By Topic

IEEE Security & Privacy

Issue 1 • Jan.-Feb. 2004

Filter Results

Displaying Results 1 - 25 of 26
  • Voting security and technology

    Publication Year: 2004
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (196 KB) | HTML iconHTML

    Voting seems like the perfect application for technology, but actually applying it is harder than it first appears. To ensure that voters can vote honestly, they need anonymity, which requires a secret ballot. Through the centuries, different civilizations have done their best with the available technologies. Stones and pottery shards dropped in Greek vases led to paper ballots dropped in sealed b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Online monitoring: security or social control?

    Publication Year: 2004, Page(s):81 - 83
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (236 KB) | HTML iconHTML

    Imagine your big brother habitually following you around "for your own good" and snooping into everything that you, a mature adult, choose to do. Now imagine discovering that he couldn't do so if you wore blue socks rather than brown. Wouldn't you switch to blue socks as a matter of principle? Online monitoring today presents a similar situation. You can indeed modify your online conduct to preser... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How Secure Is Your Wireless Network? Safeguarding Your Wi-Fi LAN [Book Review]

    Publication Year: 2004, Page(s): 20
    Request permission for commercial reuse | PDF file iconPDF (184 KB)
    Freely Available from IEEE
  • Anti-honeypot technology

    Publication Year: 2004, Page(s):76 - 79
    Cited by:  Papers (25)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (463 KB) | HTML iconHTML

    Spammers continually scan the Internet for open proxy relays: by using these open relays, they can obscure their originating IP address and remain anonymous. However, when a spammer comes across a service on a honeypot, that honeypot can collect valuable information about the spammer's true identity and help unmask it. In response to the threat that honeypots pose to spammers, the first commercial... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Can we win the security game?

    Publication Year: 2004, Page(s):10 - 12
    Request permission for commercial reuse | PDF file iconPDF (355 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Grand challenges in information security: process and output

    Publication Year: 2004, Page(s):69 - 71
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (194 KB) | HTML iconHTML

    Even casual observers can see that our society's computing infrastructure has significant security problems. Technical sources such as CERT, BugTraq, and the Risks Digest - not to mention the popular media - regularly catalog critical vulnerabilities in deployed software. Unless we figure out how to build trustworthy systems in the real world, we're in trouble. Recognizing that fact, the Computing... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Newsbriefs

    Publication Year: 2004, Page(s):18 - 19
    Request permission for commercial reuse | PDF file iconPDF (181 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The next digital divide

    Publication Year: 2004, Page(s): 5
    Request permission for commercial reuse | PDF file iconPDF (173 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Does the common criteria paradigm have a future? [security and privacy]

    Publication Year: 2004, Page(s):64 - 65
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (205 KB) | HTML iconHTML

    In IEEE Security & Privacy's July/August 2003 issue, the author discussed the then upcoming 4th International Common Criteria Conference, which was held in Stockholm in September. Reviewing the CD of the presentations, however, he is left with the strong impression that, while a good idea when promulgated five years ago (after five years' effort by the six founding nations), the CC enterprise migh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Beyond Fear: Thinking Sensibly About Security in an Uncertain World [Book Review]

    Publication Year: 2004, Page(s):20 - 21
    Request permission for commercial reuse | PDF file iconPDF (322 KB) | HTML iconHTML
    Freely Available from IEEE
  • E-voting security: The electoral dialectic gets hot

    Publication Year: 2004, Page(s):14 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (786 KB) | HTML iconHTML

    Peter Neumann, principal scientist at the SRI International Computer Science Laboratory, has been warning about electronic voting systems' insecurity for several years. Neumann is still at it, and still alarmed. "I've been fighting this battle for 20 years. What's new?" he asks. The question is now rhetorical, for this past December has seen an explosion of public activity around the issue. Neuman... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Considering defense in depth for software applications

    Publication Year: 2004, Page(s):72 - 75
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (488 KB) | HTML iconHTML

    Despite efforts to develop processes and technologies that enhance software application security, to date, no one has found a "silver-bullet" solution or set of solutions that solve this complex problem - and there don't appear to be any on the horizon. As a result, perhaps researchers and developers should consider a defense-in-depth strategy and determine if it provides a more resilient and cost... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interface

