Page 5
Robert Fox
Pages 9-10
Pages 11-13
Meg McGinity
Pages 15-18
Neil Munro
Pages 19-22
Experiences with consumer-oriented, high-speed Internet access technology.
Scott Tilley
Pages 23-26
John Gallaugher
Pages 27-29
As the wonders of global connectivity unfold, the world is changing its perception toward the use of computers. Computers are no longer viewed as mere number-crunching devices nor is the use of computers limited to the scientific …
Brajendra Panda, Joseph Giordano
Pages 30-32
Don't trust—verify.
Shiu-Kai Chin
Pages 33-37
An old adage holds true for software: you can build a stronger system by first breaking it.
Anup K. Ghosh, Jeffrey M. Voas
Pages 38-44
Effective intrusion detection, like police work, requires prioritization and careful fusion of evidence from disparate sources.
Terrance Goan
Pages 46-52
Your mission-critical software has vulnerabilities that intruders will try to exploit. The U.S. Air Force is developing new systems to catch hackers as they search for weak points.
Robert Durst, Terrence Champion, Brian Witten, Eric Miller, Luigi Spagnuolo
Pages 53-61
A distributed application is vulnerable to attack code masquerading as one of the components. An application that has been trained to recognize "itself" can reject such imposters.
Matthew Stillerman, Carla Marceau, Maureen Stillman
Pages 62-69
Prevention and detection receive most of the attention, but recovery is an equally important phase of information warfare defense.
Sushil Jajodia, Catherine D. McCollum, Paul Ammann
Pages 71-75
A federation of spontaneously networked electronic components of all types can communicate, interact, and share their services and functions, as explained by Jini's lead architect.
Jim Waldo
Pages 76-82
Securing information with the world's smallest combination lock.
David Plummer, Larry J. Dalton, Frank Peter
Pages 83-87
Sexual harassment via email may not only get you a stern rejection and cost you your job but leave an electronic trail of legal evidence that can be replayed and reread in a court of law.
Janice C. Sipior, Burke T. Ward
Pages 88-95
What's to stop someonedesperate to fulfill a publishing quotafrom copying an article posted on a publicly available Web page,repackaging it under another byline, and resubmitting it to another journal?
Ned Kock
Pages 96-104
Peter G. Neumann
Page 120