{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:38:49Z","timestamp":1750307929149,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,9,22]],"date-time":"2006-09-22T00:00:00Z","timestamp":1158883200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,9,22]]},"DOI":"10.1145\/1231047.1231061","type":"proceedings-article","created":{"date-parts":[[2007,4,5]],"date-time":"2007-04-05T19:41:00Z","timestamp":1175802060000},"page":"184-190","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Engaging undergraduates in computer security research"],"prefix":"10.1145","author":[{"given":"John B.","family":"Bowles","sequence":"first","affiliation":[{"name":"University of South Carolina, Columbia, SC"}]},{"given":"Caroline M.","family":"Eastman","sequence":"additional","affiliation":[{"name":"University of South Carolina, Columbia, SC"}]},{"given":"Csilla","family":"Farkas","sequence":"additional","affiliation":[{"name":"University of South Carolina, Columbia, SC"}]}],"member":"320","published-online":{"date-parts":[[2006,9,22]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Version 2.2, CCIMB-2004-01-001","author":"Information Technology Security Evaluation","year":"2004","unstructured":"Common Criteria for Information Technology Security Evaluation , Part 1: Introduction and general model , Version 2.2, CCIMB-2004-01-001 , January 2004 . Common Criteria for Information Technology Security Evaluation, Part 1: Introduction and general model, Version 2.2, CCIMB-2004-01-001, January 2004."},{"unstructured":"Common Criteria Toolbox Version 6 SPARTA Inc. February 2003. Retrieved June 15 2005 from http:\/\/cctoolbox.sparta.com\/.  Common Criteria Toolbox Version 6 SPARTA Inc. February 2003. Retrieved June 15 2005 from http:\/\/cctoolbox.sparta.com\/.","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","volume-title":"Jansen, \"Finding nutrition information on the Web: Coverage vs. Authority,\" Proceedings of the Annual Meeting of the American Society for Information Science and Technology","author":"Doran Susan G","year":"2005","unstructured":"Doran , Susan G . , Samuel de Ycaza , Caroline M. Eastman , and Bernard J . Jansen, \"Finding nutrition information on the Web: Coverage vs. Authority,\" Proceedings of the Annual Meeting of the American Society for Information Science and Technology , Charlotte, North Carolina, October 28- November 2, 2005 . Doran, Susan G., Samuel de Ycaza, Caroline M. Eastman, and Bernard J. Jansen, \"Finding nutrition information on the Web: Coverage vs. Authority,\" Proceedings of the Annual Meeting of the American Society for Information Science and Technology, Charlotte, North Carolina, October 28-November 2, 2005."},{"key":"e_1_3_2_1_4_1","volume-title":"SC","author":"Hopper Christopher","year":"2006","unstructured":"Hopper , Christopher , Marcus Wassmer , Caroline M. Eastman , and John B . Bowles, \"Extending WEBCRED: Assuring the credibility of web sites {abstract},\" Bulletin of the South Carolina Academy of Sciences 2006, Columbia , SC , March 10, 2006 . Hopper, Christopher, Marcus Wassmer, Caroline M. Eastman, and John B. Bowles, \"Extending WEBCRED: Assuring the credibility of web sites {abstract},\" Bulletin of the South Carolina Academy of Sciences 2006, Columbia, SC, March 10, 2006."},{"key":"e_1_3_2_1_5_1","first-page":"267","volume-title":"Eastman, \"UMLpac: An Approach for Integrating Security into UML Class Design,\" Proceedings of the IEEE SoutheastCon","author":"Peterson Matthew J","year":"2006","unstructured":"Peterson , Matthew J . , John B . Bowles , and Caroline M . Eastman, \"UMLpac: An Approach for Integrating Security into UML Class Design,\" Proceedings of the IEEE SoutheastCon 2006 , March 30 - April 2, 2006, Memphis, TN , pp. 267 -- 272 . Peterson, Matthew J., John B. Bowles, and Caroline M. Eastman, \"UMLpac: An Approach for Integrating Security into UML Class Design,\" Proceedings of the IEEE SoutheastCon 2006, March 30 - April 2, 2006, Memphis, TN, pp. 267--272."