XRDS

Crossroads The ACM Magazine for Students

Sign In

Association for Computing Machinery

Articles Tagged: Security and privacy

Articles & Features

DEPARTMENT: Labz

Accessibility, justice, and privacy for technology

By Jasmine DeHart, January 2022

PDF | HTML | In the Digital Library

COLUMN: Letter from the editors

Three wishes for the future of devices

By Diane Golay, September 2019

PDF | HTML | In the Digital Library

Has device security always been in season?

DEPARTMENT: Back

Has device security always been in season?

By Daniela Zieba, September 2019

PDF | HTML | In the Digital Library

DEPARTMENT: Hello world

The holy grail of online identity

By Pushkaraj Bhirud, January 2019

PDF | HTML | In the Digital Library

Computer scientists in action: Sauvik Das, usable security & privacy

So you want to be an elite hacker? finding your career in cyber operations

Alice and Bob in the new world

COLUMN: INIT

Alice and Bob in the new world

By Shashank Agrawal, March 2015

PDF | HTML | In the Digital Library

Defending students from cyber crime

DEPARTMENT: Updates

Defending students from cyber crime

By Michael Zuba, March 2014

PDF | HTML | In the Digital Library

Security bugs in large software ecosystems

DEPARTMENT: Blogs

Security bugs in large software ecosystems

The XRDS blog highlights a range of topics from security and privacy to neuroscience. Selected blog posts, edited for print, will be featured in every issue. Please visit xrds.acm.org/blog to read each post in its entirety. Keeping with our theme of professional development, included is a guest post on how to craft a publishable research paper.

By Dimitris Mitropoulos, December 2013

PDF | HTML | In the Digital Library

Cryptography, security and privacy (CrySP) research group

Keeping Your Little Back Shop

COLUMN: INIT

Keeping Your Little Back Shop

By Maire Byrne-Evans, Christine Task, September 2013

PDF | HTML | In the Digital Library

Understanding the Data Environment

SECTION: Features

Understanding the Data Environment

Protecting data privacy and anonymity requires a better understanding of the conditions and mechanisms under which they may be threatened.

By Elaine Mackey, Mark Elliot, September 2013

PDF | HTML | In the Digital Library

CyLab Usable Privacy and Security Laboratory (Pittsburgh, PA)

DEPARTMENT: Labz

CyLab Usable Privacy and Security Laboratory (Pittsburgh, PA)

CUPS, a research lab at Carnegie Mellon University, is dedicated to addressing the broad array of challenges collectively called "usable privacy and security."

By Rich Shay, September 2013

PDF | HTML | In the Digital Library

Data security in the cloud environment

DEPARTMENT: Blogs

Data security in the cloud environment

By Dimitris Mitropoulos, March 2013

PDF | HTML | In the Digital Library

The XRDS Blog

The XRDS Blog

The newly launched XRDS blog highlights a range of topics from conference overviews to privacy and security, from HCI to cryptography. Selected blog posts, edited for print, will be featured in every issue. Please visit xrds.acm.org/blog to read each post in its entirety.

By Wolfgang Richter, Dimitris Mitropoulos, December 2012

PDF | HTML | In the Digital Library

Blogs

Blogs

By Matthew Kay, Dimitris Mitropoulos, Wolfgang Richter, Lora Oehlberg, Lea Rosen, September 2012

PDF | HTML | In the Digital Library

Why I don't rob banks for a living

SECTION: Features

Why I don't rob banks for a living

Can game theory 'prove' that online robbery is irrational?

By Nicole Immorlica, March 2011

PDF | HTML | In the Digital Library

What can gold farmers teach us about criminal networks?

What can gold farmers teach us about criminal networks?

By observing how covert financial networks operate in online games like World of Warcraft, we can learn about how they might function offline.

By Brian Keegan, Muhammad Aurangzeb Ahmad, Dmitri Williams, Jaideep Srivastava, Noshir Contractor, March 2011

PDF | HTML | In the Digital Library

Catching bad guys with graph mining

Catching bad guys with graph mining

Suspicious network patterns may be the key to detecting criminals and fraudsters on e-commerce sites.

By Polo Chau, March 2011

PDF | HTML | In the Digital Library

An interview with Greg Schwartz

An interview with Greg Schwartz

The CIO of USAA, a full-service, branchless financial services operation, sees much more to banking than e-transactions.

By James Stanier, March 2011

PDF | HTML | In the Digital Library

Cloud computing in plain English

State of security readiness

State of security readiness

Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction. With this pay-as-you-go model of computing, cloud solutions are seen as having the potential to both dramatically reduce costs and increase the rapidity of development of applications.

By Ramaswamy Chandramouli, Peter Mell, March 2010

PDF | HTML | In the Digital Library

Privacy challenges and solutions in the social web

Privacy challenges and solutions in the social web

Research related to online social networks has addressed a number of important problems related to the storage, retrieval, and management of social network data. However, privacy concerns stemming from the use of social networks, or the dissemination of social network data, have largely been ignored. And with more than 250 million active Facebook (http://facebook.com) users, nearly half of whom log in at least once per day [5], these concerns can't remain unaddressed for long.

By Grigorios Loukides, Aris Gkoulalas-Divanis, December 2009

PDF | HTML | In the Digital Library

Introduction

By William Stevenson, May 2005

PDF | HTML | In the Digital Library

Introduction

By William Stevenson, December 2004

PDF | HTML | In the Digital Library

Identifying spam without peeking at the contents

By Shlomo Hershkop, Salvatore J. Stolfo, December 2004

PDF | HTML | In the Digital Library

Peer-to-peer collaborative spam detection

By Nathan Dimmock, Ian Maddison, December 2004

PDF | HTML | In the Digital Library

Security, privacy, and anonymity

By Thomas Wright, December 2004

PDF | HTML | In the Digital Library

Public key cryptography

By Pradosh Kumar Mohapatra, September 2000

PDF | HTML | In the Digital Library

Introduction to Linux networking and security

By Wei-Mei Shyr, Brian Borowski, September 1999

PDF | HTML | In the Digital Library

Protecting the integrity of agents

By Michael J. Grimley, Brian D. Monroe, June 1999

PDF | HTML | In the Digital Library

Computer security past and future

By Michael Neuman, Diana Moore, April 1996

PDF | HTML | In the Digital Library

Trust mechanisms for Hummingbird

By Jason Evans, Deborah Frincke, April 1996

PDF | HTML | In the Digital Library

Electronic voting

By Lorrie Faith Cranor, April 1996

PDF | HTML | In the Digital Library

Mutual authenticating protocol with key distribution in client/server environment

The explosive growth of networked and internetworked computer systems during the past decade has brought about a need for increased protection mechanisms. This paper discusses three authentication protocols that incorporate the use of methods that present effective user authentication. The first two protocols have been previously discussed in the literature; the third protocol draws from the first two and others to produce an authentication scheme that provides both mutual authentication and secure key distribution which is easy to use, is compatible with present operating systems, is transparent across systems, and provides password file protection.

By Charles Cavaiani, Jim Alves-Foss, April 1996

PDF | HTML | In the Digital Library