External Reviewers

The lack of data authentication and integrity guarantees in the Domain Name System (DNS) facilitates a wide variety of malicious activity on the Internet today. DNSSec, a set of cryptographic extensions to DNS, has been proposed to address these threats. While DNSSec does provide certain security guarantees, here we argue that it does not provide what users really need, namely end-to-end authentication and integrity. Even worse, DNSSec makes DNS much less efficient and harder to administer, thus significantly compromising DNS’s availability— arguably its most important characteristic. In this paper we explain the structure of DNS, examine the threats against it, present the details of DNSSec, and analyze the benefits of DNSSec relative to its costs. This cost-benefit analysis clearly shows that DNSSec deployment is a futile effort, one that provides little longterm benefit yet has distinct, perhaps very significant costs.

[1]  Brayfield,et al.  an Index of Job Satisfaction. , 1954 .

[2]  William Craig,et al.  Linear reasoning. A new form of the Herbrand-Gentzen theorem , 1957, Journal of Symbolic Logic.

[3]  P. Blau Exchange and Power in Social Life , 1964 .

[4]  M. D. MacLaren The Art of Computer Programming. Volume 2: Seminumerical Algorithms (Donald E. Knuth) , 1970 .

[5]  F. Adler,et al.  Sisters in Crime: The Rise of the New Female Criminal , 1976 .

[6]  Edsger W. Dijkstra,et al.  A Discipline of Programming , 1976 .

[7]  Robert S. Boyer,et al.  A fast string searching algorithm , 1977, CACM.

[8]  L. Furby Possession in humans: An exploratory study of its meaning and motivation. , 1978 .

[9]  R. W. Gosper Decision procedure for indefinite hypergeometric summation. , 1978, Proceedings of the National Academy of Sciences of the United States of America.

[10]  C. A. R. Hoare,et al.  Communicating sequential processes , 1978, CACM.

[11]  W. Thornton,et al.  Women's Liberation and the Female Delinquent , 1980 .

[12]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[13]  David Gries,et al.  The Science of Programming , 1981, Text and Monographs in Computer Science.

[14]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[15]  J. Meseguer,et al.  Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.

[16]  R. Mizerski An Attribution Explanation of the Disproportionate Influence of Unfavorable Information , 1982 .

[17]  Robert S. Boyer,et al.  The Correctness Problem in Computer Science , 1982 .

[18]  Leslie Lamport,et al.  The Byzantine Generals Problem , 1982, TOPL.

[19]  D. Kolb Experiential Learning: Experience as the Source of Learning and Development , 1983 .

[20]  José Meseguer,et al.  Unwinding and Inference Control , 1984, 1984 IEEE Symposium on Security and Privacy.

[21]  S. Box,et al.  Liberation/Emancipation, Economic Marginalization, or Less Chivalry , 1984 .

[22]  Hartmut Ehrig,et al.  Fundamentals of Algebraic Specification 1: Equations and Initial Semantics , 1985 .

[23]  P. Burmeister A Model Theoretic Oriented Approach to Partial Algebras , 1986 .

[24]  M. Sashkin Participative management remains an ethical imperative , 1986 .

[25]  Marilyn M. Mantei,et al.  Proceedings of the SIGCHI Conference on Human Factors in Computing Systems , 1986, CHI 1986.

[26]  Peter B. Andrews An introduction to mathematical logic and type theory - to truth through proof , 1986, Computer science and applied mathematics.

[27]  Wolfgang Reisig,et al.  Petri Nets: Applications and Relationships to Other Models of Concurrency , 1986, Lecture Notes in Computer Science.

[28]  Robert E. Tarjan,et al.  Three Partition Refinement Algorithms , 1987, SIAM J. Comput..

[29]  Brian W. Kernighan,et al.  The C Programming Language, Second Edition , 1988 .

[30]  J. Habermas,et al.  The theory of communicative action. Volume 2, Lifeworld andsystem : a critique of functionalist reason , 1989 .

[31]  J. Michael Spivey,et al.  The Z notation - a reference manual , 1992, Prentice Hall International Series in Computer Science.

[32]  Michael J. C. Gordon,et al.  Mechanizing programming logics in higher order logic , 1989 .

[33]  Amin Rajan,et al.  In the age of the smart machine , 1990 .

[34]  D. Straub Effective IS Security , 1990 .

[35]  Colin O'Halloran,et al.  A Calculus of Information Flow , 1990, ESORICS.

[36]  Robert S. Boyer,et al.  Computational Logic , 1990, ESPRIT Basic Research Series.

[37]  Hartmut Ehrig,et al.  Fundamentals of Algebraic Specification 2: Module Specifications and Constraints , 1990 .

