- M. H. Günes and C. Y. Evrenosoglu. 2010. Blind processing: Securing data against system administrators. 2010 IEEE/IFIP Network Operations and Management Symposium Workshops (NOMS Wksps), pp. 304--311.Google Scholar
- PwC. 2015. Global State of Information Security Survey: http://www.pwc.com/gx/en/issues/cyber-security/information-security-survey.html.Google Scholar
editorial
Editorial: Fence Itself Grazing the Field—Security from the Sentries
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
Published in
July 2016520 pagesCopyright © 2016 ACM
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
- Published: 21 July 2016
Published in tecs Volume 15, Issue 3Permissions
Request permissions about this article.
Request PermissionsQualifiers
- editorial
- Opinion
- Refereed limited
Article Metrics
- View Citations0Total Citations
- 195Total Downloads
- Downloads (Last 12 months)21
- Downloads (Last 6 weeks)2
Other Metrics






Comments