Novoa",
  title =        "Securing Information Transfer in Distributed Computing
                 Environments",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "1",
  pages =        "34--42",
  month =        jan # "\slash " # feb,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.19",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Chakrabarti:2008:GCS,
  author =       "Anirban Chakrabarti and Anish Damodaran and Shubhashis
                 Sengupta",
  title =        "{Grid} Computing Security: a Taxonomy",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "1",
  pages =        "44--51",
  month =        jan # "\slash " # feb,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.12",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Leversage:2008:ESM,
  author =       "David John Leversage and Eric James Byres",
  title =        "Estimating a System's Mean Time-to-Compromise",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "1",
  pages =        "52--60",
  month =        jan # "\slash " # feb,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.9",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Greitzer:2008:CIC,
  author =       "Frank L. Greitzer and Andrew P. Moore and Dawn M.
                 Cappelli and Dee H. Andrews and Lynn A. Carroll and
                 Thomas D. Hull",
  title =        "Combating the Insider Cyber Threat",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "1",
  pages =        "61--64",
  month =        jan # "\slash " # feb,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.8",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Carbone:2008:TV,
  author =       "Martim Carbone and Diego Zamboni and Wenke Lee",
  title =        "Taming Virtualization",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "1",
  pages =        "65--67",
  month =        jan # "\slash " # feb,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.24",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Kolupaev:2008:CHV,
  author =       "Aleksey Kolupaev and Juriy Ogijenko",
  title =        "{CAPTCHAs}: Humans vs. Bots",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "1",
  pages =        "68--70",
  month =        jan # "\slash " # feb,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.6",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Howard:2008:BSE,
  author =       "Michael Howard",
  title =        "Becoming a Security Expert",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "1",
  pages =        "71--73",
  month =        jan # "\slash " # feb,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.3",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Ahmad:2008:CDD,
  author =       "Dave Ahmad",
  title =        "The Confused Deputy and the Domain Hijacker",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "1",
  pages =        "74--77",
  month =        jan # "\slash " # feb,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.25",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Lesk:2008:FSI,
  author =       "Michael Lesk",
  title =        "Forum Shopping on the {Internet}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "1",
  pages =        "78--80",
  month =        jan # "\slash " # feb,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.10",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Bonver:2008:STI,
  author =       "Edward Bonver",
  title =        "Security Testing of Internal Tools",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "1",
  pages =        "81--83",
  month =        jan # "\slash " # feb,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.21",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Coyne:2008:RII,
  author =       "Ed Coyne and Tim Weil",
  title =        "An {RBAC} Implementation and Interoperability
                 Standard: The {INCITS} Cyber Security 1.1 Model",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "1",
  pages =        "84--87",
  month =        jan # "\slash " # feb,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.2",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Geer:2008:WWG,
  author =       "Dan Geer and Daniel Conway",
  title =        "What We Got for {Christmas}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "1",
  pages =        "88",
  month =        jan # "\slash " # feb,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.26",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://bell.computer.org/dlcomments/",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Donner:2008:LEI,
  author =       "Marc Donner",
  title =        "Lessons from Electrification for Identification",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "2",
  pages =        "3",
  month =        mar # "\slash " # apr,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.38",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2008/02/msp2008020003.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Garfinkel:2008:SFF,
  author =       "Simson Garfinkel",
  title =        "Sharp Figures, Fuzzy Purpose",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "2",
  pages =        "5",
  month =        mar # "\slash " # apr,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.45",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2008/02/msp2008020005.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{McGraw:2008:ISBb,
  author =       "Gary McGraw",
  title =        "Interview: {Silver Bullet} Talks with {Ed Amoroso}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "2",
  pages =        "6--9",
  month =        mar # "\slash " # apr,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.46",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2008/02/msp2008020006.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Ortega:2008:NBb,
  author =       "Brandi Ortega",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "2",
  pages =        "10--12",
  month =        mar # "\slash " # apr,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.40",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2008/02/msp2008020010.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Landau:2008:IPS,
  author =       "Susan Landau and Deirdre K. Mulligan",
  title =        "{I}'m {Pc01002/SpringPeeper\slash ED288l.6}; Who are
                 You?",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "2",
  pages =        "13--15",
  month =        mar # "\slash " # apr,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.34",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2008/02/msp2008020013.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Maler:2008:VIO,
  author =       "Eve Maler and Drummond Reed",
  title =        "The {Venn} of Identity: Options and Issues in
                 Federated Identity Management",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "2",
  pages =        "16--23",
  month =        mar # "\slash " # apr,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.50",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Dhamija:2008:SFI,
  author =       "Rachna Dhamija and Lisa Dusseault",
  title =        "The Seven Flaws of Identity Management: Usability and
                 Security Challenges",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "2",
  pages =        "24--29",
  month =        mar # "\slash " # apr,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.49",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Wayman:2008:BIM,
  author =       "James L. Wayman",
  title =        "Biometrics in Identity Management Systems",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "2",
  pages =        "30--37",
  month =        mar # "\slash " # apr,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.28",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Hansen:2008:PIM,
  author =       "Marit Hansen and Ari Schwartz and Alissa Cooper",
  title =        "Privacy and Identity Management",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "2",
  pages =        "38--45",
  month =        mar # "\slash " # apr,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.41",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Acquisti:2008:IMP,
  author =       "Alessandro Acquisti",
  title =        "Identity Management, Privacy, and Price
                 Discrimination",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "2",
  pages =        "46--50",
  month =        mar # "\slash " # apr,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.35",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{McKenzie:2008:UCI,
  author =       "Robin McKenzie and Malcolm Crompton and Colin Wallis",
  title =        "Use Cases for Identity Management in {E}-Government",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "2",
  pages =        "51--57",
  month =        mar # "\slash " # apr,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.51",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Dube:2008:HRE,
  author =       "Thomas E. Dube and Bobby D. Birrer and Richard A.