[38]  J. Merrill,et al.  Media Debates: Issues in Mass Communication , 1990 .

[39]  L. J. Williams,et al.  Job Satisfaction and Organizational Commitment as Predictors of Organizational Citizenship and In-Role Behaviors , 1991 .

[40]  Robert S. Boyer,et al.  Functional Instantiation in First-Order Logic , 1991, Artificial and Mathematical Theory of Computation.

[41]  Richard P. Bagozzi,et al.  Assessing Construct Validity in Organizational Research , 1991 .

[42]  K. Booth Security and emancipation , 1991, Review of International Studies.

[43]  Thomas F. Melham A Package For Inductive Relation Definitions In HOL , 1991, 1991., International Workshop on the HOL Theorem Proving System and Its Applications.

[44]  Sten Agerholm Mechanizing Program Verification in HOL , 1991, 1991., International Workshop on the HOL Theorem Proving System and Its Applications.

[45]  M. Alvesson,et al.  On the Idea of Emancipation in Management and Organization Studies , 1992 .

[46]  Thomas Y. C. Woo,et al.  Authentication for distributed systems , 1997, Computer.

[47]  Robert Givan,et al.  New Results on Local Inference Relations , 1992, KR.

[48]  William M. Farmer,et al.  Little Theories , 1992, CADE.

[49]  John McLean,et al.  Proving Noninterference and Functional Correctness Using Traces , 1992, J. Comput. Secur..

[50]  G. Winskel The formal semantics of programming languages , 1993 .

[51]  David A. McAllester Automatic recognition of tractability in inference relations , 1993, JACM.

[52]  Ken Peffers,et al.  The Impact of Information Technology Investment Announcements on the Market Value of the Firm , 1993, Inf. Syst. Res..

[53]  Robert W. Floyd,et al.  Assigning Meanings to Programs , 1993 .

[54]  M. Gordon,et al.  Introduction to HOL: a theorem proving environment for higher order logic , 1993 .

[55]  Peter V. Homeier,et al.  Trustworthy Tools for Trustworthy Programs: A Verified Verification Condition Generator , 1994, TPHOLs.

[56]  Martín Abadi,et al.  A TLA Solution to the RPC-Memory Specification Problem , 2016, Formal Systems Specification.

[57]  William L. Benoit,et al.  Accounts, excuses, and apologies : a theory of image restoration strategies , 1994 .

[58]  David B. Johnson,et al.  Routing in Ad Hoc Networks of Mobile Hosts , 1994, 1994 First Workshop on Mobile Computing Systems and Applications.

[59]  Gerard J. Holzmann,et al.  An improvement in formal verification , 1994, FORTE.

[60]  G. Siomkos,et al.  The Hidden Crisis in Product‐harm Crisis Management , 1994 .

[61]  Message Passing Interface Forum MPI: A message - passing interface standard , 1994 .

[62]  Charles E. Perkins,et al.  Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.

[63]  Rudy Hirschheim,et al.  Realizing Emancipatory Principles in Information Systems Development: The Case for ETHICS , 1994, MIS Q..

[64]  John McLean,et al.  A general theory of composition for trace sets closed under selective interleaving functions , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.

[65]  Dennis E. Garrett,et al.  The effectiveness of corporate communicative responses to accusations of unethical behavior , 1995 .

[66]  Thomas A. Henzinger,et al.  Computing simulations on finite and infinite graphs , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.

[67]  Patrice Godefroid,et al.  Partial-Order Methods for the Verification of Concurrent Systems , 1996, Lecture Notes in Computer Science.

[68]  Randall P. Settoon,et al.  Social Exchange in Organizations: Perceived Organizational Support, Leader-Member Exchange, and Employee Reciprocity , 1996 .

[69]  Harald Ganzinger,et al.  Complexity analysis based on ordered resolution , 1996, Proceedings 11th Annual IEEE Symposium on Logic in Computer Science.

[70]  Tobias Nipkow Winskel is (Almost) Right: Towards a Mechanized Semantics Textbook , 1996, FSTTCS.

[71]  Simon L. Peyton Jones,et al.  Type classes in Haskell , 1994, TOPL.

[72]  Bruno Buchberger Symbolic Computation: Computer Algebra and Logic , 1996, FroCoS.

[73]  Stephen Wolfram,et al.  The Mathematica Book , 1996 .

[74]  Sherry J. Holladay,et al.  Communication and Attributions in a Crisis: An Experimental Study in Crisis Communication , 1996 .

[75]  Birgit Benkhoff Ignoring Commitment Is Costly: New Approaches Establish the Missing Link Between Commitment and Performance , 1997 .

[76]  Andrew William Roscoe,et al.  The Theory and Practice of Concurrency , 1997 .

