[图书][B] The net delusion: The dark side of Internet freedom

E Morozov - 2012 - books.google.com
" The revolution will be Twittered!" declared journalist Andrew Sullivan after protests erupted
in Iran in June 2009. Yet for all the talk about the democratizing power of the Internet …

Structured encryption and controlled disclosure

M Chase, S Kamara - Advances in Cryptology-ASIACRYPT 2010: 16th …, 2010 - Springer
We consider the problem of encrypting structured data (eg, a web graph or a social network)
in such a way that it can be efficiently and privately queried. For this purpose, we introduce …

Cloud computing security issues and challenges

SO Kuyoro, F Ibikunle, O Awodele - International Journal of …, 2011 - eprints.lmu.edu.ng
Cloud computing is a set of IT services that are provided to a customer over a network on a
leased basis and with the ability to scale up or down their service requirements. Usually …

The management of security in cloud computing

S Ramgovind, MM Eloff, E Smith - 2010 Information Security for …, 2010 - ieeexplore.ieee.org
Cloud computing has elevated IT to newer limits by offering the market environment data
storage and capacity with flexible scalable computing processing power to match elastic …

Certified lies: Detecting and defeating government interception attacks against SSL (short paper)

C Soghoian, S Stamm - … Conference on Financial Cryptography and Data …, 2011 - Springer
This paper introduces the compelled certificate creation attack, in which government
agencies may compel a certificate authority to issue false SSL certificates that can be used …

Blockchain, self-sovereign identity and digital credentials: promise versus praxis in education

A Grech, I Sood, L Ariño - Frontiers in Blockchain, 2021 - frontiersin.org
Blockchain's versatility is primarily due to its immutable and almost indestructible nature.
These attributes have caught the attention of researchers and developers interested in …

Home is safer than the cloud! Privacy concerns for consumer cloud storage

I Ion, N Sachdeva, P Kumaraguru… - Proceedings of the Seventh …, 2011 - dl.acm.org
Several studies ranked security and privacy to be major areas of concern and impediments
of cloud adoption for companies, but none have looked into end-users' attitudes and …

Sensitive information

P Ohm - S. Cal. L. Rev., 2014 - HeinOnline
Almost every information privacy law provides special protection for certain categories of"
sensitive information," such as health, sex, or financial information. Even though this …

[HTML][HTML] Data security issues and challenges in cloud computing: A conceptual analysis and review

O Harfoushi, B Alfawwaz, NA Ghatasheh… - communications and …, 2014 - scirp.org
Cloud computing is a set of Information Technology services offered to users over the web
on a rented base. Such services enable the organizations to scale-up or scale-down their in …

Confronting data inequality

A Fisher, T Streinz - Colum. J. Transnat'l L., 2021 - HeinOnline
In economic and human development narratives, the term" data inequality" typically
connotes a lack of opportunities that having access to digital data might otherwise enable …