메뉴 건너뛰기




Volumn 29, Issue , 2012, Pages 241-251

The impact of cloud computing technology on legal infrastructure within Internet - Focusing on the protection of information privacy

Author keywords

Cloud computing; Information privacy; Information security; Jurisdiction; Legal infrastructure

Indexed keywords

CYBERSPACES; INFORMATION PRIVACY; JURISDICTION; LEGAL INFRASTRUCTURE; LEGAL PROTECTION;

EID: 84858382654     PISSN: 18777058     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1016/j.proeng.2011.12.701     Document Type: Conference Paper
Times cited : (30)

References (35)
  • 1
    • 63649117166 scopus 로고    scopus 로고
    • Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering IT services as the 5th utility
    • Buyya R, Yeo CS, Venugopal S, Broberg J, Brandic I. Cloud computing and emerging IT platforms: vision, hype, and reality for delivering IT services as the 5th utility. Future Generation of Computer Systems 2009; 25: 599-616.
    • (2009) Future Generation of Computer Systems , vol.25 , pp. 599-616
    • Buyya, R.1    Yeo, C.S.2    Venugopal, S.3    Broberg, J.4    Brandic, I.5
  • 3
    • 84858377386 scopus 로고    scopus 로고
    • Privacy regulations for cloud computing - Compliance and implementation in theory and practice
    • Ruiter J, Warnier M. Privacy regulations for cloud computing - compliance and implementation in theory and practice. SPCC 2010.
    • (2010) SPCC
    • Ruiter, J.1    Warnier, M.2
  • 6
    • 74049152260 scopus 로고    scopus 로고
    • Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
    • Ristenpart T, Tromer E, Shacham H, Savage S. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. CCS 2009.
    • (2009) CCS
    • Ristenpart, T.1    Tromer, E.2    Shacham, H.3    Savage, S.4
  • 7
    • 78650851875 scopus 로고    scopus 로고
    • Caught in the cloud: Privacy, encryption, and government back doors in the Web 2.0 Era
    • Soghoian, C. Caught in the cloud: privacy, encryption, and government back doors in the Web 2.0 Era, J on Telecomm & High Tech L 2009, 8: 359-424.
    • (2009) J on Telecomm & High Tech L , vol.8 , pp. 359-424
    • Soghoian, C.1
  • 10
    • 70350642087 scopus 로고    scopus 로고
    • Fully homomorphic encryption using ideal lattices
    • Gentry C. Fully homomorphic encryption using ideal lattices. ACM Symposium on Theory of Computing 2009, 169-178.
    • (2009) ACM Symposium on Theory of Computing , pp. 169-178
    • Gentry, C.1
  • 11
    • 82655174072 scopus 로고    scopus 로고
    • IBM touts encryption innovation
    • June 25
    • Cooney M. IBM touts encryption innovation. Computer World 2009, June 25.
    • (2009) Computer World
    • Cooney, M.1
  • 12
    • 84858381053 scopus 로고    scopus 로고
    • Homomorphic encryption breakthrough
    • July 9
    • Schneier B. Homomorphic encryption breakthrough. Schneier on Security 2009, July 9.
    • (2009) Schneier on Security
    • Schneier, B.1
  • 13
    • 74049093526 scopus 로고    scopus 로고
    • Controlling data in the cloud: Outsourcing computation without outsourcing control
    • Chow R, Golle P, Jakobsson M, Shi E, Staddon J, Masuoka R. et al. Controlling data in the cloud: outsourcing computation without outsourcing control. CCSW 2009.
    • (2009) CCSW
    • Chow, R.1    Golle, P.2    Jakobsson, M.3    Shi, E.4    Staddon, J.5    Masuoka, R.6
  • 16
    • 77953295132 scopus 로고    scopus 로고
    • Privacy-preserving public auditing for data storage security in cloud computing
    • Wang C, Wang Q, Ren K, Lou W. Privacy-preserving public auditing for data storage security in cloud computing. INFOCOM 2010, 1-9.
    • (2010) INFOCOM , pp. 1-9
    • Wang, C.1    Wang, Q.2    Ren, K.3    Lou, W.4
  • 17