[77]  Richard Kirshenbaum,et al.  Under the Radar: Talking to Today's Cynical Consumer , 1997 .

[78]  E. Stewart Lee,et al.  A general theory of security properties , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[79]  Nancy R. Mead,et al.  Survivable Network Systems: An Emerging Discipline , 1997 .

[80]  Christoph Sprenger,et al.  A Verified Model Checker for the Modal µ-calculus in Coq , 1998, TACAS.

[81]  Tobias Nipkow,et al.  Javalight is type-safe—definitely , 1998, POPL '98.

[82]  W. T. Coombs,et al.  An Analytic Framework for Crisis Situations: Better Responses From a Better Understanding of the Situation , 1998 .

[83]  Wolfgang Naraschewski,et al.  Object-Oriented Verification Based on Record Subtyping in Higher-Order Logic , 1998, TPHOLs.

[84]  Paul J. Kobulnicky,et al.  Commitment in the workplace: Theory, research and application , 1998 .

[85]  Steve A. Schneider Verifying Authentication Protocols in CSP , 1998, IEEE Trans. Software Eng..

[86]  J. R. Gregory Does Corporate Reputation Provide a Cushion to Companies Facing Market Volatility? Some Supportive Evidence , 1998 .

[87]  R. Ulmer,et al.  The compatibility of corrective action in organizational crisis communication , 1998 .

[88]  Steve A. Schneider,et al.  Concurrent and Real-time Systems: The CSP Approach , 1999 .

[89]  R. Knight,et al.  Corporate Catastrophes, Stock Returns, and Trading Volume , 1999 .

[90]  Matthias Felleisen,et al.  A Programmer's Reduction Semantics for Classes and Mixins , 1999, Formal Syntax and Semantics of Java.

[91]  Eric Walden,et al.  The Impact of E-Commerce Announcements on the Market Value of Firms , 2001, Inf. Syst. Res..

[92]  Sophia Drossopoulou,et al.  Describing the Semantics of Java and Proving Type Soundness , 1999, Formal Syntax and Semantics of Java.

[93]  Stefan Berghofer,et al.  Inductive Datatypes in HOL - Lessons Learned in Formal-Logic Engineering , 1999, TPHOLs.

[94]  Nancy R. Mead,et al.  Survivability: Protecting Your Critical Systems , 1999, IEEE Internet Comput..

[95]  Kevin J. Sullivan,et al.  Information survivability control systems , 1999, Proceedings of the 1999 International Conference on Software Engineering (IEEE Cat. No.99CB37002).

[96]  Leslie Lamport,et al.  Model Checking TLA+ Specifications , 1999, CHARME.

[97]  Cynthia E. Irvine,et al.  Amplifying Security Education in the Laboratory , 1999 .

[98]  S. Karstedt Emancipation, crime and problem behavior of women: A perspective from Germany , 2000 .

[99]  Wolfgang Reif,et al.  Do You Trust Your Model Checker? , 2000, FMCAD.

[100]  David Thomas,et al.  Programming Ruby: the pragmatic programmer's guide , 2000 .

[101]  Chris Lattner,et al.  LLVM: AN INFRASTRUCTURE FOR MULTI-STAGE OPTIMIZATION , 2000 .

[102]  Heiko Mantel,et al.  Possibilistic definitions of security-an assembly kit , 2000, Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13.

[103]  L. Barton Crisis in Organizations II , 2000 .

[104]  Matthew C. Elder,et al.  Survivability architectures: issues and approaches , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.

[105]  Lawrence C. Paulson,et al.  A fixedpoint approach to (co)inductive and (co)datatype definitions , 2000, Proof, Language, and Interaction.

[106]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[107]  R. Ulmer,et al.  Consistent Questions of Ambiguity in Organizational Crisis Communication: Jack in the Box as a Case Study , 2000 .

[108]  R. Constable,et al.  Nuprl ’ s Class Theory and its Applications , 2000 .

[109]  Heiko Mantel,et al.  A generic approach to the security of multi-threaded programs , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..

[110]  Owre Sam,et al.  Theory Interpretations in PVS , 2001 .

[111]  James N. Druckman,et al.  The Implications of Framing Effects for Citizen Competence , 2001 .

[112]  Marieke Huisman,et al.  Reasoning about Java programs in higher order logic using PVS and Isabelle , 2001 .

[113]  Heiko Mantel,et al.  Preserving information flow properties under refinement , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[114]  Anna Philippou,et al.  Tools and Algorithms for the Construction and Analysis of Systems , 2018, Lecture Notes in Computer Science.

[115]  Evi Nemeth,et al.  DNS measurements at a root server , 2001, GLOBECOM'01. IEEE Global Telecommunications Conference (Cat. No.01CH37270).