                 Raines and Rusty O. Baldwin and Barry E. Mullins and
                 Robert W. Bennington and Christopher E. Reuter",
  title =        "Hindering Reverse Engineering: Thinking Outside the
                 Box",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "2",
  pages =        "58--65",
  month =        mar # "\slash " # apr,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.33",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Jakobsson:2008:WHP,
  author =       "Markus Jakobsson and Nathaniel Johnson and Peter
                 Finn",
  title =        "Why and How to Perform Fraud Experiments",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "2",
  pages =        "66--68",
  month =        mar # "\slash " # apr,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.52",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Levieil:2008:CTC,
  author =       "Eric Levieil and David Naccache",
  title =        "Cryptographic Test Correction",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "2",
  pages =        "69--71",
  month =        mar # "\slash " # apr,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.30",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Carvalho:2008:SMA,
  author =       "Marco Carvalho",
  title =        "Security in Mobile Ad Hoc Networks",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "2",
  pages =        "72--75",
  month =        mar # "\slash " # apr,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.44",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{McKinney:2008:NHV,
  author =       "David McKinney",
  title =        "New Hurdles for Vulnerability Disclosure",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "2",
  pages =        "76--78",
  month =        mar # "\slash " # apr,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.39",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Locasto:2008:HDW,
  author =       "Michael E. Locasto and Angelos Stavrou",
  title =        "The Hidden Difficulties of Watching and Rebuilding
                 Networks",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "2",
  pages =        "79--82",
  month =        mar # "\slash " # apr,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.48",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Harding:2008:DSA,
  author =       "Patrick Harding and Leif Johansson and Nate
                 Klingenstein",
  title =        "{Dynamic Security Assertion Markup Language}:
                 Simplifying Single Sign-On",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "2",
  pages =        "83--85",
  month =        mar # "\slash " # apr,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.31",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Geer:2008:BIM,
  author =       "Daniel E. {Geer, Jr.} and Daniel G. Conway",
  title =        "Beware the {IDs of March}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "2",
  pages =        "87",
  month =        mar # "\slash " # apr,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.27",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Bellovin:2008:SC,
  author =       "Steve Bellovin",
  title =        "Security by Checklist",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "2",
  pages =        "88",
  month =        mar # "\slash " # apr,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.43",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://bell.computer.org/dlcomments/",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Landwehr:2008:S,
  author =       "Carl E. Landwehr",
  title =        "Up Scope",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "3",
  pages =        "3--4",
  month =        may # "\slash " # jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.76",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2008/03/msp2008030003.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Ortega:2008:NBc,
  author =       "Brandi Ortega",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "3",
  pages =        "6--8",
  month =        may # "\slash " # jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.69",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{McGraw:2008:ISBc,
  author =       "Gary McGraw",
  title =        "Interview: {Silver Bullet} Talks with {Jon Swartz}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "3",
  pages =        "9--11",
  month =        may # "\slash " # jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.72",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Rubin:2008:NRR,
  author =       "Aviel D. Rubin and David R. Jefferson",
  title =        "New Research Results for Electronic Voting",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "3",
  pages =        "12--13",
  month =        may # "\slash " # jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.68",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2008/03/msp2008030012.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Santin:2008:TBB,
  author =       "Altair O. Santin and Regivaldo G. Costa and Carlos A.
                 Maziero",
  title =        "A Three-Ballot-Based Secure Electronic Voting System",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "3",
  pages =        "14--21",
  month =        may # "\slash " # jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.56",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Yasinsac:2008:DCR,
  author =       "Alec Yasinsac and Matt Bishop",
  title =        "The Dynamics of Counting and Recounting Votes",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "3",
  pages =        "22--29",
  month =        may # "\slash " # jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.75",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Ansari:2008:EEV,
  author =       "Nirwan Ansari and Pitipatana Sakarindr and Ehsan
                 Haghani and Chao Zhang and Aridaman K. Jain and Yun Q.
                 Shi",
  title =        "Evaluating Electronic Voting Systems Equipped with
                 Voter-Verified Paper Records",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "3",
  pages =        "30--39",
  month =        may # "\slash " # jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.62",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Chaum:2008:SEE,
  author =       "David Chaum and Aleks Essex and Richard Carback and
                 Jeremy Clark and Stefan Popoveniuc and Alan Sherman and
                 Poorvi Vora",
  title =        "Scantegrity: End-to-End Voter-Verifiable Optical-Scan
                 Voting",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "3",
  pages =        "40--46",
  month =        may # "\slash " # jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.70",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Goirizelaia:2008:OSV,
  author =       "I{\~n}aki Goirizelaia and Ted Selker and Maider Huarte
                 and Juanjo Unzilla",
  title =        "An Optical Scan {E}-Voting System based on {N}-Version
                 Programming",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "3",
  pages =        "47--53",
  month =        may # "\slash " # jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.57",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Batten:2008:TDF,
  author =       "Lynn Batten and Lei Pan",
  title =        "Teaching Digital Forensics to Undergraduate Students",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "3",
  pages =        "54--56",
  month =        may # "\slash " # jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.74",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Hughes:2008:CNP,
  author =       "Gordon Hughes and Sophie Dawson and Tim Brookes",
  title =        "Considering New Privacy Laws in {Australia}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "3",
  pages =        "57--59",
  month =        may # "\slash " # jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.60",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Burr:2008:NHC,
  author =       "William E. Burr",
  title =        "A New Hash Competition",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "3",
  pages =        "60--62",
  month =        may # "\slash " # jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.55",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Michener:2008:CPM,
  author =       "John R. Michener",
  title =        "Common Permissions in {Microsoft Windows Server 2008}
                 and {Windows Vista}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "3",
  pages =        "63--67",
  month =        may # "\slash " # jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.59",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{ODonnell:2008:WMA,
  author =       "Adam J. O'Donnell",
  title =        "When Malware Attacks (Anything but {Windows})",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "3",
  pages =        "68--70",
  month =        may # "\slash " # jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.78",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Bratus:2008:WDS,