    • 84858377389 scopus 로고    scopus 로고
    • A maturity model for cloud computing
    • December 12
    • Urquhart J. A maturity model for cloud computing. CNET News 2008, December 12.
    • (2008) CNET News
    • Urquhart, J.1
  • 19
    • 70349836055 scopus 로고    scopus 로고
    • Taking account of privacy when designing cloud computing services
    • Pearson S. Taking account of privacy when designing cloud computing services. ICSE-Cloud 2009.
    • (2009) ICSE-Cloud
    • Pearson, S.1
  • 21
    • 79960242476 scopus 로고    scopus 로고
    • Oct. 2009
    • Centre for Information Policy Leadership (CIPL). Data Protection Accountability: The Essential Elements, Oct. 2009. Available from: http://www.huntonfiles.com/files/webupload/CIPL-Galway-Accountability-Paper.pdf. 2009
    • (2009) Data Protection Accountability: The Essential Elements
  • 22
    • 84858381054 scopus 로고    scopus 로고
    • Oct. 2010
    • Centre for Information Policy Leadership (CIPL). Demonstrating and Measuring Accountability: A Discussion Document, Oct. 2010. Available from: http://www.huntonfiles.com/files/webupload/CIPL-Accountability-Phase-II-Paris- Project.PDF. 2010.
    • (2010) Demonstrating and Measuring Accountability: A Discussion Document
  • 24
    • 77950562201 scopus 로고    scopus 로고
    • Accountability as a way forward for privacy protection in the cloud
    • Pearson S, Charlesworth A. Accountability as a way forward for privacy protection in the cloud. CloudCom 2009.
    • (2009) CloudCom
    • Pearson, S.1    Charlesworth, A.2
  • 27
    • 84858388464 scopus 로고    scopus 로고
    • "Apps.Gov": Assessing privacy in the cloud computing
    • Khan S. "Apps.Gov": assessing privacy in the cloud computing. NCJL & Tech 2010, 11: 259-289.
    • (2010) NCJL & Tech , vol.11 , pp. 259-289
    • Khan, S.1
  • 29
    • 77954044387 scopus 로고    scopus 로고
    • Free at what costs?: Cloud computing privacy under the stored communications act
    • Robison WJ. Free at what costs?: cloud computing privacy under the stored communications act. The Georgetown Law Journal 2010, 98, 1195-1239.
    • (2010) The Georgetown Law Journal , vol.98 , pp. 1195-1239
    • Robison, W.J.1
  • 30
    • 84858413539 scopus 로고    scopus 로고
    • Coalition: New laws needed to curb government access to private data
    • March 31
    • Morphy E. Coalition: new laws needed to curb government access to private data. E Commerce Times 2010, March 31.
    • (2010) E Commerce Times
    • Morphy, E.1
  • 31
    • 8344286664 scopus 로고
    • Protection of individuals with regard to the processing of personal data and on the free movement of such data
    • Directive 95/46/EC of the European Parliament and of the council of 24 October 1995 on the, No L281/31
    • Directive 95/46/EC of the European Parliament and of the council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal of the European Communities 1995, No L 281/31.
    • (1995) Official Journal of the European Communities
  • 32
    • 84858413538 scopus 로고    scopus 로고
    • New security breach notification requirements under amended e-privacy directive
    • March 01
    • Dhont J, Woodcock K. New security breach notification requirements under amended e-privacy directive. The Privacy Advisor 2010, March 01.
    • (2010) The Privacy Advisor
    • Dhont, J.1    Woodcock, K.2
  • 34
    • 84858432432 scopus 로고    scopus 로고
    • Clouds at the crossroads: Research perspectives and challenges
    • Vigfusson Y, Chockler G. Clouds at the crossroads: research perspectives and challenges. ACM Crossroads 2010, 16(3).
    • (2010) ACM Crossroads , vol.16 , Issue.3
    • Vigfusson, Y.1    Chockler, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.