Volume 8, Number 1, January/February 2010
: Silver Bullet Talks with Christofer Hoff.
: Opportunities in White-Box Cryptography.
Volume 8, Number 2, March/April 2010
: Silver Bullet Talks with Gillian Hayes.
Volume 8, Number 3, May - June 2010
: XTS: A Mode of AES for Encrypting Hard Disks.
: Cyber-Threat Proliferation: Today's Truly Pervasive Global Epidemic.
: The Next Malware Battleground: Recovery After Unknown Infection.
: Son of Carterfone: Network Neutrality or Regulation?
Volume 8, Number 4, July - August 2010
: Silver Bullet Talks with Richard Clarke.
Lori M. Kaufman
: Can Public-Cloud Security Meet Its Unique Challenges?
: Degradation and Subversion through Subsystem Attacks.
Volume 8, Number 5, September - October 2010
: Silver Bullet Talks with Greg Morrisett.
Hui Jun Wu
: Kernel Service Protection for Client Security.
: Automated Control System Security.
: Technology, Training, and Transformation.
: Don't Trust. And Verify: A Security Architecture Stack for the Cloud.
Volume 8, Number 6, November - December 2010
, Ivan Arce
: Guest Editors' Introduction: In Cloud Computing We Trust - But Should We?
: Cloud Provider Transparency: An Empirical Evaluation.
Fred H. Cate
: Government Access to Private-Sector Data.
: Logical Methods in Security and Privacy.
L. Jean Camp
: Identity Management's Misaligned Incentives.