[116]  David von Oheimb Analyzing Java in Isabelle-HOL: formalization, type safety and Hoare logic , 2001 .

[117]  Udo W. Pooch,et al.  Using an isolated network laboratory to teach advanced networks and security , 2001, SIGCSE '01.

[118]  James Backhouse,et al.  Current directions in IS security research: towards socio‐organizational perspectives , 2001, Inf. Syst. J..

[119]  Brian D. Noble,et al.  When virtual is better than real [operating system relocation to virtual machines] , 2001, Proceedings Eighth Workshop on Hot Topics in Operating Systems.

[120]  Harald Ganzinger Relating semantic and proof-theoretic concepts for polynomial time decidability of uniform word problems , 2001, Proceedings 16th Annual IEEE Symposium on Logic in Computer Science.

[121]  Michael Goldsmith,et al.  Modelling and analysis of security protocols , 2001 .

[122]  Varun Grover,et al.  Research Report: A Reexamination of IT Investment and the Market Value of the Firm - An Event Study Methodology , 2001, Inf. Syst. Res..

[123]  Matthew C. Elder,et al.  Fault tolerance in critical information systems , 2001 .

[124]  Hoyt Lougee,et al.  SOFTWARE CONSIDERATIONS IN AIRBORNE SYSTEMS AND EQUIPMENT CERTIFICATION , 2001 .

[125]  A. Bandura Social cognitive theory: an agentic perspective. , 1999, Annual review of psychology.

[126]  Amin Vahdat,et al.  A chat room assignment for teaching network security , 2001, SIGCSE '01.

[127]  David Thomas,et al.  The Art in Computer Programming , 2001 .

[128]  Gerardo Lafferriere,et al.  Symbolic Reachability Computation for Families of Linear Vector Fields , 2001, J. Symb. Comput..

[129]  Vern Paxson,et al.  An analysis of using reflectors for distributed denial-of-service attacks , 2001, CCRV.

[130]  Florian Kammüller,et al.  Encoding Object-Z in Isabelle/HOL , 2002, ZB.

[131]  Lawrence Charles Paulson,et al.  Isabelle/HOL: A Proof Assistant for Higher-Order Logic , 2002 .

[132]  I. S. W. B. Prasetya,et al.  A survey on embedding programming logics in a theorem prover , 2002 .

[133]  Steve A. Schneider Verifying Authentication Protocol Implementations , 2002, FMOODS.

[134]  Keijo Heljanko,et al.  Testing LTL formula translation into Büchi automata , 2002, International Journal on Software Tools for Technology Transfer.

[135]  Patrick M. Kreiser Creating Corporate Reputations: Identity, Image, and Performance , 2002 .

[136]  Leslie Lamport,et al.  High-Level Specifications: Lessons from Industry , 2002, FMCO.

[137]  A. Erez,et al.  The nature and dimensionality of organizational citizenship behavior: a critical review and meta-analysis. , 2002, The Journal of applied psychology.

[138]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.

[139]  Asia , 2002 .

[140]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.

[141]  Vallabh Sambamurthy,et al.  The Shareholder-Wealth and Trading-Volume Effects of Information-Technology Infrastructure Investments , 2002, J. Manag. Inf. Syst..

[142]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[143]  Samuel T. King,et al.  ReVirt: enabling intrusion analysis through virtual-machine logging and replay , 2002, OPSR.

[144]  Michael Fry,et al.  Panel on integrating security concepts into existing computer courses , 2002, SIGCSE '02.

[145]  Markus Müller-Olm,et al.  Polynomial Constants Are Decidable , 2002, SAS.

[146]  John C. Windsor,et al.  Risks and Effects of IS/IT Outsourcing: A Securities Market Assessment1 , 2002 .

[147]  Peter D. Mosses,et al.  CASL: the Common Algebraic Specification Language , 2002, Theor. Comput. Sci..

[148]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[149]  Manel Guerrero Zapata Secure ad hoc on-demand distance vector routing , 2002, MOCO.

[150]  Tobias Nipkow,et al.  Hoare Logic for NanoJava: Auxiliary Variables, Side Effects, and Virtual Methods Revisited , 2002, FME.

[151]  Dawn Song,et al.  The TESLA Broadcast Authentication Protocol , 2002 .

[152]  R. Eisenberger,et al.  Perceived organizational support: a review of the literature. , 2002, The Journal of applied psychology.

[153]  Leslie Lamport,et al.  Specifying Systems: The TLA+ Language and Tools for Hardware and Software Engineers [Book Review] , 2002, Computer.

[154]  A. Cooper Media framing and social movement mobilization: German peace protest against INF missiles, the Gulf War, and NATO peace enforcement in Bosnia , 2002 .