  author =       "Sergey Bratus and Chris Masone and Sean W. Smith",
  title =        "Why Do Street-Smart People Do Stupid Things Online?",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "3",
  pages =        "71--74",
  month =        may # "\slash " # jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.79",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Lesk:2008:DRM,
  author =       "Michael Lesk",
  title =        "Digital Rights Management and Individualized Pricing",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "3",
  pages =        "76--79",
  month =        may # "\slash " # jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.61",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Epstein:2008:SLL,
  author =       "Jeremy Epstein",
  title =        "Security Lessons Learned from {Soci{\'e}t{\'e}
                 G{\'e}n{\'e}rale}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "3",
  pages =        "80--82",
  month =        may # "\slash " # jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.71",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Frankel:2008:IPV,
  author =       "Sheila Frankel and David Green",
  title =        "{Internet Protocol Version 6}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "3",
  pages =        "83--86",
  month =        may # "\slash " # jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.65",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Geer:2008:LAT,
  author =       "Daniel E. {Geer, Jr.}",
  title =        "Learn by Analogy or Die Trying",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "3",
  pages =        "88, 87",
  month =        may # "\slash " # jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.66",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "http://computer.org/security/sp2003/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://bell.computer.org/dlcomments/",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Schneider:2008:NNV,
  author =       "Fred B. Schneider",
  title =        "Network Neutrality versus {Internet}
                 Trustworthiness?",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "4",
  pages =        "3--4",
  month =        jul # "\slash " # aug,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.90",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 6 14:53:07 MDT 2008",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{McGraw:2008:ISBd,
  author =       "Gary McGraw",
  title =        "Interview: {Silver Bullet} Talks with {Adam
                 Shostack}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "4",
  pages =        "6--10",
  month =        jul # "\slash " # aug,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.104",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 6 14:53:07 MDT 2008",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Ortega:2008:NBd,
  author =       "Brandi Ortega",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "4",
  pages =        "11--13",
  month =        jul # "\slash " # aug,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.91",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 6 14:53:07 MDT 2008",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Hole:2008:OWN,
  author =       "Kjell J. Hole and Lars-Helge Netland and Yngve Espelid
                 and Andr{\'e} N. Klingsheim and Hallvar Helleseth and
                 Jan B. Henriksen",
  title =        "Open Wireless Networks on University Campuses",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "4",
  pages =        "14--20",
  month =        jul # "\slash " # aug,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.92",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 6 14:53:07 MDT 2008",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Razaq:2008:SGR,
  author =       "Abdul (Ali) Razaq and Wai Tong Luk and Kam Man Shum
                 and Lee Ming Cheng and Kai Ning Yung",
  title =        "Second-Generation {RFID}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "4",
  pages =        "21--27",
  month =        jul # "\slash " # aug,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.94",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 6 14:53:07 MDT 2008",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Pai:2008:TCS,
  author =       "Sameer Pai and Sergio Bermudez and Stephen B. Wicker
                 and Marci Meingast and Tanya Roosta and Shankar Sastry
                 and Deirdre K. Mulligan",
  title =        "Transactional Confidentiality in Sensor Networks",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "4",
  pages =        "28--35",
  month =        jul # "\slash " # aug,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.107",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 6 14:53:07 MDT 2008",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Weigold:2008:RCA,
  author =       "Thomas Weigold and Thorsten Kramp and Michael
                 Baentsch",
  title =        "Remote Client Authentication",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "4",
  pages =        "36--43",
  month =        jul # "\slash " # aug,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.93",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 6 14:53:07 MDT 2008",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Pretschner:2008:UCE,
  author =       "Alexander Pretschner and Manuel Hilty and Florian
                 Sch{\"u}tz and Christian Schaefer and Thomas Walter",
  title =        "Usage Control Enforcement: Present and Future",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "4",
  pages =        "44--53",
  month =        jul # "\slash " # aug,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.101",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 6 14:53:07 MDT 2008",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Rostad:2008:LFF,
  author =       "Lillian R{\o}stad and Gunnar Ren{\'e} {\O}ie and Inger
                 Anne T{\o}ndel and Per H{\aa}kon Meland",
  title =        "Learning by Failing (and Fixing)",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "4",
  pages =        "54--56",
  month =        jul # "\slash " # aug,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.89",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 6 14:53:07 MDT 2008",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Anonymous:2008:CPO,
  author =       "Anonymous",
  title =        "Call for Papers: {Online Gaming Security}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "4",
  pages =        "57--57",
  month =        jul # "\slash " # aug,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.81",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 6 14:53:07 MDT 2008",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{ElEmam:2008:HIH,
  author =       "Khaled {El Emam}",
  title =        "Heuristics for De-identifying Health Data",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "4",
  pages =        "58--61",
  month =        jul # "\slash " # aug,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.84",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 6 14:53:07 MDT 2008",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Troutman:2008:VMM,
  author =       "Justin Troutman",
  title =        "The Virtues of Mature and Minimalist Cryptography",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "4",
  pages =        "62--65",
  month =        jul # "\slash " # aug,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.99",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 6 14:53:07 MDT 2008",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Predd:2008:IBB,
  author =       "Joel Predd and Shari Lawrence Pfleeger and Jeffrey
                 Hunker and Carla Bulford",
  title =        "Insiders Behaving Badly",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "4",
  pages =        "66--70",
  month =        jul # "\slash " # aug,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.87",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 6 14:53:07 MDT 2008",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Anonymous:2008:MA,
  author =       "Anonymous",
  title =        "2008 Membership advertisement",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "4",
  pages =        "71--73",
  month =        jul # "\slash " # aug,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.103",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 6 14:53:07 MDT 2008",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Landau:2008:SPL,
  author =       "Susan Landau",
  title =        "Security and Privacy Landscape in Emerging
                 Technologies",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "4",
  pages =        "74--77",
  month =        jul # "\slash " # aug,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.95",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 6 14:53:07 MDT 2008",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Geer:2008:SA,
  author =       "Daniel E. {Geer, Jr.} and Daniel G. Conway",
  title =        "Strong Attractors",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "4",
