acm-header
Sign In

Communications of the ACM

Latest Practice


Latest Practice Practice Archive Refine your search:
subjectSecurity
author Jim Waldo

How to De-Identify Your Data
From Communications of the ACM

How to De-Identify Your Data

Balancing statistical accuracy and subject privacy in large social-science datasets.

The API Performance Contract
From Communications of the ACM

The API Performance Contract

How can the expected interactions between caller and implementation be guaranteed?

A Threat Analysis of RFID Passports
From Communications of the ACM

A Threat Analysis of RFID Passports

An RFID-passport attack is more plausible than skimming RFID information. Do RFID passports make us vulnerable to identity theft?
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account