Balancing Privacy with Legitimate Surveillance and Lawful Data Access
暂无分享,去创建一个
[1] Kim-Kwang Raymond Choo. Mobile Cloud Storage Users , 2014, IEEE Cloud Computing.
[2] W. Powell,et al. The iron cage revisited institutional isomorphism and collective rationality in organizational fields , 1983 .
[3] John F. Roddick,et al. Legal and Technical Issues of Privacy Preservation in Data Mining , 2009, Encyclopedia of Data Warehousing and Mining.
[4] Louis D. Brandeis,et al. The Right to Privacy , 1890 .
[5] Kim-Kwang Raymond Choo,et al. A Taxonomy of Cloud Attack Consequences and Mitigation Strategies: The Role of Access Control and Privileged Access Management , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[6] Kim-Kwang Raymond Choo. Cloud computing: Challenges and future directions , 2010 .
[7] J. Rubenfeld. The Right of Privacy , 1989 .
[8] Daniel Castro. How Much Will PRISM Cost the U.S. Cloud Computing Industry , 2013 .
[9] Kim-Kwang Raymond Choo,et al. The cyber threat landscape: Challenges and future research directions , 2011, Comput. Secur..
[10] Albert J. Marcella,et al. Privacy and Cyber Forensics: An Australian Perspective , 2007 .
[11] R. Sarre. Journalists, invasion of privacy and the High Court decision in Lenah Game Meats , 2003 .
[12] Kim-Kwang Raymond Choo,et al. Impacts of increasing volume of digital forensic data: A survey and future research challenges , 2014, Digit. Investig..
[13] Joseph K. Liu,et al. Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Encryption of Cloud Data , 2015, ESORICS.
[14] Kim-Kwang Raymond Choo. A Conceptual Interdisciplinary Plug-and-Play Cyber Security Framework , 2014 .