  pages =        "78--79",
  month =        jul # "\slash " # aug,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.105",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 6 14:53:07 MDT 2008",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Schneier:2008:HHB,
  author =       "Bruce Schneier",
  title =        "How the Human Brain Buys Security",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "4",
  pages =        "80--80",
  month =        jul # "\slash " # aug,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.85",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 6 14:53:07 MDT 2008",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Anonymous:2008:CNS,
  author =       "Anonymous",
  title =        "Corporate Network Security advertisement",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "4",
  pages =        "c3--c3",
  month =        jul # "\slash " # aug,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.82",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 6 14:53:07 MDT 2008",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Anonymous:2008:FC,
  author =       "Anonymous",
  title =        "Front Cover",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "4",
  pages =        "c1--c1",
  month =        jul # "\slash " # aug,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.83",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 6 14:53:07 MDT 2008",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Anonymous:2008:ISW,
  author =       "Anonymous",
  title =        "{IT Security World} advertisement",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "4",
  pages =        "c2--c2",
  month =        jul # "\slash " # aug,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.88",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 6 14:53:07 MDT 2008",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Anonymous:2008:USS,
  author =       "Anonymous",
  title =        "{Usenix Security Symposium} advertisement",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "4",
  pages =        "c4--c4",
  month =        jul # "\slash " # aug,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.102",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 6 14:53:07 MDT 2008",
  bibsource =    "http://ieeexplore.ieee.org/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Landwehr:2008:ECA,
  author =       "Carl E. Landwehr",
  title =        "From the {Editors}: Cybersecurity and Artificial
                 Intelligence: From Fixing the Plumbing to Smart Water",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "5",
  pages =        "3--4",
  month =        sep # "\slash " # oct,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.113",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Stytz:2008:BRS,
  author =       "Martin R. Stytz",
  title =        "Book Reviews: The Shape of Crimeware to Come",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "5",
  pages =        "5--5",
  month =        sep # "\slash " # oct,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.130",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{McGraw:2008:ISBe,
  author =       "Gary McGraw",
  title =        "Interview: {Silver Bullet} Talks with {Bill
                 Cheswick}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "5",
  pages =        "7--11",
  month =        sep # "\slash " # oct,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.127",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Ortega:2008:NBe,
  author =       "Brandi Ortega",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "5",
  pages =        "12--13",
  month =        sep # "\slash " # oct,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.108",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{King:2008:GEI,
  author =       "Samuel T. King and Sean W. Smith",
  title =        "{Guest Editors}' Introduction: Virtualization and
                 Security: Back to the Future",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "5",
  pages =        "15--15",
  month =        sep # "\slash " # oct,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.136",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Karger:2008:VVM,
  author =       "Paul A. Karger and David R. Safford",
  title =        "Virtualization: {I/O} for Virtual Machine Monitors:
                 Security and Performance Issues",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "5",
  pages =        "16--23",
  month =        sep # "\slash " # oct,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.119",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Perez:2008:VHB,
  author =       "Ronald Perez and Leendert van Doorn and Reiner
                 Sailer",
  title =        "Virtualization and Hardware-Based Security",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "5",
  pages =        "24--31",
  month =        sep # "\slash " # oct,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.135",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Nance:2008:VMI,
  author =       "Kara Nance and Matt Bishop and Brian Hay",
  title =        "Virtual Machine Introspection: Observation or
                 Interference?",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "5",
  pages =        "32--37",
  month =        sep # "\slash " # oct,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.134",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Ryan:2008:RMP,
  author =       "Julie J. C. H. Ryan and Daniel J. Ryan",
  title =        "Risk Management: Performance Metrics for Information
                 Security Risk Management",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "5",
  pages =        "38--44",
  month =        sep # "\slash " # oct,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.125",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Kotzanikolaou:2008:DPD,
  author =       "Panayiotis Kotzanikolaou",
  title =        "Data Privacy: Data Retention and Privacy in Electronic
                 Communications",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "5",
  pages =        "46--52",
  month =        sep # "\slash " # oct,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.114",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Bishop:2008:EIA,
  author =       "Matt Bishop and Deborah A. Frincke",
  title =        "Education: Information Assurance Education: a Work In
                 Progress",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "5",
  pages =        "54--57",
  month =        sep # "\slash " # oct,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.123",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{McLaughlin:2008:PIC,
  author =       "Peter McLaughlin",
  title =        "Privacy Interests: Cross-Border Data Flows and
                 Increased Enforcement",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "5",
  pages =        "58--61",
  month =        sep # "\slash " # oct,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.111",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Martin:2008:CCI,
  author =       "Luther Martin",
  title =        "Crypto Corner: Identity-Based Encryption and Beyond",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "5",
  pages =        "62--64",
  month =        sep # "\slash " # oct,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.120",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Yan:2008:BTR,
  author =       "Wei Yan and Zheng Zhang and Nirwan Ansari",
  title =        "Basic Training: Revealing Packed Malware",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "5",
  pages =        "65--69",
  month =        sep # "\slash " # oct,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.126",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Ahmad:2008:ATT,
  author =       "David Ahmad",
  title =        "Attack Trends: Two Years of Broken Crypto: {Debian}'s
                 Dress Rehearsal for a Global {PKI} Compromise",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "5",
  pages =        "70--73",
  month =        sep # "\slash " # oct,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.131",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  abstract =     "A patch to the OpenSSL package maintained by Debian
                 GNU/Linux (an operating system composed of free and
                 open source software that can be used as a desktop or
                 server OS) submitted in 2006 weakened its pseudo-random
                 number generator (PRNG), a critical component for
                 secure key generation. Putting both servers and users
                 at risk, this vulnerability affected OpenSSH, Apache
                 (mod\_ssl), the onion router (TOR), OpenVPN, and other
                 applications. In this article, the author examines
                 these issue and its consequences. OpenSSL is an open
                 source library implementing the SSL (Secure Socket
                 Layer) and TLS (Transport Layer Security) protocols.
