acm-header
Sign In

Communications of the ACM

Latest Practice


Latest Practice Practice Archive Refine your search:
subjectCommunications / Networking
author Jim Waldo

How to De-Identify Your Data
From Communications of the ACM

How to De-Identify Your Data

Balancing statistical accuracy and subject privacy in large social-science datasets.

Privacy, Anonymity, and Big Data in the Social Sciences
From Communications of the ACM

Privacy, Anonymity, and Big Data in the Social Sciences

Quality social science research and the privacy of human subjects require trust.

The API Performance Contract
From Communications of the ACM

The API Performance Contract

How can the expected interactions between caller and implementation be guaranteed?

A Threat Analysis of RFID Passports
From Communications of the ACM

A Threat Analysis of RFID Passports

An RFID-passport attack is more plausible than skimming RFID information. Do RFID passports make us vulnerable to identity theft?
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account