{"title":"商业环境中的加密和隐私","authors":"Neil Light","doi":"10.1145/2885990.2886007","DOIUrl":null,"url":null,"abstract":"This paper briefly outlines forms of public key encryption. Also, common uses of encryption in the business environment are described. Finally, policy concerns regarding security and privacy are addressed.","PeriodicalId":236418,"journal":{"name":"Proceedings of the 2015 Information Security Curriculum Development Conference","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Encryption and privacy in the business environment\",\"authors\":\"Neil Light\",\"doi\":\"10.1145/2885990.2886007\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper briefly outlines forms of public key encryption. Also, common uses of encryption in the business environment are described. Finally, policy concerns regarding security and privacy are addressed.\",\"PeriodicalId\":236418,\"journal\":{\"name\":\"Proceedings of the 2015 Information Security Curriculum Development Conference\",\"volume\":\"25 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-10-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 2015 Information Security Curriculum Development Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/2885990.2886007\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2015 Information Security Curriculum Development Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2885990.2886007","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Encryption and privacy in the business environment
This paper briefly outlines forms of public key encryption. Also, common uses of encryption in the business environment are described. Finally, policy concerns regarding security and privacy are addressed.