How Might We Increase System Trustworthiness?
Reflections on Computer-Related Risks
Risks of National Identity Cards
Source Availability and E-Voting: an Advocate Recants
Technical Perspective: SQL on an Encrypted Database
Business Process Development Life Cycle Methodology
Computing Arbitrary Functions of Encrypted Data
Physical Key Extraction Attacks on PCs
The Future of the Internet of Things
OpenVPN Is Open to VPN Fingerprinting
Why IT Managers Don’t Go For Cyber-Insurance Products
Shape the Future of Computing
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedCommunications of the ACM (CACM) is now a fully Open Access publication.
By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More