XRDS

Crossroads The ACM Magazine for Students

Sign In

Association for Computing Machinery

Articles Tagged: Database and storage security

Articles & Features

SECTION: Features

The principle of least sensing

With the worldwide emergence of data protection regulations, how to conduct law-regulated big data analytics becomes a challenging and fundamental problem. This article introduces the principle of least sensing, a promising sensing paradigm toward legally regulated big data analytics.

By Leye Wang, April 2022

PDF | HTML | In the Digital Library

Pseudonimity and anonymity as tools for regaining privacy

COLUMN: INIT

Pseudonimity and anonymity as tools for regaining privacy

By Vasilis Ververis, Gunnar Wolf, July 2018

PDF | HTML | In the Digital Library

A history of data breaches

DEPARTMENT: Milestones

A history of data breaches

By Alok Pandey, July 2018

PDF | HTML | In the Digital Library

The principle of least authority: how capabilities can improve internet-scale privacy

SECTION: Features

The principle of least authority: how capabilities can improve internet-scale privacy

The core protocols our computers use to communicate across the internet need to be improved in order to give users control over their privacy and protect metadata. Capabilities encode information about what can be done with data into the data itself, and may be a useful building block for the next generation of internet protocols.

By Jack Grigg, July 2018

PDF | HTML | In the Digital Library

Data security in the cloud environment

DEPARTMENT: Blogs

Data security in the cloud environment

By Dimitris Mitropoulos, March 2013

PDF | HTML | In the Digital Library

An overview of privacy preserving data mining

By Aris Gkoulalas-Divanis, Vassilios S. Verykios, June 2009

PDF | HTML | In the Digital Library