acm-header
Sign In

Communications of the ACM

Latest Practice


Latest Practice Practice Archive Refine your search:
subjectSecurity
authorJim Waldo

How to De-Identify Your Data
From Communications of the ACM

How to De-Identify Your Data

Balancing statistical accuracy and subject privacy in large social-science datasets.

The API Performance Contract
From Communications of the ACM

The API Performance Contract

How can the expected interactions between caller and implementation be guaranteed?

A Threat Analysis of RFID Passports
From Communications of the ACM

A Threat Analysis of RFID Passports

An RFID-passport attack is more plausible than skimming RFID information. Do RFID passports make us vulnerable to identity theft?

From Communications of the ACM

Scaling in Games and Virtual Worlds

Online games and virtual worlds have familiar scaling requirements, but don't be fooled: Everything you know is wrong.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account