Pervasive Monitoring and Opportunistic Security: Defending the Internet's Protocols
How can standards working groups protect Internet users from pervasive monitoring, where users' data are being massively collected, aggregated, and analyzed?
Uloženo v:
| Vydáno v: | IEEE internet computing Ročník 19; číslo 2; s. 75 - 77 |
|---|---|
| Hlavní autor: | |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
IEEE
01.03.2015
|
| Témata: | |
| ISSN: | 1089-7801 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | How can standards working groups protect Internet users from pervasive monitoring, where users' data are being massively collected, aggregated, and analyzed? |
|---|---|
| AbstractList | How can standards working groups protect Internet users from pervasive monitoring, where users' data are being massively collected, aggregated, and analyzed? |
| Author | Leiba, Barry |
| Author_xml | – sequence: 1 givenname: Barry surname: Leiba fullname: Leiba, Barry email: barryleiba@computer.org |
| BookMark | eNo90L1PAjEcxvEOmAjo5OhymybmsO31eq2bwTcSCCSwN6X3O6052rPtkfDfC8E4Pcsnz_AdoYHzDhC6IXhCCJaPi9l0QjEpJ4wN0JBgIfNKYHKJRjF-Y4yFoGSI1isIex3tHrKFdzb5YN1npl2dLbvOh9Q7G5M12RpMH2w6PGUv0ICrTyp9QTZzCYKDdBezVfDJG9_GK3TR6DbC9d-O0ebtdTP9yOfL99n0eZ4byljKCd5qVoKkhWlkjRmj1EgDRgjMt9SIbckxNho3uuAGmNRUF01jal5WpBCyGKP7820X_E8PMamdjQbaVjvwfVSEV5XkZcHFkT6cqQk-xgCN6oLd6XBQBKtTLXWspU61FGNHfXvWFgD-ZYU5qSQrfgGmGGpM |
| CODEN | IICOFX |
| ContentType | Journal Article |
| DBID | 97E RIA RIE AAYXX CITATION 7SC 7SP 8FD F28 FR3 JQ2 L7M L~C L~D |
| DOI | 10.1109/MIC.2015.44 |
| DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE/IET Electronic Library CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ANTE: Abstracts in New Technology & Engineering Engineering Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Engineering Research Database Advanced Technologies Database with Aerospace ANTE: Abstracts in New Technology & Engineering Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Technology Research Database |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE/IET Electronic Library url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EndPage | 77 |
| ExternalDocumentID | 10_1109_MIC_2015_44 7061794 |
| Genre | orig-research |
| GroupedDBID | -~X .4S .DC 0R~ 1OL 29I 4.4 5GY 5VS 6IF 6IK 6IL 6IN 8FE 8FG 8R4 8R5 97E AAJGR AARMG AASAJ AAWTH ABAZT ABFSI ABJCF ABPPZ ABQJQ ABUWG ABVLG ACGFO ACIWK ADZIZ AENEX AETIX AFKRA AFOGA AGQYO AGSQL AHBIQ AI. AIBXA AJQPL AKJIK AKQYR ALLEH ALMA_UNASSIGNED_HOLDINGS ARAPS ARCSS ATWAV AZLTO AZQEC BEFXN BENPR BFFAM BGLVJ BGNUA BKEBE BPEOZ BPHCQ CCPQU CHZPO CS3 DU5 DWQXO E.L EBS EDO EJD GNUQQ HCIFZ HZ~ H~9 I-F IEDLZ IEGSK IFIPE IFJZH IPLJI ITG ITH JAVBF K6V K7- L6V LAI M43 M7S O9- OCL P2P P62 PHGZM PHGZT PQGLB PQQKQ PROAC PTHSS PUEGO Q2X RIA RIE RIL RNI RNS RZB TN5 VH1 XZL ZY4 AAYXX AFFHD CITATION 7SC 7SP 8FD F28 FR3 JQ2 L7M L~C L~D |
| ID | FETCH-LOGICAL-c244t-10ba45e923cf9d04422c9cec8806b2c8b5600ca0fa36ce49a2a3ffcd65713893 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 1 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000351774200011&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1089-7801 |
| IngestDate | Sun Sep 28 07:30:23 EDT 2025 Sat Nov 29 03:46:52 EST 2025 Wed Aug 27 02:48:17 EDT 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 2 |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c244t-10ba45e923cf9d04422c9cec8806b2c8b5600ca0fa36ce49a2a3ffcd65713893 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 23 |