[155]  Dieter Hutter,et al.  The Development Graph Manager MAYA , 2002, AMAST.

[156]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..

[157]  Dubravka Cecez-Kecmanovic,et al.  The rationality framework for a critical study of information systems , 2002, J. Inf. Technol..

[158]  Julie Yioutas,et al.  Revisiting the Clinton/Lewinsky Scandal: The Convergence of Agenda Setting and Framing , 2003 .

[159]  Abdullah Gani,et al.  Bayesian Learning Networks Approach to Cybercrime Detection , 2003 .

[160]  Ashish Garg,et al.  The Financial Impact of IT Security Breaches: What Do Investors Think? , 2003, Inf. Secur. J. A Glob. Perspect..

[161]  S. Hunter Information Technology, Organizational Learning, and the Market Value of the Firm , 2003 .

[162]  Heiko Mantel A uniform framework for the formal specification and verification of information flow security , 2003 .

[163]  Lei Zhou,et al.  The Economic Cost of Publicly Announced Information Security Breaches: Empirical Evidence from the Stock Market , 2003, J. Comput. Secur..

[164]  Serge Autexier,et al.  Hierarchical contextual reasoning , 2003 .

[165]  Tal Garfinkel,et al.  A Virtual Machine Introspection Based Architecture for Intrusion Detection , 2003, NDSS.

[166]  Christoph Walther,et al.  About eriFun , 2003 .

[167]  Peter J. Denning,et al.  Great principles of computing , 2015, CACM.

[168]  Bart Jacobs,et al.  Java Program Verification at Nijmegen: Developments and Perspective , 2003, ISSS.

[169]  M. Crum,et al.  Management practices as antecedents of safety culture within the trucking industry: similarities and differences by hierarchical level. , 2003, Journal of safety research.

[170]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[171]  Craig E. Carroll,et al.  Agenda-setting Effects of Business News on the Public's Images and Opinions about Major Corporations , 2003 .

[172]  Panagiotis Papadimitratos,et al.  Secure link state routing for mobile ad hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[173]  Achim D. Brucker,et al.  HOL-Z 2.0: A Proof Environment for Z-Specifications , 2003, J. Univers. Comput. Sci..

[174]  Bruce W. Char,et al.  Redesigning introductory computer programming using multi-level online modules for a mixed audience , 2003, SIGCSE.

[175]  Roger Smith Simulating Information Warfare Using the HLA Management Object Model , 2003 .

[176]  L. V. Dyne,et al.  The employment relationships of foreign workers versus local employees: A field study of organizational justice, job satisfaction, performance, and OCB , 2003 .

[177]  S. Carter Secure Position Aided Ad Hoc Routing , 2003 .

[178]  A. Hovav,et al.  The Impact of Denial‐of‐Service Attack Announcements on the Market Value of Firms , 2003 .

[179]  M. Joslyn Framing the Lewinsky Affair: Third‐Person Judgments by Scandal Frame , 2003 .

[180]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[181]  C. Izard,et al.  Responsible Behavior: The Importance of Social Cognition and Emotion. , 2003 .

[182]  Scott B. MacKenzie,et al.  Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.

[183]  Kenneth L. McMillan,et al.  Interpolation and SAT-Based Model Checking , 2003, CAV.

[184]  Clemens Ballarin Locales and Locale Expressions in Isabelle/Isar , 2003, TYPES.

[185]  Seong-Moo Yoo,et al.  Black hole attack in mobile Ad Hoc networks , 2004, ACM-SE 42.

[186]  H. Raghav Rao,et al.  Electronic Banking and Information Assurance Issues: Surveys and Synthesis , 2004, J. Organ. End User Comput..

[187]  K. Rustan M. Leino,et al.  The Spec# Programming System: An Overview , 2004, CASSIS.

[188]  Rossouw von Solms,et al.  From policies to culture , 2004, Comput. Secur..

[189]  José Meseguer,et al.  Rewriting Logic Semantics: From Language Specifications to Formal Analysis Tools , 2004, IJCAR.

[190]  José Meseguer,et al.  Formal Analysis of Java Programs in JavaFAN , 2004, CAV.

[191]  Craig E. Carroll How the mass media influence perceptions of corporate reputation: exploring agenda-setting effects within business news coverage , 2004 .

[192]  Myla Archer,et al.  TAME: Using PVS strategies for special-purpose theorem proving , 2001, Annals of Mathematics and Artificial Intelligence.

[193]  Huseyin Cavusoglu,et al.  The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers , 2004, Int. J. Electron. Commer..

[194]  Shivraj Kanungo,et al.  On the emancipatory role of rural information systems , 2004, Inf. Technol. People.

[195]  Guilherme Ottoni,et al.  RIFLE: An Architectural Framework for User-Centric Information-Flow Security , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).

