By Topic

Security & Privacy, IEEE

Issue 5 • Date Sept.-Oct. 2006

Filter Results

Displaying Results 1 - 25 of 30
  • [Front cover]

    Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (1817 KB)  
    Freely Available from IEEE
  • Inside Front Cover

    Page(s): c2
    Save to Project icon | Request Permissions | PDF file iconPDF (1120 KB)  
    Freely Available from IEEE
  • Table of contents

    Page(s): 1 - 2
    Save to Project icon | Request Permissions | PDF file iconPDF (616 KB)  
    Freely Available from IEEE
  • Discover Something New with Wiley & Wiley IEEE Computer Society Press

    Page(s): 3
    Save to Project icon | Request Permissions | PDF file iconPDF (616 KB)  
    Freely Available from IEEE
  • Insecurity through Obscurity

    Page(s): 4
    Save to Project icon | Request Permissions | PDF file iconPDF (61 KB)  
    Freely Available from IEEE
  • Letters to the Editor

    Page(s): 5
    Save to Project icon | Request Permissions | PDF file iconPDF (41 KB)  
    Freely Available from IEEE
  • Masthead

    Page(s): 6
    Save to Project icon | Request Permissions | PDF file iconPDF (46 KB)  
    Freely Available from IEEE
  • Cross-Border Transaction Liability

    Page(s): 7
    Save to Project icon | Request Permissions | PDF file iconPDF (45 KB)  
    Freely Available from IEEE
  • News Briefs

    Page(s): 8 - 10
    Save to Project icon | Request Permissions | PDF file iconPDF (216 KB)  
    Freely Available from IEEE
  • Interview: Silver Bullet Speaks to Marcus Ranum

    Page(s): 11 - 14
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (488 KB)  

    In the third episode of the Silver Bullet Security Podcast, Gary talks with Marcus Ranum, who is an acclaimed security guru widely credited with inventing the proxy firewall. Marcus and Gary discuss why Marcus thinks we're not making progress in the computer security field, how common sense would help computer security, and Richard Feynman. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RSA Conference 2007 Information

    Page(s): 15
    Save to Project icon | Request Permissions | PDF file iconPDF (1288 KB)  
    Freely Available from IEEE
  • Scrubbing Stubborn Data: An Evaluation of Counter-Forensic Privacy Tools

    Page(s): 16 - 25
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (458 KB)  

    An evaluation of six privacy tools highlights significant shortfalls in their methods and implementations. It also raises a question: how much privacy protection we can realistically expect given ever-changing environments and the tremendous resources required to test for both known and unknown threats? View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trusted Computing for Disk Drives and Other Peripherals

    Page(s): 26 - 33
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (617 KB)  

    Disk drives and other intelligent peripherals are critical to security, privacy, and trust in the computing infrastructure. This article proposes a framework to describe why and how these peripheral devices can be secured as independent roots of trust View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhancing PC Security with a U-Key

    Page(s): 34 - 39
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2221 KB)  

    A boot system that uses a U-Key can help ensure the integrity of fairly static PC components. Moreover, the associated two-factor authentication makes a mobile computer's theft less likely because a thief can't use it View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Battery Constraints within Mobile Hosts to Improve Network Security

    Page(s): 40 - 49
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1707 KB)  

    Distributed battery-based intrusion detection (B-BID) is an efficacious early-warning system that can complement existing intrusion detection systems (IDSs) by alerting users to protect their mobile devices as well as network administrators to protect their corporate networks by correlating device power consumption with application and attack activity data View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Voting Technologies and Trust

    Page(s): 50 - 56
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (355 KB)  

    The authors' propose manual voting systems that have significant security advantages over existing systems, yet retain the simplicity and familiarity that has led to widespread acceptance. The authors also discuss ways to improve efficiency without endangering this public trust View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 2006 IAPP Privacy Academy Information

    Page(s): 57
    Save to Project icon | Request Permissions | PDF file iconPDF (1136 KB)  
    Freely Available from IEEE
  • Advertiser/Product Index

    Page(s): 58
    Save to Project icon | Request Permissions | PDF file iconPDF (25 KB)  
    Freely Available from IEEE
  • Privacy Enhancing Technologies

    Page(s): 59
    Save to Project icon | Request Permissions | PDF file iconPDF (35 KB)  
    Freely Available from IEEE
  • Computer Security Education and Research in Australia

    Page(s): 60 - 63
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (106 KB)  

    Determining modern curriculum content and industrially relevant research agendas are two issues that every academic in any field - and any country $can identify with. Curriculum issues are particularly relevant in information and communication technology (ICT) security because relevant topics and technologies change from year to year. In a world of rootkits, 0-day exploits, Trojans, viruses, and the ubiquitous inside attacker, it's difficult to plan course content that will remain topical, helping graduates to both understand fundamental concepts and be immediately beneficial to their employers View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fitting Square Pegs into Round Holes

    Page(s): 64 - 66
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (403 KB)  

    By nature, cryptographers tend to be extremely cautious and conservative. From their perspective, spending time getting people to use a new cryptographic algorithm is roughly on par with getting involved in a land war in Asia. In some cases, however, the difficulty involved in developing a new algorithm is worth the effort. This is the case with identity-based encryption (IBE), a new type of public-key algorithm View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Understanding the Adversary: Virus Writers and Beyond

    Page(s): 67 - 70
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (662 KB)  

    In this column, I explain why understanding the cyber adversary - virus writers, for example - is important and explore the history of both public perceptions and reality, which might not always be the same. In a later column, I'll delve into recent developments, such as the reported increase in financial motivation on the part of spyware/adware manufacturers View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Worst-Case Scenario

    Page(s): 71 - 73
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1001 KB)  

    It's no longer enough to merely ensure that the systems we work on meet the most basic security requirements; we have to realize that in the current political climate, the threats that we previously chose to ignore - the worst-case scenarios, the one percent - can no longer be overlooked View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Immaterial Transfers with Material Consequences

    Page(s): 74 - 78
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (75 KB)  

    The need for such regulations is clear, but many firms underestimate the challenges of complying with the defense trade controls embodied in the US International Traffic in Arms Regulations (ITAR). Companies hoping to enter into defense contracts must therefore redefine their basic approach to technical data because the ITARs require that they control the destinations of their communications. For example, the ITARs prohibit unlicensed communications of sensitive data to foreign destinations (another country or a foreign national) View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Subscription Information for IEEE Security & Privacy [advertisement]

    Page(s): 79
    Save to Project icon | Request Permissions | PDF file iconPDF (291 KB)  
    Freely Available from IEEE

Aims & Scope

The primary objective of IEEE Security & Privacy is to stimulate and track advances in information assurance and security and present these advances in a form that can be useful to a broad cross-section of the professional community-ranging from academic researchers to industry practitioners. It is intended to serve a broad readership.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Shari Lawrence Pfleeger
shari.l.pfleeger@dartmouth.edu