                 Several widely deployed applications on many OSs rely
                 on it for secure communications, particularly Linux and
                 BSD-based systems. Where in use, it's a critical part
                 of the OS's security subsystem.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Viecco:2008:SSL,
  author =       "Camilo Viecco and Jean Camp",
  title =        "Secure Systems: a Life or Death {InfoSec} Subversion",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "5",
  pages =        "74--76",
  month =        sep # "\slash " # oct,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.109",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Trope:2008:DPH,
  author =       "Roland L. Trope and Monique Witt and William J.
                 Adams",
  title =        "Digital Protection: Hardening the Target",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "5",
  pages =        "77--81",
  month =        sep # "\slash " # oct,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.118",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Bonver:2008:BSD,
  author =       "Edward Bonver and Michael Cohen",
  title =        "Building Security In: Developing and Retaining a
                 Security Testing Mindset",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "5",
  pages =        "82--85",
  month =        sep # "\slash " # oct,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.115",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Geer:2008:GMT,
  author =       "Daniel E. {Geer, Jr.} and Daniel G. Conway",
  title =        "For Good Measure: Type {II} Reverse Engineering",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "5",
  pages =        "86--87",
  month =        sep # "\slash " # oct,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.132",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Bellovin:2008:CTP,
  author =       "Steven M. Bellovin",
  title =        "Clear Text: The Puzzle of Privacy",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "5",
  pages =        "88--88",
  month =        sep # "\slash " # oct,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.129",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  abstract =     "A number of recent news stories have made me wonder
                 more about privacy. It's not just that the threats to
                 privacy are increasing; rather, the problem is that the
                 countervailing forces are becoming very much stronger.
                 Was Scott McNealy right when he told us that we had no
                 privacy and that we should just ``get over it''?",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Michael:2008:EGT,
  author =       "Bret Michael",
  title =        "From the {Editors}: Are Governments Up to the Task?",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "6",
  pages =        "4--5",
  month =        nov # "\slash " # dec,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.137",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{McGraw:2008:ISBf,
  author =       "Gary McGraw",
  title =        "Interview: {Silver Bullet} Talks with {Matt Bishop}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "6",
  pages =        "6--10",
  month =        nov # "\slash " # dec,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.153",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Saydjari:2008:SLC,
  author =       "O. Sami Saydjari",
  title =        "Spotlight: Launching into the Cyberspace Race: An
                 Interview with {Melissa E. Hathaway}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "6",
  pages =        "11--17",
  month =        nov # "\slash " # dec,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.147",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Figueroa:2008:NSC,
  author =       "James Figueroa and Brandi Ortega",
  title =        "News: Shaking Up the Cybersecurity Landscape",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "6",
  pages =        "18--21",
  month =        nov # "\slash " # dec,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.152",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Trellue:2008:GEI,
  author =       "Ron Trellue and Charles C. Palmer",
  title =        "{Guest Editors}' Introduction: Process Control System
                 Security: Bootstrapping a Legacy",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "6",
  pages =        "22--23",
  month =        nov # "\slash " # dec,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.148",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Brandle:2008:PCS,
  author =       "Markus Br{\"a}ndle and Martin Naedele",
  title =        "Process Control Security: Security for Process Control
                 Systems: An Overview",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "6",
  pages =        "24--29",
  month =        nov # "\slash " # dec,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.150",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Nicol:2008:UGN,
  author =       "David M. Nicol and William H. Sanders and Sankalp
                 Singh and Mouna Seri",
  title =        "Usable Global Network Access Policy for Process
                 Control Systems",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "6",
  pages =        "30--36",
  month =        nov # "\slash " # dec,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.159",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Parks:2008:VAC,
  author =       "Raymond C. Parks and Edmond Rogers",
  title =        "Vulnerability Assessment for Critical Infrastructure
                 Control Systems",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "6",
  pages =        "37--43",
  month =        nov # "\slash " # dec,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.160",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Bessani:2008:CWC,
  author =       "Alysson Neves Bessani and Paulo Sousa and Miguel
                 Correia and Nuno Ferreira Neves and Paulo
                 Ver{\'\i}ssimo",
  title =        "The Crutial Way of Critical Infrastructure
                 Protection",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "6",
  pages =        "44--51",
  month =        nov # "\slash " # dec,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.158",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Mathieu:2008:VIS,
  author =       "Bertrand Mathieu and Saverio Niccolini and Dorgham
                 Sisalem",
  title =        "{Voice over IP}: {SDRS}: a {Voice-over-IP} Spam
                 Detection and Reaction System",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "6",
  pages =        "52--59",
  month =        nov # "\slash " # dec,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.149",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  abstract =     "An expected surge in spam over Internet telephony
                 (SPIT) requires a solution that incorporates multiple
                 detection methods and reaction mechanisms, enabling
                 greater flexibility and customization. Our solution
                 framework combines well-known detection schemes, such
                 as blacklists and white lists, with methods based on
                 statistical traffic analysis, such as the number and
                 duration of calls a user conducts.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Balfe:2008:TCC,
  author =       "Shane Balfe and Eimear Gallery and Chris J. Mitchell
                 and Kenneth G. Paterson",
  title =        "Trusted Computing: Challenges for Trusted Computing",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "6",
  pages =        "60--66",
  month =        nov # "\slash " # dec,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.138",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Chan:2008:ETC,
  author =       "Yuen-Yan Chan and Victor K. Wei",
  title =        "Education: Teaching for Conceptual Change in Security
                 Awareness",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "6",
  pages =        "67--69",
  month =        nov # "\slash " # dec,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.157",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Nahra:2008:PIH,
  author =       "Kirk J. Nahra",
  title =        "Privacy Interests: {HIPAA} Security Enforcement Is
                 Here",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "6",
  pages =        "70--72",
  month =        nov # "\slash " # dec,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.143",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Chu:2008:BTI,
  author =       "Chengyun Chu",
  title =        "Basic Training: Introduction to {Microsoft .NET}
                 Security",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "6",
  pages =        "73--78",
  month =        nov # "\slash " # dec,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.146",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Grossman:2008:ATF,