[196]  Enric Rodríguez-Carbonell,et al.  Automatic Generation of Polynomial Loop Invariants: Algebraic Foundations , 2004, ISSAC '04.

[197]  Yih-Chun Hu,et al.  A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.

[198]  Rossouw von Solms,et al.  Towards information security behavioural compliance , 2004, Comput. Secur..

[199]  M. Meijer Does Success Breed Success?: Effects of News and Advertising on Corporate Reputation , 2004 .

[200]  C.E. Irvine,et al.  The Trusted Computing Exemplar project , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..

[201]  Christoph Walther,et al.  Verification in the Classroom , 2004, Journal of Automated Reasoning.

[202]  Elvinia Riccobene,et al.  Proving Invariants of I/O Automata with TAME , 2004, Automated Software Engineering.

[203]  Matt Kaufmann,et al.  Structured Theory Development for a Mechanized Logic , 2001, Journal of Automated Reasoning.

[204]  J. L. Pierce,et al.  Psychological ownership and feelings of possession: three field studies predicting employee attitudes and organizational citizenship behavior , 2004 .

[205]  Dragan Bosnacki,et al.  Cluster-Based Partial-Order Reduction , 2004 .

[206]  Deborah A. Frincke,et al.  A case study in rapid introduction of an information assurance track into a software engineering curriculum , 2004, 17th Conference on Software Engineering Education and Training, 2004. Proceedings..

[207]  Tudor Jebelean,et al.  Automated Generation of Loop Invariants by Recurrence Solving in Theorema , 2004 .

[208]  Laura Kovács,et al.  An algorithm for automated generation of invariants for loops with conditionals , 2005, Seventh International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC'05).

[209]  Leslie Lamport,et al.  A +CAL User’s Manual , 2005 .

[210]  Irene M. Y. Woon,et al.  Forthcoming: Journal of Information Privacy and Security , 2022 .

[211]  Terrill L. Frantz,et al.  Communication Networks from the Enron Email Corpus “It's Always About the People. Enron is no Different” , 2005, Comput. Math. Organ. Theory.

[212]  Madan Musuvathi,et al.  A Combination Method for Generating Interpolants , 2005, CADE.

[213]  Alan Bundy,et al.  Rippling - meta-level guidance for mathematical reasoning , 2005, Cambridge tracts in theoretical computer science.

[214]  George C. Necula,et al.  Data Structure Specifications via Local Equality Axioms , 2005, CAV.

[215]  Detmar W. Straub,et al.  A Practical Guide To Factorial Validity Using PLS-Graph: Tutorial And Annotated Example , 2005, Commun. Assoc. Inf. Syst..

[216]  John Rushby,et al.  Noninterference, Transitivity, and Channel-Control Security Policies 1 , 2005 .

[217]  Michael J. Witbrock,et al.  A Knowledge-Based Approach to Network Security: Applying Cyc in the Domain of Network Risk Assessment , 2005, AAAI.

[218]  Kenneth L. McMillan,et al.  Applications of Craig Interpolants in Model Checking , 2005, TACAS.

[219]  Axel Schairer,et al.  Exploiting Generic Aspects of Security Models in Formal Developments , 2005, Mechanizing Mathematical Reasoning.

[220]  Peter J. Denning,et al.  Recentering computer science , 2005, CACM.

[221]  Claude Marché,et al.  Reasoning About Java Programs with Aliasing and Frame Conditions , 2005, TPHOLs.

[222]  Kurt Stenzel Verification of Java card programs , 2005 .

[223]  Christoph Walther,et al.  Reasoning About Incompletely Defined Programs , 2005, LPAR.

[224]  H. Raghav Rao,et al.  Information assurance metric development framework for electronic bill presentment and payment systems using transaction and workflow analysis , 2005, Decis. Support Syst..

[225]  M. Kauers,et al.  Algorithms for Nonlinear Higher Order Di erence Equa-tions , 2005 .

[226]  Brian Huffman,et al.  Axiomatic Constructor Classes in Isabelle/HOLCF , 2005, TPHOLs.

[227]  Viorica Sofronie-Stokkermans,et al.  Hierarchic Reasoning in Local Theory Extensions , 2005, CADE.

[228]  Steve A. Schneider,et al.  A decision procedure for the existence of a rank function , 2005, J. Comput. Secur..

[229]  Kerry Trentelman,et al.  Proving correctness of JavaCard DL taclets using Bali , 2005, Third IEEE International Conference on Software Engineering and Formal Methods (SEFM'05).

[230]  George Stephanides,et al.  The economic approach of information security , 2005, Comput. Secur..

[231]  David B. Skillicorn,et al.  Detecting unusual email communication , 2005, CASCON.

