An RFID-passport attack is more plausible than skimming RFID information. Do RFID passports make us vulnerable to identity theft?
Alan Ramos, Weina Scott, William Scott, Doug Lloyd, Katherine O'Leary, Jim Waldo From Communications of the ACM | December 2009
Long considered an afterthought, software maintenance is easiest and most effective when built into a system from the ground up.Paul Stachour, David Collier-Brown From Communications of the ACM | November 2009
Users with no security training download Web browsers from the Internet without precaution, and demand that they be fast and easy to use. What can be done to make ...Thomas Wadlow, Vlad Gorelik From Communications of the ACM | May 2009
The answer to software reliability concerns may lie in formal methods.Mike Hinchey, Michael Jackson, Patrick Cousot, Byron Cook, Jonathan P. Bowen, Tiziana Margaria From Communications of the ACM | September 2008