},{"key":"e_1_3_2_1_6_1","volume-title":"SC","author":"Smith Brittany","year":"2006","unstructured":"Smith , Brittany , Csilla Farkas , Caroline M. Eastman , and John B . Bowles, \"Access control on the semantic web {abstract},\" Bulletin of the South Carolina Academy of Sciences 2006, Columbia , SC , March 10, 2006 . Smith, Brittany, Csilla Farkas, Caroline M. Eastman, and John B. Bowles, \"Access control on the semantic web {abstract},\" Bulletin of the South Carolina Academy of Sciences 2006, Columbia, SC, March 10, 2006."},{"key":"e_1_3_2_1_7_1","volume-title":"National Information Assurance Acquisition Policy. Retrieved","author":"National Security Telecommunications and Information Systems Security Policy No. 11","year":"2005","unstructured":"National Security Telecommunications and Information Systems Security Policy No. 11 , Revised Fact Sheet , National Information Assurance Acquisition Policy. Retrieved June 21, 2005 , from http:\/\/niap.nist.gov\/cc-scheme\/nstissp_11_revised_factsheet.pdf. National Security Telecommunications and Information Systems Security Policy No. 11, Revised Fact Sheet, National Information Assurance Acquisition Policy. Retrieved June 21, 2005, from http:\/\/niap.nist.gov\/cc-scheme\/nstissp_11_revised_factsheet.pdf."},{"key":"e_1_3_2_1_8_1","first-page":"273","volume-title":"Eastman, \"Using the Common Criteria to Elicit Security Requirements with Use Cases,\" Proceedings of the IEEE SoutheastCon","author":"Ware Michael S","year":"2006","unstructured":"Ware , Michael S . , John B . Bowles , and Caroline M . Eastman, \"Using the Common Criteria to Elicit Security Requirements with Use Cases,\" Proceedings of the IEEE SoutheastCon 2006 , March 30 - April 2, 2006, Memphis, TN , pp. 273 -- 278 . Ware, Michael S., John B. Bowles, and Caroline M. Eastman, \"Using the Common Criteria to Elicit Security Requirements with Use Cases,\" Proceedings of the IEEE SoutheastCon 2006, March 30 - April 2, 2006, Memphis, TN, pp. 273--278."},{"key":"e_1_3_2_1_9_1","volume-title":"Eastman, \"Automatic evaluation of credibility on the Web,\" Proceedings of the Annual Meeting of the American Society for Information Science and Technology","author":"Wassmer Marcus","year":"2005","unstructured":"Wassmer , Marcus and Caroline M . Eastman, \"Automatic evaluation of credibility on the Web,\" Proceedings of the Annual Meeting of the American Society for Information Science and Technology , Charlotte, North Carolina, October 28- November 2, 2005 . Wassmer, Marcus and Caroline M. Eastman, \"Automatic evaluation of credibility on the Web,\" Proceedings of the Annual Meeting of the American Society for Information Science and Technology, Charlotte, North Carolina, October 28-November 2, 2005."}],"event":{"acronym":"InfoSecCD06","name":"InfoSecCD06: 2006 Information Security Curriculum Development Conference","location":"Kennesaw Georgia"},"container-title":["Proceedings of the 3rd annual conference on Information security curriculum development"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1231047.1231061","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1231047.1231061","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:51:53Z","timestamp":1750258313000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1231047.1231061"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,9,22]]},"references-count":9,"alternative-id":["10.1145\/1231047.1231061","10.1145\/1231047"],"URL":"https:\/\/doi.org\/10.1145\/1231047.1231061","relation":{},"subject":[],"published":{"date-parts":[[2006,9,22]]},"assertion":[{"value":"2006-09-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}