By Topic

IBM Journal of Research and Development

Issue 1 • Date Jan.-Feb. 2014

Cybersecurity for a Smarter Planet
Given the accelerating integration of technology into people's lives, the term cybersecurity has taken on a new meaning. No longer limited to national security or even IT security interests, modern cybersecurity protects all of us by ensuring the security and privacy of the Smarter Planet. This issue of the IBM Journal emphasizes new solutions, applications, services, analytics, software, and hardware technologies that form the building blocks for fostering both cybersecurity and cyberprivacy.

Filter Results

Displaying Results 1 - 14 of 14
  • [Front cover]

    Publication Year: 2014, Page(s): C1
    IEEE is not the copyright holder of this material | PDF file iconPDF (1387 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2014, Page(s):1 - 2
    IEEE is not the copyright holder of this material | PDF file iconPDF (50 KB)
    Freely Available from IEEE
  • Message from the Vice President, Cyber Security Innovation

    Publication Year: 2014, Page(s): 1
    IEEE is not the copyright holder of this material | PDF file iconPDF (55 KB)
    Freely Available from IEEE
  • Preface: Cybersecurity for a Smarter Planet

    Publication Year: 2014, Page(s):0:1 - 0:3
    IEEE is not the copyright holder of this material | PDF file iconPDF (54 KB)
    Freely Available from IEEE
  • Open industry standards for mitigating risks to global supply chains

    Publication Year: 2014, Page(s):1:1 - 1:13
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (392 KB)

    Governments and large enterprises are cognizant of and appreciate the benefits of globalization. They also recognize their increasing reliance on commercial-off-the-shelf (COTS) information technology (IT) components (software and hardware) necessary to meet the needs of their business missions. As cyberattacks increase in sophistication, stealth, and severity, governments and larger enterprises a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Privacy protection in open information management platforms

    Publication Year: 2014, Page(s):2:1 - 2:11
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (3520 KB)

    Governments are increasingly interested in making their data accessible through open data platforms to promote accountability and economic growth. Since the first data.gov initiative was launched by the U.S. government, more than 150 city agencies and authorities have made over one million datasets available through open data portals. Open data are increasingly generating new business worldwide, p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security on distributed systems: Cloud security versus traditional IT

    Publication Year: 2014, Page(s):3:1 - 3:13
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (7301 KB)

    Cloud computing is a popular subject across the IT (information technology) industry, but many risks associated with this relatively new delivery model are not yet fully understood. In this paper, we use a qualitative approach to gain insight into the vectors that contribute to cloud computing risks in the areas of security, business, and compliance. The focus is on the identification of risk vect... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bringing strong authentication and transaction security to the realm of mobile devices

    Publication Year: 2014, Page(s):4:1 - 4:11
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (3132 KB)

    Widespread usage of mobile devices in conjunction with malicious software attacks calls for the development of mobile-device-oriented mechanisms aiming to provide strong authentication and transaction security. This paper considers the eBanking application scenario and argues that the concept of using a trusted companion device can be ported to the mobile realm. Trusted companion devices involve e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stateless cryptography for virtual environments

    Publication Year: 2014, Page(s):5:1 - 5:10
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1584 KB)

    Migrating systems onto virtualized environments, such as cloud platforms, is becoming a business imperative. Such platforms offer the promise of higher resilience combined with a relatively low cost of ownership. The platforms also involve a number of challenges that hinder their adoption, and a primary concern involves security. These security concerns stem in part from vulnerabilities that under... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Threat analysis in the software development lifecycle

    Publication Year: 2014, Page(s):6:1 - 6:13
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (6312 KB)

    Businesses and governments that deploy and operate IT (information technology) systems continue to seek assurance that software they procure has the security characteristics they expect. The criteria used to evaluate the security of software are expanding from static sets of functional and assurance requirements to complex sets of evidence related to development practices for design, coding, testi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advanced security and privacy in connected vehicles

    Publication Year: 2014, Page(s):7:1 - 7:9
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (3471 KB)

    Designing secure vehicles is becoming increasingly important as a result of recent advances in potential cyber-attacks against vehicles. This security needs to be considered over the course of the product lifecycle and includes a consideration of requirements definitions, design, development, testing, and maintenance. Even though many technologies and guidelines have been proposed to address end-t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Augmenting security and accountability within the eHealth Exchange

    Publication Year: 2014, Page(s):8:1 - 8:11
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (607 KB)

    The increased use of electronic medical records and online sharing of such records is motivated by improved quality of healthcare delivery. However, this use has raised security and privacy concerns because sensitive medical data could be exposed to a variety of threats that exist in the online world, leading to problems such as medical identity theft and billing fraud. If not addressed, such conc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward smarter healthcare: Anonymizing medical data to support research studies

    Publication Year: 2014, Page(s):9:1 - 9:11
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1387 KB)

    Healthcare is a major industry in the Smarter Planet initiative of IBM and a key area where analytics can have a substantial impact by improving disease prediction and treatment. To facilitate healthcare analytics, patient data usually need to be widely disseminated. This, however, may risk the disclosure of private and sensitive patient information. In this paper, we illustrate the importance of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IBM Secure Enterprise Desktop

    Publication Year: 2014, Page(s):10:1 - 10:11
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1009 KB)

    Using software-only approaches makes it is practically impossible to completely secure software applications, as well as corporate information, against determined cyber-criminals. Therefore, in an era where any general-purpose operating system (OS) with end-user access can be hacked, we propose using dedicated security hardware to ensure that only authorized people obtain access to sensitive infor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

The IBM Journal of Research and Development is a peer-reviewed technical journal, published bimonthly, which features the work of authors in the science, technology and engineering of information systems.

Learn about subscribing to this journal >

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Clifford A. Pickover
IBM T. J. Watson Research Center