scispace - formally typeset
Search or ask a question

Showing papers on "Privacy software published in 1991"


Proceedings ArticleDOI
02 Dec 1991
TL;DR: The authors discuss technical options to achieve adequate privacy and fraud control for portable communication systems and concentrate on the privacy of conversations on the radio link only.
Abstract: The authors discuss technical options to achieve adequate privacy and fraud control for portable communication systems. As the goal is to provide privacy at least comparable to that provided by wireline, the authors concentrate on the privacy of conversations on the radio link only. A high-level description of the portable communications system is presented, which provides a basis for further discussion. Message encryption is considered, the process by which a cipher function is applied to the portable communications systems data streams in order to deter eavesdroppers. Some background on public-key cryptography and some information regarding implementation of public-key techniques in low-power portable units are given. Key agreement and authentication protocols are outlined. >

27 citations


Journal ArticleDOI
TL;DR: The concept of privacy is explored, the major computer threats to personal privacy and the changing legal environment are described, and how organizations can establish internal privacy codes for their own protection are recommended.
Abstract: Information technology makes it easier than ever to collect, store, and disseminate personal information, then use it to carry out business and political decisions. Federal legislation limits corporate and government manipulation of personal data, and private companies are finding that they must do the same or risk lawsuits from irate customers, clients, and rejected prospects. This article explores the concept of privacy, describes the major computer threats to personal privacy and the changing legal environment, and recommends how organizations can establish internal privacy codes for their own protection.

22 citations


Journal ArticleDOI
TL;DR: A variety of technical, managerial, and policy options are presented to help secure privacy and accessibility in electronic communications and education via a national research and education network (NREN) with appropriate privacy functionality.

5 citations



Proceedings ArticleDOI
25 Feb 1991
TL;DR: The RSA Public-Key Cryptosystem is described, and digital signatures and certificates are discussed, and standards and future prospects in this field are considered.
Abstract: Public-key cryptography is discussed with respect to the rights of individuals to electronic privacy. The RSA Public-Key Cryptosystem is described, and digital signatures and certificates are discussed. Applications of public-key cryptography are reviewed, and standards and future prospects in this field are considered. >

2 citations


Book
01 May 1991

2 citations


Proceedings ArticleDOI
25 Feb 1991
TL;DR: The author argues that the challenge now is to raise the visibility of the campaign for privacy protection and to focus its energies on obtainable, constructive solutions that do not get so watered down along the way that they do more harm than good.
Abstract: The author discusses information privacy, the right to control data about individuals that is kept by governmental and corporate institutions. He notes that the 1990s promises to be the decade that determines the course of information and privacy policies for many decades to come. He argues that what must be confronted is the fact that the necessary laws have not been passed because certain sectors of the American business community, along with government, have formed an antiprivacy lobby which, due to lack of focus and little effective pressure on lawmakers, has been able to derail most proposals that politicians generally could not oppose in a highly visible context. He further argues that the challenge now is to raise the visibility of the campaign for privacy protection and to focus its energies on obtainable, constructive solutions that do not get so watered down along the way that they do more harm than good. >

1 citations