Security and Privacy in Three States of Information

E. Cankaya
{"title":"Security and Privacy in Three States of Information","authors":"E. Cankaya","doi":"10.5772/intechopen.91610","DOIUrl":null,"url":null,"abstract":"In regard to computational context, information can be in either of three states at a time: in transit, in process, or in storage. When the security and privacy of information is of concern, each of these states should be addressed exclusively, i.e., network security, computer security, and database/cloud security, respectively. This chapter first introduces the three states of information and then addresses the security as well as privacy issues that relate to each state. It provides practical examples for each state discussed, introduces corresponding security and privacy algorithms for explaining the concepts, and facilitates their implementation whenever needed. Moreover, the security and privacy techniques pertaining to the three states of information are combined together to offer a more comprehensive and realistic consideration of everyday security practices.","PeriodicalId":143303,"journal":{"name":"Security and Privacy From a Legal, Ethical, and Technical Perspective","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Security and Privacy From a Legal, Ethical, and Technical Perspective","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5772/intechopen.91610","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

In regard to computational context, information can be in either of three states at a time: in transit, in process, or in storage. When the security and privacy of information is of concern, each of these states should be addressed exclusively, i.e., network security, computer security, and database/cloud security, respectively. This chapter first introduces the three states of information and then addresses the security as well as privacy issues that relate to each state. It provides practical examples for each state discussed, introduces corresponding security and privacy algorithms for explaining the concepts, and facilitates their implementation whenever needed. Moreover, the security and privacy techniques pertaining to the three states of information are combined together to offer a more comprehensive and realistic consideration of everyday security practices.
三种信息状态下的安全和隐私
关于计算上下文,信息可以同时处于三种状态中的一种:传输中、处理中或存储中。当涉及到信息的安全和隐私时,每一种状态都应该单独处理,即分别处理网络安全、计算机安全和数据库/云安全。本章首先介绍了信息的三种状态,然后讨论了与每种状态相关的安全和隐私问题。它为所讨论的每种状态提供了实际示例,介绍了相应的安全和隐私算法来解释这些概念,并在需要时促进它们的实现。此外,与这三种信息状态相关的安全和隐私技术结合在一起,为日常安全实践提供了更全面和更现实的考虑。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信