Balancing Privacy with Legitimate Surveillance and Lawful Data Access
نویسندگان
چکیده
منابع مشابه
Protecting the Privacy of Personal Smart Spaces
The purpose of privacy protection is dual, as it aims to both prevent, as well as cure privacy breaches. The starting point to develop such a privacy protection framework is the investigation and the definition of the privacy breach concept. A widely acceptable answer to this is provided by the privacy protection regulation, which however does not provide a precise enough definition of the priv...
متن کاملCatching Bandits and Only Bandits: Privacy-Preserving Intersection Warrants for Lawful Surveillance
Motivated in part by the Snowden revelations, we address the question of whether intelligence and lawenforcement agencies can gather actionable, relevant information about unknown electronic targets without conducting dragnet surveillance. We formulate principles that we believe effective, lawful surveillance protocols should adhere to in an era of big data and global communication networks. We...
متن کاملPrivacy-Respecting Smart Video Surveillance Based on Usage Control Enforcement
The number of video surveillance deployments in publicly accessible spaces is continuously increasing. At the same time, the call for technical assistance of human operators in terms of so-called smart video surveillance system has been growing ever louder and is addressed by research and development. With such systems, video analysis algorithms for activity recognition, tracking, and biometric...
متن کاملLawful Interception of the Internet
This paper describes the state of Lawful Interception of the Internet and compares it with Lawful Interception of access networks. Lawful Interception is the process of secretly intercepting communications between parties of interest to Law Enforcement agencies. Internet interception is both more difficult and much more immature than access network interception. Refusal by the main standards bo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IEEE Cloud Computing
دوره 2 شماره
صفحات -
تاریخ انتشار 2015