COMPSCI 725 SC 05 Term Papers
Fu'Ad W. F. Al Tabba' Why Computer Security Fails – An Economic View
Jiazhen Chen Problems when running Untrusted Java threads and ways to solve them
Chang Chen Recent Developments in Tracing Traitors
Samantha J. Daniels Insider Threats within the Financial and Movie Sectors: A Comparative Study
Birgit Kaschte Biometric authentication systems today and in the future
Daniel Ronald Flower Threat Analysis of Emanation-Based Attacks
Qian Gao Misuse/Use Cases and Security Use Cases in Eliciting Security Requirements
Ron (Seong Min) Kim Trusted Platform Module and Privacy: Promises and Limitations
Mu Li Analysis of the Insider Attack Issue in the Movie, Banking, and Computer Industries
Man Fai Ma How security requirements should be reused
Bruce Megget Assessment of Keyboard Acoustic Threats by Insiders
Ahmed Mujuthaba Towards a General Architecture for Secure Computing
Gilbert Notoatmodjo Detection of Self-Mutating Computer Viruses
Mukul Pahwa Digital Rights (Mis) Management
Chun Wei (Johnny) Sia Misuse Cases and Abuse Cases in Eliciting Security Requirements
Gene Tang Trusted Computing: Addressing Insider Threats to the Banking and Financial Sector
Jens Trotzky Analysis of turnitin.com
Vanessa Wan Sze Tsang Towards Analysis of Templates for Security Requirements
Slobodan Vukanović Completeness, Versatility, and Practicality in Role–Based Administration
Amodha Wijekoon Protecting against piracy: Building Tamper resistant software
Jesse Wu Innocence of Traced Traitors
Dong Zhang Checking Primitives with Guards
Miaomiao Zhang What Should We Do about Self-plagiarism