Journals in DBLP
Commun. ACM 2001, volume: 44, number: 2
Diane Crawford Editorial Pointers. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2001, v:44, n:2, pp:5- [Journal ] Robert Fox News Track. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2001, v:44, n:2, pp:9-10 [Journal ] Diane Crawford Forum. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2001, v:44, n:2, pp:11-13 [Journal ] Peter J. Denning Who Are We? [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2001, v:44, n:2, pp:15-19 [Journal ] Meg McGinity Name is the Game. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2001, v:44, n:2, pp:21-23 [Journal ] Steven Bellman , Eric J. Johnson , Gerald L. Lohse To Opt-In or Opt-Out? It Depends on the Question. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2001, v:44, n:2, pp:25-27 [Journal ] Imran Bashir , Enrico Serafini , Kevin Wall Securing network software applications: introduction. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2001, v:44, n:2, pp:28-20 [Journal ] John Viega , Tadayoshi Kohno , Bruce Potter Trust (and mistrust) in secure applications. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2001, v:44, n:2, pp:31-36 [Journal ] James Joshi , Walid G. Aref , Arif Ghafoor , Eugene H. Spafford Security models for web-based applications. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2001, v:44, n:2, pp:38-44 [Journal ] David M. Martin Jr. , Richard M. Smith , Michael Brittain , Ivan Fetch , Hailin Wu The privacy practices of web browser extensions. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2001, v:44, n:2, pp:45-50 [Journal ] Anup K. Ghosh , Tara M. Swaminatha Software security and privacy risks in mobile e-commerce. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2001, v:44, n:2, pp:51-57 [Journal ] Chris I. Dalton , Tse Huong Choo An operating system approach to securing e-services. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2001, v:44, n:2, pp:58-64 [Journal ] Pamela Samuelson Intellectual property for an information age: introduction. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2001, v:44, n:2, pp:66-68 [Journal ] Dan L. Burk Copyrightable functions and patentable speech. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2001, v:44, n:2, pp:69-75 [Journal ] Randall Davis The digital dilemma. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2001, v:44, n:2, pp:77-83 [Journal ] Yochai Benkler The battle over the institutional ecosystem in the digital environment. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2001, v:44, n:2, pp:84-90 [Journal ] A. Michael Froomkin The collision of trademarks, domain names, and due process in cyberspace. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2001, v:44, n:2, pp:91-97 [Journal ] Maureen A. O'Rourke Is virtual trespass an apt analogy? [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2001, v:44, n:2, pp:98-103 [Journal ] Peter G. Neumann What to know about risks. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2001, v:44, n:2, pp:136- [Journal ]