    Publication Year: 2004, Page(s):7 - 9
    Request permission for commercial reuse | PDF file iconPDF (228 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • More bang for the bug: An account of 2003's attack trends

    Publication Year: 2004, Page(s):66 - 68
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB) | HTML iconHTML

    We can find considerable information security debris in the wake of 2003's attack trends and new security flaws. New and serious vulnerabilities were discovered, disclosed, and subsequently exploited in many ways - from simple, straightforward methods to more advanced and innovative exploitation techniques. This paper examines a handful of the more than 3,000 unique vulnerabilities and 115,000 sec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • E-voting security

    Publication Year: 2004, Page(s):22 - 23
    Request permission for commercial reuse | PDF file iconPDF (272 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Balancing video-game piracy issues

    Publication Year: 2004
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (439 KB) | HTML iconHTML

    The Business Software Alliance (BSA), an international software publishers' association, placed the global software piracy rate at 39 percent in 2002, down from 40 percent the year before, and from a high of 49 percent in 1994. This paper discusses how to balance the video-game piracy issues. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Election security: Perception and reality

    Publication Year: 2004, Page(s):24 - 31
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (277 KB) | HTML iconHTML

    Voters' trust in elections comes from a combination of the mechanisms and procedures we use to record and tally votes, and from confidence in election officials' competence and honesty. Electronic voting systems pose considerable risks to both the perception and reality of trustworthy elections. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hack-a-vote: Security issues with electronic voting systems

    Publication Year: 2004, Page(s):32 - 37
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (453 KB) | HTML iconHTML

    In a quest for election legitimacy, officials are increasingly deploying direct recording electronic (DRE) voting systems. A project to assess their trustworthiness revealed both the ease of introducing bugs into such systems and the difficulty of detecting them during audits. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secret-ballot receipts: True voter-verifiable elections

    Publication Year: 2004, Page(s):38 - 47
    Cited by:  Papers (91)  |  Patents (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (524 KB) | HTML iconHTML

    A new kind of receipt sets a far higher standard of security by letting voters verify the election outcome - even if all election computers and records were compromised. The system preserves ballot secrecy, while improving access, robustness, and adjucation, all at lower cost. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer network security: report from MMM-ACNS

    Publication Year: 2004, Page(s):49 - 52
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (347 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Maximizing business information security's educational value

    Publication Year: 2004, Page(s):56 - 60
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (292 KB) | HTML iconHTML

    A business information security course's goals and objectives are quite different from most traditional security courses, which focus on designing and developing new security technologies. Business information security primarily concerns the strategic, tactical, and operational management issues surrounding the planning, analysis, design, implementation, and maintenance of an organization's inform... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Micropayments: An idea whose time has passed twice?

    Publication Year: 2004, Page(s):61 - 63
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (207 KB) | HTML iconHTML

    During the dot-com boom, many predicted that micropayments would soon let Web sites sell all sorts of things individually. People could buy magazines article by article, or music a bar at a time, if they wanted. In 1998, Jakob Nielsen wrote that "most sites that are not financed through traditional product sales will move to micropayments in less than two years". MIT's Nicholas Negro-ponte predict... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Table of contents

    Publication Year: 2004, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (412 KB)
    Freely Available from IEEE
  • Calls for Papers

    Publication Year: 2004, Page(s): 3
    Request permission for commercial reuse | PDF file iconPDF (167 KB)
    Freely Available from IEEE
  • Reviewer thanks

    Publication Year: 2004, Page(s): 6
    Request permission for commercial reuse | PDF file iconPDF (173 KB) | HTML iconHTML
    Freely Available from IEEE

Aims & Scope

IEEE Security & Privacy’s primary objective is to stimulate and track advances in security, privacy, and dependability and present these advances in a form that can be useful to a broad cross-section of the professional community—ranging from academic researchers to industry practitioners. It provides articles with both a practical and research bent by the top thinkers in the field of security and privacy, along with case studies, surveys, tutorials, columns, and in-depth interviews and podcasts for the information security industry.
 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Ahmad-Reza Sadeghi
Technische Universität Darmstadt
ahmad.sadeghi@trust.tu-darmstadt.de