10 October 2005
S1.
(P1)
[Co Co05] C. Collberg, and
S2. (P2, P6) [SS As04] D. Asonov, R. Agrawal, "Keyboard Acoustic Emanations", in Proc. of IEEE Symposium on Security and Privacy, pp. 3-11, May 2004.
S3.
(P3)
[SA Ca04] D. Cappelli, M. Keeney, E. Kowalski, A.
Moore, M. Randazzo, "Insider Threat Study:
Illicit Cyber Activity in the Banking and Finance Sector", CERT
Coordination Center, Software Engineering Institute,
S4. (P4) [SRE Al03] I. Alexander, "Misuse cases: use cases with hostile intent", IEEE Software 20(1), 58-66, Jan/Feb 2003.
S5. (P5, P7) [DRM By03] S. Byers, L. Cranor, D. Korman, P. McDaniel, and E. Cronin, "Analysis of security vulnerabilities in the movie production and distribution process", in Proc. 2003 ACM Workshop on Digital Rights Management, ACM Press, 1-12, 2003.
S6. (P8) [SA Bl04] J. Black, M. Cochran, and R. Gardner, "How to Cheat at Chess: A Security Analysis of the Internet Chess Club", Cryptology ePrint Archive, Report 2004/203, 14 pp., 2004.
S7. (P9) [SA Ch03] M. Christodorescu and S. Jha, "Static Analysis of Executables to Detect Malicious Patterns", in 12th USENIX Security Symposium, pp. 169-186, August 2003.
S8. (P10) [Ap Cr04] J. Crampton and G. Loizou, "Administrative scope: A foundation for role-based administrative models", ACM Trans. Inf. Syst. Secur. 6:2, 201-231, 2003.
S9. (P11) [Ap Ca04] J. Camenisch, "Better Privacy for Trusted Computing Platforms," to appear in ESORICS 2004. Preprint provided in email by J. Camenisch, July 2004.
S10. (P12) [SRE Fi04] D. Firesmith, "Specifying Reusable Security Requirements", in Journal of Object Technology 3(1), pp. 61-75, Jan-Feb 2004. Available: http://www.jot.fm/issues/issue_2004_01/column6, July 2005.