COMPSCI 725 SC 05 Term Papers
Fu'Ad W. F. Al Tabba'
Why Computer Security Fails – An Economic View
Jiazhen Chen
Problems when running Untrusted Java threads and ways to solve them
Chang Chen
Recent Developments in Tracing Traitors
Samantha J. Daniels
Insider Threats within the Financial and Movie Sectors: A Comparative Study
Birgit Kaschte
Biometric authentication systems today and in the future
Daniel Ronald Flower
Threat Analysis of Emanation-Based Attacks
Qian Gao
Misuse/Use Cases and Security Use Cases in Eliciting Security Requirements
Ron (Seong Min) Kim
Trusted Platform Module and Privacy: Promises and Limitations
Mu Li
Analysis of the Insider Attack Issue in the Movie, Banking, and Computer Industries
Man Fai Ma
How security requirements should be reused
Bruce Megget
Assessment of Keyboard Acoustic Threats by Insiders
Ahmed Mujuthaba
Towards a General Architecture for Secure Computing
Gilbert Notoatmodjo
Detection of Self-Mutating Computer Viruses
Mukul Pahwa
Digital Rights (Mis) Management
Chun Wei (Johnny) Sia
Misuse Cases and Abuse Cases in Eliciting Security Requirements
Gene Tang
Trusted Computing: Addressing Insider Threats to the Banking and Financial Sector
Jens Trotzky
Analysis of turnitin.com
Vanessa Wan Sze Tsang
Towards Analysis of Templates for Security Requirements
Slobodan Vukanović
Completeness, Versatility, and Practicality in Role–Based Administration
Amodha Wijekoon
Protecting against piracy: Building Tamper resistant software
Jesse Wu
Innocence of Traced Traitors
Dong Zhang
Checking Primitives with Guards
Miaomiao Zhang
What Should We Do about Self-plagiarism