Reviewers


Marshall Abrams, The MITRE Corporation, USA
Tuomas Aura, Microsoft Research, United Kingdom
Rebecca Bace, Infidel, Inc., USA
Dirk Balfanz, Palo Alto Research Center, USA
Shimshon Berkovits, The MITRE Corporation, USA
Jonathan Beskin, Trusted Computer Solutions, Inc., USA
Matt Bishop Dept. of Computer Science, UC Davis, USA
Danilo Bruschi, Università degli Studi di Milano, Italy
Tim Bond, webMethods, USA
Germano Caronni, Sun Laboratories, USA
Sekar Chandersekaran, Institute for Defense Analyses, USA
David Chizmadia, Promia, Inc., USA
Michael Clifford, The Aerospace Corporation, USA
Aaron Cohen, JOTA System Security Consultants Inc., Canada
Antonio Corradi, University of Bologna, Italy
Malcolm Corney, Queensland University of Technology, Australia
Ed Coyne, Science Applications International Corporation, USA
Sabrina De Capitani di Vimercati, University of Milan, Italy
Thomas E. Daniel, Iowa State University, USA
Mary Denz, Air Force Research Laboratory, USA
Jeremy Epstein, webMethods, USA
Pete Epstein, SAIC, USA
Daniel P. Faigin, The Aerospace Corporation, USA
Eugenio Faldella, University of Bologna, Italy
Jan Filsinger, USA
Stefan Fischer, TU Braunschweig, Germany
Steven J. Greenwald, Independent Consultant, USA
David Gresty, Liverpool John Moores University, United Kingdom
Peter Gutmann, University of Auckland, New Zealand
Ramzi A. Haraty, Lebanese American University, Lebanon
Jody Heaney, MITRE, USA
Heather Hinton, IBM
Wesley Higaki, Symantec Corporation, USA
Dr. Dale M. Johnson, The MITRE Corporation, USA
Wayne Jansen, NIST, USA
Phil Janson, IBM Zurich Research Lab, Switzerland
Klaus Julisch, IBM Research, Switzerland
Stefan Koepsell, University of Technology, Dresden, Germany
Axel Kern, Beta Systems Software AG, Germany
Konstantin Knorr, Germany
Calvin Ko, Network Associates Laboratories, USA
Christopher Kruegel, University of California, Santa Barbara, USA
Hanno Langweg, University of Bonn, Germany
Cynthia Irvine, Naval Postgraduate School, USA
Samir Kapuria, @stake Inc., USA
Carl Landwehr, National Science Foundation (on loan from Mitretek Systems), USA
Hanno Langweg, University of Bonn, Germany
Ben Laurie, United Kingdom
Dustin Lee, USA
Herbert Leitold, A-SIT, Austria
Michah Lerner AT&T Labs and Columbia University, USA
Albert Levi, Sabanci University, Turkey
David Levin, BBN Technologies, USA
Tim Levin, Naval Postgraduate School, USA
Song Li, Computer Science Department, UMass Amherst, USA
Steve Lipner, Microsoft Corporation, USA
Peng Liu, Penn State University, USA
Chenghuai Lu, Georgai Institute of Technology, USA
Emil Lupu, Imperial College London, United Kingdom
Andre L. M. dos Santos, Georgia Institute of Technology, USA
Laurent-Maknavicius, INT, France
Andrew D. Marshall, TD Bank Financial Group, Canada
Vashek Matyas, Masaryk University Brno, Czech Republic
John McDermott, Naval Research Laboratory, USA
Gary McGraw, Cigital, USA
John McHugh, CERT, USA
Rebecca Montanari, DEIS - University of Bologna, Italy
Jalal Al-Muhtadi, University of Illinois at Urbana-Champaign, USA
Darren Mutz, University of California, Santa Barbara, USA
Prasad Naldurg, University of Illinois at Urbana-Champaign, USA
Dr M J Nash, Gamma Secure Systems Ltd, United Kingdom
Pekka Nikander, Ericsson Research, Finland
LouAnna Notargiacomo, The MITRE Corporation, USA
Sofie Nystrom, Center for Information Security, Norway
Marcus Oestreicher, IBM Research, Switzerland
Rolf Oppliger, eSECURITY Technologies, Switzerland
Matthew Schmid, Cigital, Inc., USA
Olivier Paul, Institut National des Telecommunications, France
Reinhard Posch, Federal Chief Information Office, Austria
Marco Prandini, DEIS - Università di Bologna, Italy
Valentin Razmov, University of Washington, USA
Marc Rennhard, ETH Zurich, Switzerland
Emilia Rosti, Universita` Degli Studi di Milano, Italy
Bernard Roussely, DGA/CEL, France
Jeff Rowe, U. C. Davis, USA
Reiner Sailer, IBM T. J. Watson Research Center, USA
Pierangela Samarati, Universita` di Milano, Italy
Geetanjali Sampemane, University of Illinois at Urbana-Champaign, USA
Edward Schneider, Institute for Defense Analyses, USA
Andreas Schaad, University of York, United Kingdom
Matthew Schmid, Cigital, Inc., USA
Christoph Schuba, Sun Microsystems, Inc., Germany
Gregg Schudel, Cisco Systems, Inc., USA
Matthew Schmid, Cigital, Inc., USA
Cristina Serban, AT&T Labs, USA
Qi Shi, Liverpool John Moores University, United Kingdom
Abhishek Singh, College of Computing, Georgia Institute of Technology, USA
Morris Sloman, Imperial College London, United Kingdom
Sean Smith, Dartmouth College, USA
Gregg Tally, Network Associates, Inc., USA
Laura S. Tinnel, Teknowledge Corporation, USA
Dan Thomsen, Secure Computing Corporation, USA
Fredrik Valeur, UC Santa Barbara, USA
Mark Vandenwauver, IBM, USA
John Viega, Secure Software, Inc., USA
Giovanni Vigna, UCSB, USA
Holger Vogt, Darmstadt University of Technology, Germany
Marcel Waldvogel, IBM, Switzerland
Tao Wan, Carleton University, Canada
Jie Wang, University of Massachusetts Lowell, USA
Xunhua Wang, James Madison University, USA
Nathalie Weiler, Swiss Federal Institute of Technology Zurich, Switzerland
David A. Wheeler, Institute for Defense Analyses, USA
David M. Wheeler, Intel Corporation, USA
Matthew Williamson, Hewlett-Packard Labs, United Kingdom
Simon Wiseman, QinetiQ, United Kingdom
Stephen D. Wolthusen, Fraunhofer-IGD, Darmstadt, Germany
Weijiang Yu, The University of Texas at Austin, USA
Diego Zamboni, IBM, Switzerland
Weiliang Zhao, University of Western Sydney, Australia
Mary Ellen Zurko, IBM Software Group, USA