Articles Tagged: Security and privacy
Articles & Features
COLUMN: Letter from the editors
Three wishes for the future of devices
By Diane Golay, September 2019
SECTION: Features
Computer scientists in action: Sauvik Das, usable security & privacy
By Sauvik Das, October 2018
COLUMN: Careers
So you want to be an elite hacker? finding your career in cyber operations
By Charles Clancy, July 2018
DEPARTMENT: Blogs
Security bugs in large software ecosystems
The XRDS blog highlights a range of topics from security and privacy to neuroscience. Selected blog posts, edited for print, will be featured in every issue. Please visit xrds.acm.org/blog to read each post in its entirety. Keeping with our theme of professional development, included is a guest post on how to craft a publishable research paper.
By Dimitris Mitropoulos, December 2013
DEPARTMENT: Labz
Cryptography, security and privacy (CrySP) research group
By Atif Khan, December 2013
SECTION: Features
Understanding the Data Environment
Protecting data privacy and anonymity requires a better understanding of the conditions and mechanisms under which they may be threatened.
By Elaine Mackey, Mark Elliot, September 2013
DEPARTMENT: Labz
CyLab Usable Privacy and Security Laboratory (Pittsburgh, PA)
CUPS, a research lab at Carnegie Mellon University, is dedicated to addressing the broad array of challenges collectively called "usable privacy and security."
By Rich Shay, September 2013
The XRDS Blog
The newly launched XRDS blog highlights a range of topics from conference overviews to privacy and security, from HCI to cryptography. Selected blog posts, edited for print, will be featured in every issue. Please visit xrds.acm.org/blog to read each post in its entirety.
By Wolfgang Richter, Dimitris Mitropoulos, December 2012
Blogs
By Matthew Kay, Dimitris Mitropoulos, Wolfgang Richter, Lora Oehlberg, Lea Rosen, September 2012
SECTION: Features
Why I don't rob banks for a living
Can game theory 'prove' that online robbery is irrational?
By Nicole Immorlica, March 2011
What can gold farmers teach us about criminal networks?
By observing how covert financial networks operate in online games like World of Warcraft, we can learn about how they might function offline.
By Brian Keegan, Muhammad Aurangzeb Ahmad, Dmitri Williams, Jaideep Srivastava, Noshir Contractor, March 2011
Catching bad guys with graph mining
Suspicious network patterns may be the key to detecting criminals and fraudsters on e-commerce sites.
By Polo Chau, March 2011
An interview with Greg Schwartz
The CIO of USAA, a full-service, branchless financial services operation, sees much more to banking than e-transactions.
By James Stanier, March 2011
Cloud computing in plain English
By Ryan K. L. Ko, March 2010
State of security readiness
Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction. With this pay-as-you-go model of computing, cloud solutions are seen as having the potential to both dramatically reduce costs and increase the rapidity of development of applications.
By Ramaswamy Chandramouli, Peter Mell, March 2010
Privacy challenges and solutions in the social web
Research related to online social networks has addressed a number of important problems related to the storage, retrieval, and management of social network data. However, privacy concerns stemming from the use of social networks, or the dissemination of social network data, have largely been ignored. And with more than 250 million active Facebook (http://facebook.com) users, nearly half of whom log in at least once per day [5], these concerns can't remain unaddressed for long.
By Grigorios Loukides, Aris Gkoulalas-Divanis, December 2009
Using software watermarking to discourage piracy
By Ginger Myles, October 2005
Introduction
By William Stevenson, May 2005
Obfuscation of the standard XOR Encryption algorithm
By Zachary A. Kissel, May 2005
Introduction
By William Stevenson, December 2004
Learning how to tell ham from spam
By George Sakkis, December 2004
Identifying spam without peeking at the contents
By Shlomo Hershkop, Salvatore J. Stolfo, December 2004
Peer-to-peer collaborative spam detection
By Nathan Dimmock, Ian Maddison, December 2004
Security, privacy, and anonymity
By Thomas Wright, December 2004
Public key cryptography
By Pradosh Kumar Mohapatra, September 2000
Introduction to Linux networking and security
By Wei-Mei Shyr, Brian Borowski, September 1999
Protecting the integrity of agents
By Michael J. Grimley, Brian D. Monroe, June 1999
Book review:Bandits on the information Superhighway
By Paul Rubel, September 1996
Computer security past and future
By Michael Neuman, Diana Moore, April 1996
An introduction to intrusion detection
By Aurobindo Sundaram, April 1996
Trust mechanisms for Hummingbird
By Jason Evans, Deborah Frincke, April 1996
Electronic voting
By Lorrie Faith Cranor, April 1996
Mutual authenticating protocol with key distribution in client/server environment
The explosive growth of networked and internetworked computer systems during the past decade has brought about a need for increased protection mechanisms. This paper discusses three authentication protocols that incorporate the use of methods that present effective user authentication. The first two protocols have been previously discussed in the literature; the third protocol draws from the first two and others to produce an authentication scheme that provides both mutual authentication and secure key distribution which is easy to use, is compatible with present operating systems, is transparent across systems, and provides password file protection.
By Charles Cavaiani, Jim Alves-Foss, April 1996
Network security, filters and firewalls
By Darren Bolding, September 1995
Book review: Fatal Defect: Chasing Killer Computer Bug
By Saveen Reddy, September 1995