Con: Features Identity Management I'm Pc01002/ SpringPeeper/ ED2881.6; Who are You? / Susan Landau and Deirdre K. Mulligan. p.13 The Venn of identity: Options and Issues in Frederated Identity Management / Eve Maler and Drummond Reed. p.16 The Seven Flaws of Identity Management: Usubility and Security Challenges / Racha Dhamija and Lisa Dusseault. p. 24 Biometrics in Identity Management Systems / James L. Wayman. p. 30 Privacy and Identity Management / Marit Hansen, Ari Schwartz and Alissa Cooper. p. 38 Identity Management, Privacy, and Price Dsicrimination / Alessandro Acquisti. p. 46 Use Cases for Identity Management in E- Government / Robin McKenzie, Malcolm Crompton. p. 51 Reverse Engineering Hindering Reverse Engineering: Thinking Outside the Box / Thomas E. Dube, Bobby D. Birrer, Richard A. Raines Rusty O. Baldwin, Barry E. Mullins, Robert F. Bennington and Chistopher E. Reuter. p. 58 Departments From the Editors Leasson from Electrification for identification / Marc Donner. p. 3 Books Reviews Sharp Figures, Fuzzy Purpose / Simson Garfinkel. p. 5 Interview Silver Bullet Talks with Ed Amoroso / Gary McGraw. p. 6 News Briefs News Briefs / Brandi Ortega. p. 10 Education Why and How to Perform Fraud Experiments / Markus Jakobsson , Peter Finn, and Nathaniel Jhonson. p. 69 Crypto Corner Cryptographic Test Correction / Eric Leviell and David Naccache. p. 69 Basic Training Securiry in Mobile Ad Hoc Networks / Marco Carvalho. p. 72 Attack Trends New Hurdles for Valnerability Disclosure / Dave McKinney. p. 76 Secure Systems The Hidden Difficulties of Walching and Rebuilding Networks / Michael E. Locasto and Angelos Stavrou. p. 79 Building Security In Dynamic Security Assertion Markup Language: Simplifying Single Sign-On / Patrik Harding, Leif Johansson and Nate Klingenstein. p. 83 IEEE Computer Society Information. p. 75 Advertiser Index. p. 82 Columns For Good Measure Beware the IDs of March / Daniel E. Geer Jr. and Daniel G. Conway. p. 87 Clear Text Security by Checklist / Steve Bellovin. p.88