By Topic

Spectrum, IEEE

Issue 8 • Date Aug. 1992

Filter Results

Displaying Results 1 - 6 of 6
  • Data security-threats and countermeasures

    Publication Year: 1992 , Page(s): 21 - 28
    Cited by:  Papers (2)  |  Patents (5)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1199 KB)  

    The advances made by malicious hackers and some current and future means of prevention are examined. The various strains of computer viruses are described. Among these are new types such as stealth and polymorphic viruses, which are difficult to detect. The growing use of Virus Exchange Bulletin Boards, which promote the technology of writing difficult viruses, is discussed. The particular vulnera... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data security-cryptography=privacy?

    Publication Year: 1992 , Page(s): 29 - 35
    Cited by:  Papers (4)  |  Patents (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1126 KB)  

    Concerns about the main encrypting and enciphering schemes being proposed as a way to ensure data security are examined. To elucidate the issues involved, public-key cryptography is explained. The collision between the interests of government intelligence agencies and private groups as evidenced by the controversy over the Digital Signature Standard (DSS) proposed by the US National Institute of S... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data security-bad code

    Publication Year: 1992 , Page(s): 36 - 40
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (730 KB)  

    A tutorial on viruses, worms, bacteria, and other computer diseases is presented. It describes how experts classify the various forms of malicious code at work today, the ways in which they hide and work their mischief, and a few of the infamous incidents-such as the attack on the Internet network, in the fall of 1988, of a worm program that devoured massive amounts of CPU time-that have gained in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MIL reliability: a new approach

    Publication Year: 1992 , Page(s): 46 - 49
    Cited by:  Papers (10)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (541 KB)  

    The charges by opponents of MIL-HDBK-217, Reliability Prediction of Electronic Equipment, that it is inaccurate, leads to costly overdesign, actually prevents higher reliability levels from being achieved, and does not address the true causes of failures are examined. The stress-margin approach, using models based on physics-of-failure analyses, which is being considered as an alternative, is desc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cooperating on superconductivity

    Publication Year: 1992 , Page(s): 50 - 55
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (835 KB)  

    The results to date of a cooperative effort begun by AT&T, IBM, and MIT, called the Consortium for Superconducting Electronics (CSE), are reviewed. The goal is to bring high-temperature superconductivity to market rapidly. Of primary importance in these early years is the CSE's materials and processing program, which develops and evaluates substrate materials and film-deposition techniques for spe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Measuring software reliability

    Publication Year: 1992 , Page(s): 56 - 60
    Cited by:  Papers (3)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (804 KB)  

    The component concepts of the term 'reliability' are examined to clarify why its measurement is difficult. Two approaches to measuring the reliability of finished code are described. The first, a developer-based view, focuses on software faults; if the developer has grounds for believing that the system is relatively fault-free, then the system is assumed to be reliable. The second, a user-based v... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Spectrum Magazine, the flagship publication of the IEEE, explores the development, applications and implications of new technologies.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Susan Hassler
IEEE Spectrum Magazine