The Wayback Machine - https://web.archive.org/web/20160328042748/https://csdl.computer.org/rss/security.xml
IEEE Security & Privacy http://www.computer.org Organizations relying on the Internet face significant challenges to ensure that their networks operate safely. And that their systems continue to provide critical services even in the face of attacks. Denial of service, worms, DNS, and router attacks are increasing. To help you stay one step ahead of these and other threats, the IEEE Computer Society has published a new periodical in 2003, IEEE Security & Privacy magazine. en-us Mon, 3 Nov 2014 15:35:33 GMT http://csdl.computer.org/common/images/logos/security.gif IEEE Computer Society List of recently published journal articles http://www.computer.org/security Issue: July-Aug. 2014 (Vol. 12 No.4) http://www.computer.org/csdl/mags/sp/2014/04/index.html IEEE Security & Privacy http://www.computer.org/portal/site/security PrePrint: Air Force Cyber Vision 2025 http://doi.ieeecomputersociety.org/10.1109/MSP.2013.135 Tthe United States Air Force recently completed Cyber Vision 2025, its vision for cyberspace Science and Technology (S&T) for theto assured cyberspace advantage in the air, space, and cyberspace domains. This article summarizes characterizes key cyberspace threats and identifies strategies to assure Air Force systems from this strategic computing study. Cyber Vision 2025 articulates where the Air Force should lead, follow, and watch in partnership with others in science and technology in the near, mid, and far term. This article summarizes several security principles identified during the study and describes a research roadmap for cyberspace assurance. It briefly describes four cross-domain, integrating themes that are guiding Air Force S&T investments: mission assurance and empowerment, agility and resilience, optimized human-machine systems, and software and hardware foundations of trust. This article explains the rationale and key strategies with the intent that other large scale planning efforts will benefit following a similar course. http://doi.ieeecomputersociety.org/10.1109/MSP.2013.135 PrePrint: The Personal Data Store Approach to Personal Data Security http://doi.ieeecomputersociety.org/10.1109/MSP.2012.137 Personal Data Stores (PDS) are considered by a growing number of actors to be the solution to the issue of online privacy. The PDS promise is that people can choose to share or restrict access to specific personal information with other interested parties. Ascertaining the extent to which users are willing to adopt PDS was the objective of a small-scale test involving job applicants and employers. After describing the context leading to the PDS solution developed within the European Framework 7 project TAS3, this paper explores whether PDS are a practical solution to addressing personal data insecurity on the web. Can PDSs respond to actual user needs? Are users ready to adopt PDS technology to ‘claim data back’? To what extent can PDS really enforce online privacy? What other approaches are emerging as alternatives to PDS? http://doi.ieeecomputersociety.org/10.1109/MSP.2012.137