| PQID | 1677965368 |
| PQPubID | 23500 |
| PageCount | 3 |
| ParticipantIDs | ieee_primary_7061794 proquest_miscellaneous_1677965368 crossref_primary_10_1109_MIC_2015_44 |
| PublicationCentury | 2000 |
| PublicationDate | 2015-Mar.-Apr. 2015-3-00 20150301 |
| PublicationDateYYYYMMDD | 2015-03-01 |
| PublicationDate_xml | – month: 03 year: 2015 text: 2015-Mar.-Apr. |
| PublicationDecade | 2010 |
| PublicationTitle | IEEE internet computing |
| PublicationTitleAbbrev | MIC |
| PublicationYear | 2015 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0008821 |
| Score | 2.0936377 |
| Snippet | How can standards working groups protect Internet users from pervasive monitoring, where users' data are being massively collected, aggregated, and analyzed? |
| SourceID | proquest crossref ieee |
| SourceType | Aggregation Database Index Database Publisher |
| StartPage | 75 |
| SubjectTerms | Big Data Computation Computer information security Computer security Internet Internet of things Internet protocols Internet/Web technologies IP (Internet Protocol) Monitoring opportunistic security Pervasive computing pervasive monitoring Privacy Protocols security and privacy Web browsers |
| Title | Pervasive Monitoring and Opportunistic Security: Defending the Internet's Protocols |
| URI | https://ieeexplore.ieee.org/document/7061794 https://www.proquest.com/docview/1677965368 |
| Volume | 19 |
| WOSCitedRecordID | wos000351774200011&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE/IET Electronic Library issn: 1089-7801 databaseCode: RIE dateStart: 19970101 customDbUrl: isFulltext: true dateEnd: 99991231 titleUrlDefault: https://ieeexplore.ieee.org/ omitProxy: false ssIdentifier: ssj0008821 providerName: IEEE |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3NS8MwFH9sw4Me_Jri_CLCwIvd-pEmjTdRhweZgw3ZraTpC3hpx9b595uk3VD04q2UJrS_vrz3y_vIA-ij0rmimfa49rlHaYSeYDzwMBeK5Wb_IN3xxe-vfDxO5nMxacHdthYGEV3yGQ7spYvl56VaW1fZkFt7K2gb2pzzulZrq3UNUwzqZHrhcaN2m1q8wBdD8z02hyseUPrD-rh2Kr90sDMso4P_vdIh7DcEkjzUf_wIWlgcw963YwW7MJ1YT6vNSyf1krW3iSxy8rawdNtGsM1oMm16192TJ9ToyluI4YOk9hJidbsik2VZlUZWVicwGz3PHl-8pnmCp4zFrox6zSSN0fA3pUXuUxqGSihUZr2yLFRJZqmOkr6WEVNIhQxlpLXKWcxt7DI6hU5RFngGJI-jLDamnCWxmZlTyTgiz1iWcK0wjHvQ32CaLuojMlK3tfBFaqBPLfQppT3oWvi2jzTI9eBmg39qJNuGK2SB5XqVBoxzweKIJed_D72AXTt3nRF2CZ1qucYr2FGf1cdqee3E4wt-QbrY |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1JS8NAFH64gXpwq2JdRxC8mDbLLBlv4oJirYUW8RYmkzfgJSlt6u93JolF0Yu3EDJZvrx575u3DcA5apNpmhpPGF94lEboSS4CDzOpeWbXD6pqX_zaE_1-_PYmBwtwOa-FQcQq-Qw77rCK5WeFnjlXWVc4eyvpIiwzSsOgrtaa613LFYM6nV56wirephov8GXXfpHL4mIdSn_Yn2pDlV9auDIt95v_e6kt2GgoJLmu__k2LGC-A-vfGgu2YDhwvlaXmU7qSetOE5Vn5GXsCLeLYdvRZNjsXndFbtFgVeBCLCMktZ8Qy4spGUyKsrDSMt2F0f3d6ObBa7ZP8LS12aVVsKmiDC2D00ZmvkUs1FKjtjOWp6GOU0d2tPKNirhGKlWoImN0xplw0ctoD5byIsd9IBmLUmaNOY-ZvbOgigtEkfI0FkZjyNpw_oVpMq6bZCTV4sKXiYU-cdAnlLah5eCbX9Ig14azL_wTK9suYKFyLGbTJOBCSM4iHh_8PfQUVh9Gz72k99h_OoQ195w6P-wIlsrJDI9hRX-U79PJSSUqn2Fkvh8 |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Pervasive+Monitoring+and+Opportunistic+Security%3A+Defending+the+Internet%27s+Protocols&rft.jtitle=IEEE+internet+computing&rft.au=Leiba%2C+Barry&rft.date=2015-03-01&rft.issn=1089-7801&rft.volume=19&rft.issue=2&rft.spage=75&rft.epage=77&rft_id=info:doi/10.1109%2FMIC.2015.44&rft.externalDBID=NO_FULL_TEXT |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1089-7801&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1089-7801&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1089-7801&client=summon |