期刊文献+

云计算环境下的隐私权保护初探 被引量:21

Primary Study on the Privacy Protection in Cloud Computing Environment
下载PDF
导出
摘要 当前,云计算受到产业界的极大推崇并推出了一系列基于云计算平台的服务。但在已经实现的云计算服务中,安全问题一直令人担忧,以至于使得安全和隐私问题成为云计算普及过程中面临的一个巨大挑战。文章主要探讨云计算的隐私问题。在概述网络隐私权特点的基础上,指出了云计算环境下隐私的特殊性,分别从客户端、网络传输、服务器端三个方面阐述了网络隐私权存在的安全隐患。最后,从法律、技术、监管等方面分析了云计算环境下隐私权保护的方案。 At present,cloud computing is greatly respected by the industry.Industry launched a series of services based on cloud computing platform.However,in the cloud computing services which have already been achieved,safety issues are worrying,which made the security and privacy are great challenges we have to face in the process of popularity of cloud computing.The privacy is focused in this paper.In outlining the characteristics of Internet privacy,we pointed out privacy that based on the cloud computing environment,and discussed privacy risk from the client,network transmission,and server respectively.Finally,according to the problems,we tried to come up with solutions from the legal,technical,regulatory,etc.in order to better protection of client's privacy in cloud computing environment.
出处 《图书与情报》 CSSCI 北大核心 2010年第4期79-82,86,共5页 Library & Information
基金 教育部人文社科基金项目"多语种叙词本体的构建理论与自动维护模型研究"(07JA870013)研究成果之一
关键词 云计算 隐私权 保护 cloud computing privacy protection
  • 相关文献

参考文献8

二级参考文献54

  • 1范德尚.西方人权观的文化释读[J].河南社会科学,2004,12(3):33-37. 被引量:9
  • 2张梦.中美两国文化中的隐私观念比较[J].河南师范大学学报(哲学社会科学版),2006,33(5):37-39. 被引量:6
  • 3尚云鹤.浅析中西方隐私观的差异[J].黑龙江教育学院学报,2007,26(3):118-120. 被引量:2
  • 4Vise, D. ,. Fears over Big Brother stalked Gmail. The Sunday Times news paper. Available online at : [ EB/ OL] http ://business. timesonline, co. uk/article/, accessed on 8 December 2005.
  • 5Carina Painea, UlfDietrich Reipsb, Stefan Stiegerc, Adam Joinsona, Tom Buchanan. Internet users" perceptions of privacy concerns'and privacy actions" [J]. human - computer studies2007.65 (526 - 536).
  • 6Chang Liu, Jack T. Marchewka, June Lu, Chun - Sheng Yu. Beyond concem - a privacy - trust - behavioral intention model of electronic commerce [ J]. Information & Management 42 (2005) 289 -304.
  • 7Huberman B, Adar E, Fine L. Valuating Privacy [ J ]. IEEE SECURITY&PRIVACY, 2005 : 22 - 25.
  • 8Thabtah F, Cowling P, Hammoud S. Improving nile sorting, predictive accuracy and training time in associative classification [ J ]. Expert Systems with Applications, 2006(31 ) : 414 -426.
  • 9Liu B, Hsu W, Ma Y. Integrating classification and association rule mining [ C ]. Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining (KDD-98), 1995.
  • 10Antonie M, Za? ane O, Coman, A. Associative classifiers for medical images [ M ]. Lecture notes in artificial intelligence 2797, mining multimedia and complex data. New York: Springer, 2003, 68 - 83.

共引文献1358

同被引文献187

引证文献21

二级引证文献182

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部