Scheduled System Maintenance
On Tuesday, December 18, IEEE Xplore will undergo scheduled maintenance from 1:00-5:00 PM ET
During this time, there may be intermittent impact on performance. We apologize for any inconvenience.

IEEE Security & Privacy

Volume 3 Issue 1 • Jan.-Feb. 2005

Filter Results

Displaying Results 1 - 24 of 24
  • [Front cover]

    Publication Year: 2005, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (838 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2005, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (530 KB)
    Freely Available from IEEE
  • Changing the Puzzle Pieces

    Publication Year: 2005, Page(s):3 - 4
    Request permission for commercial reuse | PDF file iconPDF (69 KB) | HTML iconHTML
    Freely Available from IEEE
  • Letters to the Editor

    Publication Year: 2005, Page(s): 4
    Request permission for commercial reuse | PDF file iconPDF (52 KB) | HTML iconHTML
    Freely Available from IEEE
  • Masthead

    Publication Year: 2005, Page(s): 5
    Request permission for commercial reuse | PDF file iconPDF (31 KB)
    Freely Available from IEEE
  • Special Thanks to S&P's Reviewers

    Publication Year: 2005, Page(s):6 - 7
    Request permission for commercial reuse | PDF file iconPDF (211 KB)
    Freely Available from IEEE
  • Phishing attacks rising, but dollar losses down

    Publication Year: 2005
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | PDF file iconPDF (39 KB) | HTML iconHTML
    Freely Available from IEEE
  • News Briefs

    Publication Year: 2005, Page(s):9 - 10
    Request permission for commercial reuse | PDF file iconPDF (42 KB) | HTML iconHTML
    Freely Available from IEEE
  • Studying Attacks to Improve Software Defense

    Publication Year: 2005, Page(s): 11
    Request permission for commercial reuse | PDF file iconPDF (42 KB) | HTML iconHTML
    Freely Available from IEEE
  • Guest Editors' Introduction: Economics of Information Security

    Publication Year: 2005, Page(s):12 - 13
    Cited by:  Papers (3)
    Request permission for commercial reuse | PDF file iconPDF (218 KB) | HTML iconHTML
    Freely Available from IEEE
  • Is finding security holes a good idea?

    Publication Year: 2005, Page(s):14 - 19
    Cited by:  Papers (84)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (188 KB) | HTML iconHTML

    Despite the large amount of effort that goes toward finding and patching security holes, the available data does not show a clear improvement in software quality as a result. This article aims to measure the effect of vulnerability finding. Any attempt to measure this kind of effect is inherently rough, depending as it does on imperfect data and several simplifying assumptions. Because I'm looking... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Economics of software vulnerability disclosure

    Publication Year: 2005, Page(s):20 - 25
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (374 KB) | HTML iconHTML

    Information security breaches frequently exploit software flaws or vulnerabilities, causing significant economic losses. Considerable debate exists about how to disclose such vulnerabilities. A coherent theoretical framework helps identify the key data elements needed to develop a sensible way of handling vulnerability disclosure View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Privacy and rationality in individual decision making

    Publication Year: 2005, Page(s):26 - 33
    Cited by:  Papers (244)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (481 KB) | HTML iconHTML

    Traditional theory suggests consumers should be able to manage their privacy. Yet, empirical and theoretical research suggests that consumers often lack enough information to make privacy-sensitive decisions and, even with sufficient information, are likely to trade off long-term privacy for short-term benefits View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The demographics of the do-not-call list [security of data]

    Publication Year: 2005, Page(s):34 - 39
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (227 KB) | HTML iconHTML

    Data from do-not-call registries and other sources show discernible patterns in the demographics of consumers who signed up for do-not-call lists. Such patterns might also be useful in analyzing the prospects for a do-not-spam registry View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward econometric models of the security risk from remote attacks

    Publication Year: 2005, Page(s):40 - 44
    Cited by:  Papers (29)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (188 KB) | HTML iconHTML

    Security risk models have successfully estimated the likelihood of attack for simple security threats such as burglary and auto theft. Before we can forecast the risks to computer systems, we must first learn to measure the strength of their security View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The economics of resisting censorship

    Publication Year: 2005, Page(s):45 - 50
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB) | HTML iconHTML

    Early peer-to-peer systems sought to resist censorship by distributing content randomly over the entire Internet. The most popular ones simply let nodes serve the resources they were most interested in. The authors offer the first model inspired by economics and conflict theory to analyze such systems' security View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Technology and web user data privacy - a survey of risks and countermeasures

    Publication Year: 2005, Page(s):52 - 58
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (342 KB) | HTML iconHTML

    The author examines privacy risks to user data in a Web environment and explores the characteristics and roles of technical countermeasures, including mechanized privacy policy representations, pseudonym facilities, access-control methods, and technical methods for constraining data use View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Centers of academic excellence: a case study

    Publication Year: 2005, Page(s):62 - 65
    Request permission for commercial reuse | PDF file iconPDF (71 KB) | HTML iconHTML
    Freely Available from IEEE
  • Application penetration testing

    Publication Year: 2005, Page(s):66 - 69
    Cited by:  Papers (23)
    Request permission for commercial reuse | PDF file iconPDF (216 KB) | HTML iconHTML
    Freely Available from IEEE
  • Bad peripherals

    Publication Year: 2005, Page(s):70 - 73
    Cited by:  Papers (7)
    Request permission for commercial reuse | PDF file iconPDF (439 KB) | HTML iconHTML
    Freely Available from IEEE
  • Building secure Web-based environments: understanding research interrelationships through a construction metaphor

    Publication Year: 2005, Page(s):74 - 77
    Request permission for commercial reuse | PDF file iconPDF (72 KB) | HTML iconHTML
    Freely Available from IEEE
  • Directors' digital fiduciary duties

    Publication Year: 2005, Page(s):78 - 82
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (101 KB) | HTML iconHTML
    Freely Available from IEEE
  • Software penetration testing

    Publication Year: 2005, Page(s):84 - 87
    Cited by:  Papers (87)  |  Patents (2)
    Request permission for commercial reuse | PDF file iconPDF (368 KB) | HTML iconHTML
    Freely Available from IEEE
  • Authentication and Expiration

    Publication Year: 2005, Page(s): 88
    Request permission for commercial reuse | PDF file iconPDF (76 KB) | HTML iconHTML
    Freely Available from IEEE

Aims & Scope

IEEE Security & Privacy’s primary objective is to stimulate and track advances in security, privacy, and dependability and present these advances in a form that can be useful to a broad cross-section of the professional community—ranging from academic researchers to industry practitioners. It provides articles with both a practical and research bent by the top thinkers in the field of security and privacy, along with case studies, surveys, tutorials, columns, and in-depth interviews and podcasts for the information security industry.
 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
David M. Nicol
University of Illinois at Urbana Champaign
dmnicol@illinois.edu