  author =       "Jeremiah Grossman",
  title =        "Attack Trends: Five User-Customizable {Web} Site
                 Security Features",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "6",
  pages =        "79--81",
  month =        nov # "\slash " # dec,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.141",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Steven:2008:BSS,
  author =       "John Steven",
  title =        "Building Security In: State of Application
                 Assessment",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "6",
  pages =        "82--85",
  month =        nov # "\slash " # dec,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.155",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Geer:2008:GMS,
  author =       "Daniel E. {Geer, Jr.} and Daniel G. Conway",
  title =        "For Good Measure: Security Is a Subset of
                 Reliability",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "6",
  pages =        "86--87",
  month =        nov # "\slash " # dec,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.151",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Geer:2008:CTC,
  author =       "Daniel E. {Geer, Jr.}",
  title =        "Clear Text: Complexity Is the Enemy",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "6",
  pages =        "88--88",
  month =        nov # "\slash " # dec,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.139",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Anonymous:2008:AI,
  author =       "Anonymous",
  title =        "Annual Index",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "6",
  number =       "6",
  pages =        "0--0",
  month =        nov # "\slash " # dec,
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2008.161",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Donner:2009:ERE,
  author =       "Marc Donner",
  title =        "From the {Editors}: Reading (with) the Enemy",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "1",
  pages =        "3--3",
  month =        jan # "\slash " # feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.16",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Ortega:2009:NBS,
  author =       "Brandi Ortega",
  title =        "News Briefs: Shaking Up the Cybersecurity Landscape",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "1",
  pages =        "5--6",
  month =        jan # "\slash " # feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.19",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{McGraw:2009:ISBa,
  author =       "Gary McGraw",
  title =        "Interview: {Silver Bullet} Talks with {Gunnar
                 Peterson}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "1",
  pages =        "7--11",
  month =        jan # "\slash " # feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.20",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Lala:2009:GEI,
  author =       "Jaynarayan H. Lala and Fred B. Schneider",
  title =        "{Guest Editors}' Introduction: {IT} Monoculture
                 Security Risks and Defenses",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "1",
  pages =        "12--13",
  month =        jan # "\slash " # feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.11",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Birman:2009:IMM,
  author =       "Kenneth P. Birman and Fred B. Schneider",
  title =        "{IT} Monoculture: The Monoculture Risk Put into
                 Context",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "1",
  pages =        "14--17",
  month =        jan # "\slash " # feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.24",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Keromytis:2009:RIS,
  author =       "Angelos D. Keromytis",
  title =        "Randomized Instruction Sets and Runtime Environments
                 Past Research and Future Directions",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "1",
  pages =        "18--25",
  month =        jan # "\slash " # feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.15",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Williams:2009:STD,
  author =       "Daniel Williams and Wei Hu and Jack W. Davidson and
                 Jason D. Hiser and John C. Knight and Anh
                 Nguyen-Tuong",
  title =        "Security through Diversity: Leveraging Virtual Machine
                 Technology",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "1",
  pages =        "26--33",
  month =        jan # "\slash " # feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.18",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Hole:2009:APR,
  author =       "Kjell J. Hole and Andr{\'e} N. Klingsheim and
                 Lars-Helge Netland and Yngve Espelid and Thomas
                 Tj{\O}stheim and Vebj{\O}rn Moen",
  title =        "Assessing {PKI}: Risk Assessment of a {National
                 Security Infrastructure}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "1",
  pages =        "34--41",
  month =        jan # "\slash " # feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.17",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Cukier:2009:VRP,
  author =       "Michel Cukier and Susmit Panjwani",
  title =        "Vulnerability Remediation: Prioritizing Vulnerability
                 Remediation by Determining Attacker-Targeted
                 Vulnerabilities",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "1",
  pages =        "42--48",
  month =        jan # "\slash " # feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.13",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Enck:2009:FUA,
  author =       "William Enck and Machigar Ongtang and Patrick
                 McDaniel",
  title =        "Focus: Understanding {Android} Security",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "1",
  pages =        "50--57",
  month =        jan # "\slash " # feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.26",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Landau:2009:PNT,
  author =       "Susan Landau",
  title =        "Perspectives: The {NRC} Takes on Data Mining,
                 Behavioral Surveillance, and Privacy",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "1",
  pages =        "58--62",
  month =        jan # "\slash " # feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.25",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Michael:2009:IAD,
  author =       "Bret Michael and Jeffrey Voas and Phil Laplante",
  title =        "It All Depends: Cyberpandemics: History,
                 Inevitability, Response",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "1",
  pages =        "63--67",
  month =        jan # "\slash " # feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.4",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Chan:2009:ETC,
  author =       "Yuen-Yan Chan and Victor K. Wei",
  title =        "Education: Teaching for Conceptual Change in Security
                 Awareness: a Case Study in Higher Education",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "1",
  pages =        "68--71",
  month =        jan # "\slash " # feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.22",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Kosseim:2009:PIP,
  author =       "Patricia Kosseim and Khaled {El Emam}",
  title =        "Privacy Interests: Privacy Interests in Prescription
                 Data, Part {I}: Prescriber Privacy",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "1",
  pages =        "72--76",
  month =        jan # "\slash " # feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.14",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Callegati:2009:BTM,
  author =       "Franco Callegati and Walter Cerroni and Marco
                 Ramilli",
  title =        "Basic Training: Man-in-the-Middle Attack to the
                 {HTTPS} Protocol",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "1",
  pages =        "78--81",
  month =        jan # "\slash " # feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.12",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Porras:2009:ATD,
  author =       "Phillip Porras",
  title =        "Attack Trends: Directions in Network-Based Security
                 Monitoring",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "1",
  pages =        "82--85",
  month =        jan # "\slash " # feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.5",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Geer:2009:GMO,
  author =       "Daniel E. {Geer, Jr.} and Daniel G. Conway",
  title =        "For Good Measure: The Owned Price Index",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "1",
  pages =        "86--87",
  month =        jan # "\slash " # feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.23",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Schneier:2009:CTA,
  author =       "Bruce Schneier",
