IEEE Security & Privacy

Issue 1 • Jan.-Feb. 2005

Filter Results

Displaying Results 1 - 24 of 24
  • [Front cover]

    Publication Year: 2005, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (838 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2005, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (530 KB)
    Freely Available from IEEE
  • Changing the Puzzle Pieces

    Publication Year: 2005, Page(s):3 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (70 KB) | HTML iconHTML

    Could increases in cybersecurity research investments, combined with commercial uptake, lead us to a more trustworthy cyberinfrastructure? View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Letters to the Editor

    Publication Year: 2005, Page(s): 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (53 KB) | HTML iconHTML

    A reader sends in suggestions and some lament the loss of the Honeynet Files department. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Masthead

    Publication Year: 2005, Page(s): 5
    Request permission for commercial reuse | PDF file iconPDF (31 KB)
    Freely Available from IEEE
  • Special Thanks to S&P's Reviewers

    Publication Year: 2005, Page(s):6 - 7
    Request permission for commercial reuse | PDF file iconPDF (211 KB)
    Freely Available from IEEE
  • Phishing attacks rising, but dollar losses down

    Publication Year: 2005
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | PDF file iconPDF (39 KB) | HTML iconHTML
    Freely Available from IEEE
  • News Briefs

    Publication Year: 2005, Page(s):9 - 10
    Request permission for commercial reuse | PDF file iconPDF (43 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Studying Attacks to Improve Software Defense

    Publication Year: 2005, Page(s): 11
    Request permission for commercial reuse | PDF file iconPDF (43 KB) | HTML iconHTML
    Freely Available from IEEE
  • Guest Editors' Introduction: Economics of Information Security

    Publication Year: 2005, Page(s):12 - 13
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB) | HTML iconHTML

    Often, the economic considerations of security are more important than the technical considerations. Guests editors Ross Anderson and Bruce Schneier present six articles that delve into all aspects of this economic angle. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Is finding security holes a good idea?

    Publication Year: 2005, Page(s):14 - 19
    Cited by:  Papers (53)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (188 KB) | HTML iconHTML

    Despite the large amount of effort that goes toward finding and patching security holes, the available data does not show a clear improvement in software quality as a result. This article aims to measure the effect of vulnerability finding. Any attempt to measure this kind of effect is inherently rough, depending as it does on imperfect data and several simplifying assumptions. Because I'm looking... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Economics of software vulnerability disclosure

    Publication Year: 2005, Page(s):20 - 25
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (374 KB) | HTML iconHTML

    Information security breaches frequently exploit software flaws or vulnerabilities, causing significant economic losses. Considerable debate exists about how to disclose such vulnerabilities. A coherent theoretical framework helps identify the key data elements needed to develop a sensible way of handling vulnerability disclosure View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Privacy and rationality in individual decision making

    Publication Year: 2005, Page(s):26 - 33
    Cited by:  Papers (162)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (481 KB) | HTML iconHTML

    Traditional theory suggests consumers should be able to manage their privacy. Yet, empirical and theoretical research suggests that consumers often lack enough information to make privacy-sensitive decisions and, even with sufficient information, are likely to trade off long-term privacy for short-term benefits View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The demographics of the do-not-call list [security of data]

    Publication Year: 2005, Page(s):34 - 39
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (227 KB) | HTML iconHTML

    Data from do-not-call registries and other sources show discernible patterns in the demographics of consumers who signed up for do-not-call lists. Such patterns might also be useful in analyzing the prospects for a do-not-spam registry View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward econometric models of the security risk from remote attacks

    Publication Year: 2005, Page(s):40 - 44
    Cited by:  Papers (25)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (188 KB) | HTML iconHTML

    Security risk models have successfully estimated the likelihood of attack for simple security threats such as burglary and auto theft. Before we can forecast the risks to computer systems, we must first learn to measure the strength of their security View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The economics of resisting censorship

    Publication Year: 2005, Page(s):45 - 50
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB) | HTML iconHTML

    Early peer-to-peer systems sought to resist censorship by distributing content randomly over the entire Internet. The most popular ones simply let nodes serve the resources they were most interested in. The authors offer the first model inspired by economics and conflict theory to analyze such systems' security View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Technology and web user data privacy - a survey of risks and countermeasures

    Publication Year: 2005, Page(s):52 - 58
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (342 KB) | HTML iconHTML

    The author examines privacy risks to user data in a Web environment and explores the characteristics and roles of technical countermeasures, including mechanized privacy policy representations, pseudonym facilities, access-control methods, and technical methods for constraining data use View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Centers of academic excellence: a case study

    Publication Year: 2005, Page(s):62 - 65
    Request permission for commercial reuse | PDF file iconPDF (71 KB) | HTML iconHTML
    Freely Available from IEEE
  • Application penetration testing

    Publication Year: 2005, Page(s):66 - 69
    Cited by:  Papers (21)
    Request permission for commercial reuse | PDF file iconPDF (216 KB) | HTML iconHTML
    Freely Available from IEEE
  • Bad peripherals

    Publication Year: 2005, Page(s):70 - 73
    Cited by:  Papers (6)
    Request permission for commercial reuse | PDF file iconPDF (439 KB) | HTML iconHTML
    Freely Available from IEEE
  • Building secure Web-based environments: understanding research interrelationships through a construction metaphor

    Publication Year: 2005, Page(s):74 - 77
    Request permission for commercial reuse | PDF file iconPDF (72 KB) | HTML iconHTML
    Freely Available from IEEE
  • Directors' digital fiduciary duties

    Publication Year: 2005, Page(s):78 - 82
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (101 KB) | HTML iconHTML
    Freely Available from IEEE
  • Software penetration testing

    Publication Year: 2005, Page(s):84 - 87
    Cited by:  Papers (63)
    Request permission for commercial reuse | PDF file iconPDF (368 KB) | HTML iconHTML
    Freely Available from IEEE
  • Authentication and Expiration

    Publication Year: 2005, Page(s): 88
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (77 KB) | HTML iconHTML

    There's a security problem with many Internet authentication systems that's never talked about: there's no way to terminate the authentication. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Security & Privacy’s primary objective is to stimulate and track advances in security, privacy, and dependability and present these advances in a form that can be useful to a broad cross-section of the professional community—ranging from academic researchers to industry practitioners. It provides articles with both a practical and research bent by the top thinkers in the field of security and privacy, along with case studies, surveys, tutorials, columns, and in-depth interviews and podcasts for the information security industry.
 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Ahmad-Reza Sadeghi
Technische Universität Darmstadt
ahmad.sadeghi@trust.tu-darmstadt.de