By Topic

IEEE Security & Privacy

Issue 1 • Jan.-Feb. 2017

Filter Results

Displaying Results 1 - 22 of 22
  • Front Covers 
  • Front Cover

    Publication Year: 2017, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (469 KB)
    Freely Available from IEEE
  • House Advertisement 
  • TechIgnite

    Publication Year: 2017, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (335 KB)
    Freely Available from IEEE
  • Table of Contents 
  • Table of Contents

    Publication Year: 2017, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (532 KB)
    Freely Available from IEEE
  • From the Editors 
  • Security and Privacy More Crucial than Ever

    Publication Year: 2017, Page(s):3 - 4
    Request permission for commercial reuse | PDF file iconPDF (137 KB)
    Freely Available from IEEE
  • Masthead 
  • Masthead

    Publication Year: 2017, Page(s): 5
    Request permission for commercial reuse | PDF file iconPDF (106 KB)
    Freely Available from IEEE
  • Reviewer Thanks 
  • Reviewer Thanks

    Publication Year: 2017, Page(s):6 - 7
    Request permission for commercial reuse | PDF file iconPDF (206 KB)
    Freely Available from IEEE
  • Interview 
  • Silver Bullet Talks with Marie Moe

    Publication Year: 2017, Page(s):8 - 11
    Request permission for commercial reuse | PDF file iconPDF (820 KB)
    Freely Available from IEEE
  • Moving Forward 
  • Driving Habits Data: Location Privacy Implications and Solutions

    Publication Year: 2017, Page(s):12 - 20
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1036 KB)

    A proof-of-concept device can provide auto insurers with the aggregate statistics they seek without affecting driver privacy by transmitting data points collected during a trip. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • House Advertisement 
  • Call for Papers: Special Issue on Hacking without Humans

    Publication Year: 2017, Page(s): 21
    Request permission for commercial reuse | PDF file iconPDF (169 KB)
    Freely Available from IEEE
  • Moving Forward 
  • Overview of Mobile Containerization Approaches and Open Research Directions

    Publication Year: 2017, Page(s):22 - 31
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (363 KB)

    When a mobile device is used for both personal and business purposes, securing enterprise content and preserving employees' privacy are vital. Containerization is a promising approach to address such requirements. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Practical Evaluation of Internet Systems' Security Mechanisms

    Publication Year: 2017, Page(s):32 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (680 KB)

    A proposed Internet systems security layer with context-oriented security mechanisms reduces the risk associated with possible vulnerabilities. A metric of the system trust level is proposed, and then evaluated according to a university Internet system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • House Advertisement 
  • Call for Papers: Special Issue on Digital Forensics

    Publication Year: 2017, Page(s): 41
    Request permission for commercial reuse | PDF file iconPDF (170 KB)
    Freely Available from IEEE
  • Moving Forward 
  • Cloud Data Auditing Techniques with a Focus on Privacy and Security

    Publication Year: 2017, Page(s):42 - 51
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (591 KB)

    Nowadays, large amounts of data are stored with cloud service providers. Third-party auditors (TPAs), with the help of cryptography, are often used to verify this data. However, most auditing schemes don't protect cloud user data from TPAs. A review of the state of the art and research in cloud data auditing techniques highlights integrity and privacy challenges, current solutions, and future rese... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Security Development Lifecycle in the Context of Accreditation Policies and Standards

    Publication Year: 2017, Page(s):52 - 57
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (345 KB)

    The proposed security development lifecycle (SecDLC) model delivers a perpetual cycle of information security management and refinement. Using real-world examples, the authors show how SecDLC ensures the goals of preserving, monitoring, and improving security practices, policies, and standards in private and public sectors. The authors describe the four phases of SecDLC, comparing and contrasting ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Seven Years of Software Vulnerabilities: The Ebb and Flow

    Publication Year: 2017, Page(s):58 - 65
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (470 KB)

    A seven-year study using National Vulnerability Database records determined not only which software vulnerabilities were the most common and most severe but also which ones should be prevented first to gain maximum benefit. By focusing on just seven vulnerability categories, security professionals could prevent 60 percent of all software vulnerabilities. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Spotlight 
  • Security & Privacy Week Interviews, Part 3

    Publication Year: 2017, Page(s):66 - 74
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (817 KB)

    IEEE Security & Privacy met with several interesting speakers at Security & Privacy Week (SPW) 2016 in Darmstadt, Germany. This issue features Srdan Capkun, computer science professor at ETH Zurich; Jeremy Epstein, a computer scientist at SRI International; George Danezis, security and privacy engineering professor at University College London; William Enck, associate professor at North Ca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Systems Attacks and Defenses 
  • Designing Application Permission Models that Meet User Expectations

    Publication Year: 2017, Page(s):75 - 79
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (322 KB)

    How should applications legitimately requiring access to sensitive resources to carry out their functionality be granted access to those resources? The answer to this question depends on users. This article introduces user-driven access control, an alternate permission model that adheres to the principle of least privilege while reducing the burden on users to make explicit permission decisions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • In Focus 
  • An Opinion on the "Report on Securing and Growing the Digital Economy"

    Publication Year: 2017, Page(s):80 - 85
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (179 KB)

    In December 2016, the US Commission on Enhancing National Cybersecurity released the "Report on Securing and Growing the Digital Economy" in response to challenges posed by cyberthreats. This opinion piece details the report's six imperatives, which include recommendations and action items intended to strengthen US cybersecurity. The author ends with a thoughtful critique of areas in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • House Advertisement 
  • Focus on Your Job Search

    Publication Year: 2017, Page(s): 86
    Request permission for commercial reuse | PDF file iconPDF (258 KB)
    Freely Available from IEEE
  • Last Word 
  • Mutual Dependence Demands Mutual Sharing

    Publication Year: 2017, Page(s):87 - 88
    Request permission for commercial reuse | PDF file iconPDF (206 KB)
    Freely Available from IEEE
  • Back Covers 
  • NEW MEMBERSHIP OPTIONS FOR A BETTER FIT

    Publication Year: 2017, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • IEEE Security & Privacy

    Publication Year: 2017, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (912 KB)
    Freely Available from IEEE

Aims & Scope

IEEE Security & Privacy’s primary objective is to stimulate and track advances in security, privacy, and dependability and present these advances in a form that can be useful to a broad cross-section of the professional community—ranging from academic researchers to industry practitioners. It provides articles with both a practical and research bent by the top thinkers in the field of security and privacy, along with case studies, surveys, tutorials, columns, and in-depth interviews and podcasts for the information security industry.
 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Ahmad-Reza Sadeghi
Technische Universität Darmstadt
ahmad.sadeghi@trust.tu-darmstadt.de