acm-header
Sign In

Communications of the ACM

Latest Practice


Latest Practice Practice Archive Refine your search:
subjectSecurity
authorCACM Staff

Differential Privacy
From Communications of the ACM

Differential Privacy: The Pursuit of Protections by Default

A discussion with Miguel Guevara, Damien Desfontaines, Jim Waldo, and Terry Coatta

Access Controls and Healthcare Records
From Communications of the ACM

Access Controls and Healthcare Records: Who Owns the Data?

A discussion with David Evans, Richard McDonald, and Terry Coatta.

Browser Security
From Communications of the ACM

Browser Security: Appearances Can Be Deceiving

A discussion with Jeremiah Grossman, Ben Livshits, Rebecca Bace, and George Neville-Neil

Bufferbloat: What's Wrong With the Internet?
From Communications of the ACM

Bufferbloat: What's Wrong With the Internet?

A discussion with Vint Cerf, Van Jacobson, Nick Weaver, and Jim Gettys.

Microsoft's Protocol Documentation Program
From Communications of the ACM

Microsoft's Protocol Documentation Program: Interoperability Testing at Scale

A discussion with Nico Kicillof, Wolfgang Grieskamp, and Bob Binder.

A Conversation with David E. Shaw
From Communications of the ACM

A Conversation with David E. Shaw

Stanford professor Pat Hanrahan sits down with the noted hedge fund founder, computational biochemist, and (above all) computer scientist.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account