ACM Transactions on Information Systems (TOIS)
Software agents and user autonomy
AGENTS '97 Proceedings of the first international conference on Autonomous agents
Privacy-enhancing technologies: typology, critique, vision
Technology and privacy
Tussle in cyberspace: defining tomorrow's internet
IEEE/ACM Transactions on Networking (TON)
Proceedings of the 4th decennial conference on Critical computing: between sense and sensibility
Computer systems: Moral entities but not moral agents
Ethics and Information Technology
Taking account of privacy when designing cloud computing services
CLOUD '09 Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing
HAIL: a high-availability and integrity layer for cloud storage
Proceedings of the 16th ACM conference on Computer and communications security
A Privacy Manager for Cloud Computing
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures
DASC '09 Proceedings of the 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing
Privacy in Context: Technology, Policy, and the Integrity of Social Life
Privacy in Context: Technology, Policy, and the Integrity of Social Life
Communications of the ACM
Cloud computing privacy concerns on our doorstep
Communications of the ACM
Keypad: an auditing file system for theft-prone devices
Proceedings of the sixth conference on Computer systems
Towards Secure and Effective Utilization over Encrypted Cloud Data
ICDCSW '11 Proceedings of the 2011 31st International Conference on Distributed Computing Systems Workshops
SP 800-145. The NIST Definition of Cloud Computing
SP 800-145. The NIST Definition of Cloud Computing
On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption
STOC '12 Proceedings of the forty-fourth annual ACM symposium on Theory of computing
Unity: secure and durable personal cloud storage
Proceedings of the 2012 ACM Workshop on Cloud computing security workshop
A Decentralized Approach for Implementing Identity Management in Cloud Computing
CGC '12 Proceedings of the 2012 Second International Conference on Cloud and Green Computing
Hi-index | 0.00 |
This paper examines one particular problem of values in cloud computing: how individuals can take advantage of the cloud to store data without compromising their privacy and autonomy. Through the creation of Lockbox, an encrypted cloud storage application, we explore how designers can use reflection in designing for human values to maintain both privacy and usability in the cloud.