[232]  Burkhart Wolff,et al.  Verification of a Signature Architecture with HOL-Z , 2005, FM.

[233]  Ralf Sasse,et al.  Automatic Validation of Transformation Rules for Java Verification Against a Rewriting Semantics , 2005, LPAR.

[234]  K. Rustan M. Leino,et al.  Modular Verification of Static Class Invariants , 2005, FM.

[235]  Jeffrey M. Stanton,et al.  Analysis of end user security behaviors , 2005, Comput. Secur..

[236]  Ashish Tiwari,et al.  Generating Polynomial Invariants for Hybrid Systems , 2005, HSCC.

[237]  Deepak D'Souza,et al.  An Automata Based Approach for Verifying Information Flow Properties , 2005, ARSPA@ICALP.

[238]  Brenda Scott-Ladd,et al.  Causal inferences between participation in decision making, task attributes, work effort, rewards, job satisfaction and commitment , 2006 .

[239]  Achim D. Brucker,et al.  The HOL-OCL Book , 2006 .

[240]  Alessandro Acquisti,et al.  Is There a Cost to Privacy Breaches? An Event Study , 2006, WEIS.

[241]  Deepak Kapur,et al.  A Quantifier-Elimination Based Heuristic for Automatically Generating Inductive Assertions for Programs , 2006, J. Syst. Sci. Complex..

[242]  Rajiv Kishore,et al.  Market reactions to E-business outsourcing announcements: An event study , 2006, Inf. Manag..

[243]  William Yurcik,et al.  A statistical analysis of disclosed storage security breaches , 2006, StorageSS '06.

[244]  Siraj Ahmed Shaikh,et al.  Analysing the Woo-Lam Protocol Using CSP and Rank Functions , 2006, J. Res. Pract. Inf. Technol..

[245]  Nitin Aggarwal,et al.  Do Markets Prefer Open or Proprietary Standards for XML Standardization? An Event Study , 2006, Int. J. Electron. Commer..

[246]  Stefan Savage,et al.  Inferring Internet denial-of-service activity , 2001, TOCS.

[247]  Jeffrey M. Stanton,et al.  Examining employee compliance with organizational surveillance and monitoring , 2006 .

[248]  Tatu Ylönen,et al.  The Secure Shell (SSH) Protocol Architecture , 2006, RFC.

[249]  Jonathan White,et al.  Using Synthetic Decoys to Digitally Watermark Personally-Identifying Data and to Promote Data Security , 2006, Security and Management.

[250]  Samir Chatterjee,et al.  e-Risk Management with Insurance: A Framework Using Copula Aided Bayesian Belief Networks , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).

[251]  Randy Johnson,et al.  Engineering the Tokeneer Enclave Protection Software , 2006 .

[252]  Bernhard Beckert,et al.  Dynamic logic with non-rigid functions a basis for object-oriented program verification , 2006 .

[253]  M. Hitt,et al.  Market value effects of acquisitions involving internet firms: a resource‐based analysis , 2006 .

[254]  Christoph Walther,et al.  The L 1.0 Primer , 2006 .

[255]  James Walden,et al.  Secure software engineering teaching modules , 2006, InfoSecCD '06.

[256]  Harald Ganzinger,et al.  Modular proof systems for partial functions with Evans equality , 2006, Inf. Comput..

[257]  F. Nelson Ford,et al.  Information security: management's effect on culture and policy , 2006, Inf. Manag. Comput. Secur..

[258]  Jason Lee,et al.  The devil and packet trace anonymization , 2006, CCRV.

[259]  William A. Arbaugh,et al.  An Architecture for Specification-Based Detection of Semantic Integrity Violations in Kernel Dynamic Data , 2006, USENIX Security Symposium.

[260]  Henny B. Sipma,et al.  What's Decidable About Arrays? , 2006, VMCAI.

[261]  William A. Arbaugh,et al.  FATKit: A framework for the extraction and analysis of digital forensic data from volatile system memory , 2006, Digit. Investig..

[262]  Ganesh Gopalakrishnan,et al.  Exploiting Symmetry and Transactions for Partial Order Reduction of Rule Based Specifications , 2006, SPIN.

[263]  Wenke Lee,et al.  Secure and Flexible Monitoring of Virtual Machines , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).

[264]  Daniele Sgandurra,et al.  Building Trustworthy Intrusion Detection through VM Introspection , 2007, Third International Symposium on Information Assurance and Security.

[265]  A. B. Ruighaver,et al.  Organisational security culture: Extending the end-user perspective , 2007, Comput. Secur..

[266]  Xuxian Jiang,et al.  Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction , 2007, CCS '07.

