DocumentCode
104388
Title
Pervasive Monitoring and Opportunistic Security: Defending the Internet´s Protocols
Author
Leiba, Barry
Volume
19
Issue
2
fYear
2015
fDate
Mar.-Apr. 2015
Firstpage
75
Lastpage
77
Abstract
How can standards working groups protect Internet users from pervasive monitoring, where users´ data are being massively collected, aggregated, and analyzed?
Keywords
Internet; computer network security; protocols; ubiquitous computing; Internet protocols; Internet users; opportunistic security; pervasive monitoring; Computer security; Internet of things; Pervasive computing; Privacy; Protocols; Web browsers; Big Data; Internet protocols; Internet/Web technologies; opportunistic security; pervasive monitoring; security and privacy;
fLanguage
English
Journal_Title
Internet Computing, IEEE
Publisher
ieee
ISSN
1089-7801
Type
jour
DOI
10.1109/MIC.2015.44
Filename
7061794
Link To Document