Reading list

Papers should be available from Pitt domain.

 

Week 1 (Sept 5 - 9)

  1. James B. D. Joshi, Walid G. Aref, Arif Ghafoor and Eugene H. Spafford, "Security models for web-based applications", Communications of the ACM , 44, 2 (Feb. 2001), Page 38-44. (PDF version).
  2. James Joshi, Arif Ghafoor, Walid G. Aref, Eugene H. Spafford: Digital Government Security Infrastructure Design Challenges. IEEE Computer 34(2): 66-72 (2001) (PDF Version)

3.      Trcek, Denis  Trust Management in the Pervasive Computing Era , IEEE Security and Privacy, 2011.

4.      Hassan Takabi, James B. D. Joshi, Gail-Joon Ahn: Security and Privacy Challenges in Cloud Computing Environments. IEEE Security & Privacy 8(6): 24-31 (2010)