Home → Magazine Archive → February 2001 (Vol. 44, No. 2)
Table of Contents
Trust (and Mistrust) in Secure Applications
Exploring and considering trust assumptions during every stage of software development.
Pages 31-36Security Models For Web-Based Applications
Using traditional and emerging access control approaches to develop secure applications for the Web.
Pages 38-44The Privacy Practices of Web Browser Extensions
Whatever they are, the full terms of privacy these products offer are seldom made clear.
Pages 45-50Software Security and Privacy Risks in Mobile E-Commerce
Examining the risks in wireless computing that will likely influence the emerging m-commerce market.
Pages 51-57An Operating System Approach to Securing E-Services
Implementing Trusted Linux, an ideal platform for e-services application hosting.
Pages 58-64Intellectual Property For an Information Age: Introduction
How to balance the public interest, traditional legal principles, and the emerging digital reality.
Pages 66-68The Battle Over the Institutional Ecosystem in the Digital Environment
Pages 84-90The Collision of Trademarks, Domain Names, and due Process in Cyberspace
Pages 91-97