Abstract
Considering recent privacy- and security-related events through this column.
- boyd, d. It's Complicated. Yale University Press, 2014.Google Scholar
- Burley, D., Eisenberg, J., and Goodman, S. Would cybersecurity professionalization help the cybersecurity crisis? Commun. ACM 57, 2 (Feb. 2013), 24--27. Google ScholarDigital Library
- Byres, E. The air gap: SCADA's enduring security myth. Commun. ACM 56, 8 (Aug. 2013), 29--31. Google ScholarDigital Library
- European Court, Judgement of the Court, Grand Chamber. Google Spain SL Google Inc. v. Agencia Espanola Proteccion de Datos Mario Costeja Gonzalez, May 13, 2014; http://bit.ly/1prYAfk.Google Scholar
- Federal Trade Commission. SnapChat Settles FTC Charges that Promises of Disappearing Messages were False. Press Release, May 8, 2014.Google Scholar
- Florencio, D., Herley, C., and Shostack, A. FUD: A plea for intolerance. Commun. ACM 57, 6 (June 2014), 31--33. Google ScholarDigital Library
- Garside, J. Vodafone reveals existence of secret wires that allow state surveillance. Guardian (June 5, 2014).Google Scholar
- Gellman, R. Fair Information Practices: A History, Version 2.11 (Apr. 2014); http://bobgellman.com/rg-docs/rg-FIPShistory.pdf.Google Scholar
- Irion, K. Communications networks tapped for intelligence-gathering. Commun. ACM 52, 2 (Feb. 2009), 26--28.Google ScholarDigital Library
- McDermott, R. Emotion and security. Commun. ACM 55, 2 (Feb. 2012), 35--37. Google ScholarDigital Library
- Mirani, L. Google's sneaky new privacy change affects 85% of iPhone users---but most of them won't have noticed. Quartz (Apr. 3, 2014); http://bit.ly/1fKRDB2.Google Scholar
- Narayanan, A. and Shmatikov, V. Myths and fallacies of 'personally identifiable information'. Commun. ACM 53, 6 (June 2010), 24--26. Google ScholarDigital Library
- Riley, M., Elgin, B., Lawrence, D., and Matlack, C. Missed alarms and 40 million stolen credit card numbers: How target blew it. BloombergBusinessweek Technology, (Mar. 14, 2014).Google Scholar
- Snow, B. and Brooks, C. An ethics code for U.S. intelligence officers. Commun. ACM 52, 8 (Aug. 2009), 30--32. Google ScholarDigital Library
- Tor Metrics Portal, Users; http://bit.ly/1oMOzJA.Google Scholar
- U.S. Secretary's Advisory Committee on Automated Personal Data Systems. Records, Computers and the Rights of Citizens, 1973.Google Scholar
- Westin, A. Privacy and Freedom, Antheneum, 1967.Google Scholar
Index Terms
- Summing up
Recommendations
Strong Duality for Semidefinite Programming
It is well known that the duality theory for linear programming (LP) is powerful and elegant and lies behind algorithms such as simplex and interior-point methods. However, the standard Lagrangian for nonlinear programs requires constraint ...
Complementarity and nondegeneracy in semidefinite programming
Primal and dual nondegeneracy conditions are defined for semidefinite programming. Given the existence of primal and dual solutions, it is shown that primal nondegeneracy implies a unique dual solution and that dual nondegeneracy implies a unique primal ...
Primal or dual strong-duality in nonconvex optimization and a class of quasiconvex problems having zero duality gap
Primal or dual strong-duality (or min-sup, inf-max duality) in nonconvex optimization is revisited in view of recent literature on the subject, establishing, in particular, new characterizations for the second case. This gives rise to a new class of ...
Comments