Pervasive Monitoring and Opportunistic Security: Defending the Internet's Protocols
How can standards working groups protect Internet users from pervasive monitoring, where users' data are being massively collected, aggregated, and analyzed?
Saved in:
| Published in: | IEEE internet computing Vol. 19; no. 2; pp. 75 - 77 |
|---|---|
| Main Author: | |
| Format: | Journal Article |
| Language: | English |
| Published: |
IEEE
01.03.2015
|
| Subjects: | |
| ISSN: | 1089-7801 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Summary: | How can standards working groups protect Internet users from pervasive monitoring, where users' data are being massively collected, aggregated, and analyzed? |
|---|---|
| Bibliography: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 23 |
| ISSN: | 1089-7801 |
| DOI: | 10.1109/MIC.2015.44 |