  title =        "Clear Text: Architecture of Privacy",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "1",
  pages =        "88--88",
  month =        jan # "\slash " # feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.1",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Schneider:2009:EAP,
  author =       "Fred B. Schneider",
  title =        "From the {Editors}: Accountability for Perfection",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "2",
  pages =        "3--4",
  month =        mar # "\slash " # apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.30",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Anonymous:2009:STS,
  author =       "Anonymous",
  title =        "Special Thanks: Special Thanks to {S\&P}'s Peer
                 Reviewers",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "2",
  pages =        "5--6",
  month =        mar # "\slash " # apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.52",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Ortega:2009:NB,
  author =       "Brandi Ortega",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "2",
  pages =        "8--9",
  month =        mar # "\slash " # apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.45",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{McGraw:2009:ISBb,
  author =       "Gary McGraw",
  title =        "Interview: {Silver Bullet} Talks with {Jeremiah
                 Grossman}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "2",
  pages =        "10--14",
  month =        mar # "\slash " # apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.51",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Pfleeger:2009:BRS,
  author =       "Shari Lawrence Pfleeger",
  title =        "Book Reviews: Searching for You",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "2",
  pages =        "15--15",
  month =        mar # "\slash " # apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.48",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Caloyannides:2009:GEI,
  author =       "Michael A. Caloyannides and Nasir Memon and Wietse
                 Venema",
  title =        "{Guest Editors}' Introduction: Digital Forensics",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "2",
  pages =        "16--17",
  month =        mar # "\slash " # apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.34",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Caloyannides:2009:FY,
  author =       "Michael A. Caloyannides",
  title =        "Forensics Is So ``Yesterday''",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "2",
  pages =        "18--25",
  month =        mar # "\slash " # apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.37",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Carrier:2009:DFW,
  author =       "Brian D. Carrier",
  title =        "Digital Forensics Works",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "2",
  pages =        "26--29",
  month =        mar # "\slash " # apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.35",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Hay:2009:LAP,
  author =       "Brian Hay and Matt Bishop and Kara Nance",
  title =        "Live Analysis: Progress and Challenges",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "2",
  pages =        "30--37",
  month =        mar # "\slash " # apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.43",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Garfinkel:2009:NXB,
  author =       "Simson L. Garfinkel and James J. Migletz",
  title =        "New {XML}-Based Files Implications for Forensics",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "2",
  pages =        "38--44",
  month =        mar # "\slash " # apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.44",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Manes:2009:OLL,
  author =       "Gavin W. Manes and Elizabeth Downing",
  title =        "Overview of Licensing and Legal Issues for Digital
                 Forensic Investigators",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "2",
  pages =        "45--48",
  month =        mar # "\slash " # apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.46",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Roussev:2009:HDF,
  author =       "Vassil Roussev",
  title =        "Hashing and Data Fingerprinting in Digital Forensics",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "2",
  pages =        "49--55",
  month =        mar # "\slash " # apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.40",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Spiekermann:2009:ACR,
  author =       "Sarah Spiekermann and Sergei Evdokimov",
  title =        "Authentication: Critical {RFID} Privacy-Enhancing
                 Technologies",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "2",
  pages =        "56--62",
  month =        mar # "\slash " # apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.31",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Harauz:2009:IAD,
  author =       "John Harauz and Lori M. Kaufman",
  title =        "It All Depends: a New Era of Presidential Security:
                 The {President} and His {BlackBerry}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "2",
  pages =        "67--70",
  month =        mar # "\slash " # apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.29",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Ryoo:2009:ESE,
  author =       "Jungwoo Ryoo and Angsana Techatassanasoontorn and
                 Dongwon Lee",
  title =        "Education: Security Education Using Second Life",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "2",
  pages =        "71--74",
  month =        mar # "\slash " # apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.49",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{ElEmam:2009:PIP,
  author =       "Khaled {El Emam} and Patricia Kosseim",
  title =        "Privacy Interests: Privacy Interests in Prescription
                 Data, Part 2: Patient Privacy",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "2",
  pages =        "75--78",
  month =        mar # "\slash " # apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.47",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Brouchier:2009:CCT,
  author =       "Julien Brouchier and Tom Kean and Carol Marsh and
                 David Naccache",
  title =        "Crypto Corner: Temperature Attacks",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "2",
  pages =        "79--82",
  month =        mar # "\slash " # apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.54",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Jaatun:2009:ATF,
  author =       "Martin Gilje Jaatun and Jostein Jensen and H{\aa}vard
                 Vegge and Finn Michael Halvorsen and Rune Wals{\o}
                 Nerg{\aa}rd",
  title =        "Attack Trends: Fools Download Where Angels Fear to
                 Tread",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "2",
  pages =        "83--86",
  month =        mar # "\slash " # apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.36",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Zhivich:2009:SSR,
  author =       "Michael Zhivich and Robert K. Cunningham",
  title =        "Secure Systems: The Real Cost of Software Errors",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "2",
  pages =        "87--90",
  month =        mar # "\slash " # apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.56",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  keywords =     "Bellingham, WA, pipeline rupture; Patriot Missile
                 Defense System failure; radiation treatment overdoses",
}

@Article{Peterson:2009:BSS,
  author =       "Gunnar Peterson",
  title =        "Building Security In: Service-Oriented Security
                 Indications for Use",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "2",
  pages =        "91--93",
  month =        mar # "\slash " # apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.50",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Geer:2009:GMH,
  author =       "Daniel E. {Geer, Jr.} and Daniel G. Conway",
  title =        "For Good Measure: Hard Data Is Good to Find",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "2",
  pages =        "94--95",
  month =        mar # "\slash " # apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.39",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Bellovin:2009:CTG,
  author =       "Steven M. Bellovin",
  title =        "Clear Text: The Government and Cybersecurity",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "2",
  pages =        "96--96",
  month =        mar # "\slash " # apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.55",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Landwehr:2009:ENG,
  author =       "Carl E. Landwehr",
  title =        "From the {Editors}: a National Goal for Cyberspace:
                 Create an Open, Accountable {Internet}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "3",