[267]  H. Raghav Rao,et al.  Interorganizational information sharing in the airline industry: An analysis of stock market responses to code-sharing agreements , 2007, Inf. Syst. Frontiers.

[268]  Hein S. Venter New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa , 2007, SEC.

[269]  Sushil Jajodia,et al.  Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[270]  Viorica Sofronie-Stokkermans,et al.  Applications of Hierarchical Reasoning in the Verification of Complex Systems , 2007, Electron. Notes Theor. Comput. Sci..

[271]  Dirk Stephan Schweitzer Symbolische Auswertung und Heuristiken zur Verifikation funktionaler Programme , 2007 .

[272]  Ojelanki K. Ngwenyama,et al.  THE CRITICAL SOCIAL THEORY APPROACH TO INFORMATION SYSTEMS: PROBLEMS AND CHALLENGES , 2007 .

[273]  George Kandathil,et al.  Contradictions of Employee Involvement, Information Sharing and Expectations: A Case Study of an Indian Worker Cooperative , 2007 .

[274]  Shuchih Ernest Chang,et al.  Exploring organizational culture for information security management , 2007, Ind. Manag. Data Syst..

[275]  Mo Adam Mahmood,et al.  Employees' Behavior towards IS Security Policy Compliance , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).

[276]  Eric C. Price,et al.  Browser-Based Attacks on Tor , 2007, Privacy Enhancing Technologies.

[277]  Xuxian Jiang,et al.  "Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots , 2007, RAID.

[278]  Brendan Dolan-Gavitt,et al.  The VAD tree: A process-eye view of physical memory , 2007, Digit. Investig..

[279]  Nicholas Hopper,et al.  How much anonymity does network latency leak? , 2007, TSEC.

[280]  Martín Casado,et al.  Peering Through the Shroud: The Effect of Edge Opacity on IP-Based Client Identification , 2007, NSDI.

[281]  Detmar W. Straub,et al.  Specifying Formative Constructs in Information Systems Research , 2007, MIS Q..

[282]  Eirik Albrechtsen,et al.  A qualitative study of users' view on information security , 2007, Comput. Secur..

[283]  Charles V. Wright,et al.  On Web Browsing Privacy in Anonymized NetFlows , 2007, USENIX Security Symposium.

[284]  Mads Andre Bergdal,et al.  Using virtual machines for integrity checking , 2007 .

[285]  Charles V. Wright,et al.  Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces , 2007, NDSS.

[286]  Hajime Inoue,et al.  NetADHICT: A Tool for Understanding Network Traffic , 2007, LISA.

[287]  Sushil Jajodia,et al.  Measuring network security using dynamic bayesian network , 2008, QoP '08.

[288]  Jessica Staddon,et al.  Detecting privacy leaks using corpus-based association rules , 2008, KDD.

[289]  David M. Nicol Performance Analysis of Real Traffic Carried with Encrypted Cover Flows , 2008, 2008 22nd Workshop on Principles of Advanced and Distributed Simulation.

[290]  HRM: A contributor to employee alienation? , 2008 .

[291]  Qing Hu,et al.  Top Management Championship and Individual Behaviour Towards Information Security: An Integrative Model , 2008, ECIS.

[292]  Xuxian Jiang,et al.  Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing , 2008, RAID.

[293]  H. Raghav Rao,et al.  Security analysis of Internet technology components enabling globally distributed workplaces—a framework , 2008, TOIT.

[294]  David Wetherall,et al.  Privacy oracle: a system for finding application leaks with black box differential testing , 2008, CCS.

[295]  Eric Rescorla,et al.  The Transport Layer Security (TLS) Protocol Version 1.2 , 2008, RFC.

[296]  Viorica Sofronie-Stokkermans,et al.  Interpolation in Local Theory Extensions , 2006, Log. Methods Comput. Sci..

[297]  Angelos D. Keromytis,et al.  Taming the Devil: Techniques for Evaluating Anonymized Network Data , 2008, NDSS.

[298]  Zhu Jianming,et al.  A Survivable Scheme for Critical Information System , 2008, 2008 International Conference on Security Technology.

[299]  Joseph Migga Kizza,et al.  Network Intrusion Detection Based on Bayesian Networks , 2008, SEKE.

[300]  Shari Lawrence Pfleeger,et al.  Insiders Behaving Badly , 2008, IEEE Security & Privacy.

[301]  Stefano Paraboschi,et al.  Bayesian-Networks-Based Misuse and Anomaly Prevention System , 2008, ICEIS.

[302]  Saurabh Bagchi,et al.  Determining Placement of Intrusion Detectors for a Distributed Application through Bayesian Network Modeling , 2008, RAID.

[303]  DEEPAK , Bombay Brokers.

[304]  «Luca» , Regìa Parola Utopia.