XRDS

Crossroads The ACM Magazine for Students

Sign In

Association for Computing Machinery

Articles Tagged: Database and storage security

Articles & Features

COLUMN: INIT

Pseudonimity and anonymity as tools for regaining privacy

By Vasilis Ververis, Gunnar Wolf, July 2018

PDF | HTML | In the Digital Library

DEPARTMENT: Milestones

A history of data breaches

By Alok Pandey, July 2018

PDF | HTML | In the Digital Library

SECTION: Features

The principle of least authority: how capabilities can improve internet-scale privacy

The core protocols our computers use to communicate across the internet need to be improved in order to give users control over their privacy and protect metadata. Capabilities encode information about what can be done with data into the data itself, and may be a useful building block for the next generation of internet protocols.

By Jack Grigg, July 2018

PDF | HTML | In the Digital Library

Data security in the cloud environment

DEPARTMENT: Blogs

Data security in the cloud environment

By Dimitris Mitropoulos, March 2013

PDF | HTML | In the Digital Library

An overview of privacy preserving data mining

By Aris Gkoulalas-Divanis, Vassilios S. Verykios, June 2009

PDF | HTML | In the Digital Library