Research and Advances
Computing Applications Virtual extension

Securing PC applications: the relay race approach

Posted

The widespread use of personal computers and the growth of end-user computing have introduced a myriad of security concerns. As PC-based information systems become readily available and more individuals become computer literate, the risk of ill-intentioned individuals obtaining unauthorized access to computing resources and violating the secrecy and integrity of data increases significantly. But many of these computer security concerns for PCs remain largely unaddressed [6].

View this article in the ACM Digital Library.

Join the Discussion (0)

Become a Member or Sign In to Post a Comment

The Latest from CACM

Shape the Future of Computing

ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.

Get Involved

Communications of the ACM (CACM) is now a fully Open Access publication.

By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.

Learn More