  pages =        "3--4",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.58",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Figueroa:2009:NBa,
  author =       "James Figueroa",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "3",
  pages =        "6--7",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.73",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{McGovern:2009:ISB,
  author =       "James McGovern",
  title =        "Interview: {Silver Bullet} Talks with {Gary McGraw}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "3",
  pages =        "8--10",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.79",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{McGraw:2009:SOG,
  author =       "Gary McGraw and Ming Chow",
  title =        "Securing Online Games: {Guest Editors}' Introduction:
                 Securing Online Games: Safeguarding the Future of
                 Software Security",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "3",
  pages =        "11--12",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.65",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Bono:2009:RAS,
  author =       "Stephen Bono and Dan Caselden and Gabriel Landau and
                 Charlie Miller",
  title =        "Reducing the Attack Surface in Massively Multiplayer
                 Online Role-Playing Games",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "3",
  pages =        "13--19",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.75",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Portnoy:2009:WWC,
  author =       "Aaron Portnoy and Ali Rizvi-Santiago",
  title =        "Walking on Water: a Cheating Case Study",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "3",
  pages =        "20--22",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.82",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Kane:2009:VJL,
  author =       "Sean F. Kane",
  title =        "Virtual Judgment: Legal Implications of Online
                 Gaming",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "3",
  pages =        "23--28",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.81",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Mitterhofer:2009:SSB,
  author =       "Stefan Mitterhofer and Christopher Kruegel and Engin
                 Kirda and Christian Platzer",
  title =        "Server-Side Bot Detection in Massively Multiplayer
                 Online Games",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "3",
  pages =        "29--36",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.78",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Yan:2009:ICO,
  author =       "Jeff Yan and Brian Randell",
  title =        "An Investigation of Cheating in Online Games",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "3",
  pages =        "37--44",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.60",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Johnson:2009:IRS,
  author =       "M. Eric Johnson and Eric Goetz and Shari Lawrence
                 Pfleeger",
  title =        "Information Risk: Security through Information Risk
                 Management",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "3",
  pages =        "45--52",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.77",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Locasto:2009:EHS,
  author =       "Michael E. Locasto",
  title =        "Education: Helping Students Own Their Own Code",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "3",
  pages =        "53--56",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.66",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Varadharajan:2009:HNT,
  author =       "Vijay Varadharajan",
  title =        "On the Horizon: a Note on Trust-Enhanced Security",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "3",
  pages =        "57--59",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.59",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Donner:2009:BTW,
  author =       "Marc Donner",
  title =        "Biblio Tech: War Stories",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "3",
  pages =        "60--63",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.83",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Conti:2009:PIM,
  author =       "Gregory Conti and Edward Sobiesk",
  title =        "Privacy Interests: Malicious Interfaces and
                 Personalization's Uninviting Future",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "3",
  pages =        "64--67",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.71",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Howard:2009:BTI,
  author =       "Michael Howard",
  title =        "Basic Training: Improving Software Security by
                 Eliminating the {CWE} Top 25 Vulnerabilities",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "3",
  pages =        "68--71",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.69",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Zdrnja:2009:ATM,
  author =       "Bojan Zdrnja",
  title =        "Attack Trends: Malicious {JavaScript} Insertion
                 through {ARP} Poisoning Attacks",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "3",
  pages =        "72--74",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.72",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{McDaniel:2009:SSS,
  author =       "Patrick McDaniel and Stephen McLaughlin",
  title =        "Secure Systems: Security and Privacy Challenges in the
                 {Smart Grid}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "3",
  pages =        "75--77",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.76",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Lesk:2009:SPEa,
  author =       "Michael Lesk",
  title =        "Security {\&} Privacy Economics: Reading Over Your
                 Shoulder",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "3",
  pages =        "78--81",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.74",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Chuvakin:2009:BSL,
  author =       "Anton Chuvakin and Gunnar Peterson",
  title =        "Building Security In: Logging in the Age of {Web}
                 Services",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "3",
  pages =        "82--85",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.70",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Geer:2009:GMD,
  author =       "Daniel E. {Geer, Jr.} and Daniel G. Conway",
  title =        "For Good Measure: a Doubt of the Benefit",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "3",
  pages =        "86--87",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.57",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Geer:2009:CDE,
  author =       "Daniel E. {Geer, Jr.}",
  title =        "{ClearText}: Digital Endosymbiosis",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "3",
  pages =        "88--88",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.63",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Donner:2009:ENM,
  author =       "Marc Donner",
  title =        "From the Editors: New Models for Old",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "4",
  pages =        "3--4",
  month =        jul # "\slash " # aug,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.99",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 10 15:38:24 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Anonymous:2009:ILE,
  author =       "Anonymous",
  title =        "Interface: Letters to the Editor",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "4",
  pages =        "6--7",
  month =        jul # "\slash " # aug,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.95",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 10 15:38:24 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Figueroa:2009:NBb,
  author =       "James Figueroa",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "4",
  pages =        "8--10",
  month =        jul # "\slash " # aug,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.100",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 10 15:38:24 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{McGraw:2009:ISBc,
  author =       "Gary McGraw",
  title =        "Interview: Silver Bullet Talks with {Virgil Gligor}",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  number =       "4",
  pages =        "11--14",
  month =        jul # "\slash " # aug,
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1109/MSP.2009.106",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 10 15:38:24 MDT 2009",
  bibsource =    "http://computer.org/security/;
                 http://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Lin:2009:SRL,
  author =       "Herbert Lin",
  title =        "Special Report: Lifting the Veil on Cyber Offense",
  journal =      j-IEEE-SEC-PRIV,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
  volume =       "7",
  n