By Topic

Security & Privacy, IEEE

Issue 3 • Date May-June 2004

Filter Results

Displaying Results 1 - 25 of 25
  • [Front cover]

    Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (742 KB)  
    Freely Available from IEEE
  • Websec the e-security 2004 conference & expo

    Page(s): c2
    Save to Project icon | Request Permissions | PDF file iconPDF (524 KB)  
    Freely Available from IEEE
  • Table of contents

    Page(s): 2
    Save to Project icon | Request Permissions | PDF file iconPDF (430 KB)  
    Freely Available from IEEE
  • Masthead

    Page(s): 3
    Save to Project icon | Request Permissions | PDF file iconPDF (34 KB)  
    Freely Available from IEEE
  • From the Editors: Whose Data Are These, Anyway?

    Page(s): 5 - 6
    Save to Project icon | Request Permissions | PDF file iconPDF (117 KB)  
    Freely Available from IEEE
  • Book Reviews

    Page(s): 7
    Save to Project icon | Request Permissions | PDF file iconPDF (46 KB)  
    Freely Available from IEEE
  • Letters to the Editor

    Page(s): 8 - 9
    Save to Project icon | Request Permissions | PDF file iconPDF (271 KB)  
    Freely Available from IEEE
  • Richard Clarke talks cybersecurity and JELL-O

    Page(s): 11 - 15
    Save to Project icon | Request Permissions | PDF file iconPDF (356 KB)  
    Freely Available from IEEE
  • Processes for producing secure software

    Page(s): 18 - 25
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (200 KB)  

    Summarizes work initiated at the National Cybersecurity Summit, held 2-3 December 2003 in Santa Clara, California. Attendees representing industry, academia, and the US Department of Homeland Security (DHS) formed five task forces to focus on specific topic areas. This report describes, the key problems and recommendations identified by the Software Process subgroup of the "Security Across the Software Development Lifecycle" task force. Producing secure software is a multifaceted problem of software engineering, security engineering, and management. Thus, producing secure software starts with outstanding software engineering practices, augmented with sound technical practices, and supported by management practices that promote secure software development. We discuss these practices. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Guest Editor's Introduction: Wired on Wireless

    Page(s): 26 - 27
    Save to Project icon | Request Permissions | PDF file iconPDF (337 KB)  
    Freely Available from IEEE
  • A survey of secure wireless ad hoc routing

    Page(s): 28 - 39
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (334 KB)  

    Ad hoc networks use mobile nodes to enable communication outside wireless transmission range. Attacks on ad hoc network routing protocols disrupt network performance and reliability. The article reviews attacks on ad hoc networks and discusses current approaches for establishing cryptographic keys in ad hoc networks. We describe the state of research in secure ad hoc routing protocols and its research challenges. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Overview of IEEE 802.16 security

    Page(s): 40 - 48
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (230 KB)  

    When creating the new wireless communication standard IEEE 802.16, designers attempted to reuse a security scheme designed for wired media. The authors review the standard, enumerate its flaws, and outline changes that could defend it against threats. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The security and privacy of smart vehicles

    Page(s): 49 - 55
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (569 KB)  

    Road safety, traffic management, and driver convenience continue to improve, in large part thanks to appropriate usage of information technology. But this evolution has deep implications for security and privacy, which the research community has overlooked so far. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Autonomic 802.11 wireless LAN security auditing

    Page(s): 56 - 65
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (892 KB)  

    The authors describe their Distributed Wireless Security Auditor (DWSA), which works toward finding unauthorized wireless access points in large-scale wireless environments while providing an autonomic and unobtrusive layer of network protection. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cult classics [science fiction]

    Page(s): 66 - 68
    Save to Project icon | Request Permissions | PDF file iconPDF (195 KB)  
    Freely Available from IEEE
  • Guarding the castle keep: teaching with the fortress metaphor

    Page(s): 69 - 72
    Save to Project icon | Request Permissions | PDF file iconPDF (831 KB)  
    Freely Available from IEEE
  • Worm and attack early warning: piercing stealthy reconnaissance

    Page(s): 73 - 75
    Save to Project icon | Request Permissions | PDF file iconPDF (66 KB)  
    Freely Available from IEEE
  • Copyright and creativity

    Page(s): 76 - 78
    Save to Project icon | Request Permissions | PDF file iconPDF (217 KB)  
    Freely Available from IEEE
  • The kernel craze [computer security]

    Page(s): 79 - 81
    Save to Project icon | Request Permissions | PDF file iconPDF (333 KB)  
    Freely Available from IEEE
  • Online impersonation in securities scams

    Page(s): 82 - 85
    Save to Project icon | Request Permissions | PDF file iconPDF (94 KB)  
    Freely Available from IEEE
  • The wrong stuff? [computer viruses]

    Page(s): 86 - 89
    Save to Project icon | Request Permissions | PDF file iconPDF (101 KB)  
    Freely Available from IEEE
  • Misuse and abuse cases: getting past the positive

    Page(s): 90 - 92
    Save to Project icon | Request Permissions | PDF file iconPDF (76 KB)  
    Freely Available from IEEE
  • Security or cosmetology?

    Page(s): 93 - 95
    Save to Project icon | Request Permissions | PDF file iconPDF (92 KB)  
    Freely Available from IEEE
  • Security and compliance

    Save to Project icon | Request Permissions | PDF file iconPDF (67 KB)  
    Freely Available from IEEE
  • USENIX Security Symposium

    Page(s): c3
    Save to Project icon | Request Permissions | PDF file iconPDF (525 KB)  
    Freely Available from IEEE

Aims & Scope

The primary objective of IEEE Security & Privacy is to stimulate and track advances in information assurance and security and present these advances in a form that can be useful to a broad cross-section of the professional community-ranging from academic researchers to industry practitioners. It is intended to serve a broad readership.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Shari Lawrence Pfleeger
shari.l.pfleeger@dartmouth.edu