Communications of the ACM - Adaptive complex enterprises
Toward a threat model for storage systems
Proceedings of the 2005 ACM workshop on Storage security and survivability
Introducing secure provenance: problems and challenges
Proceedings of the 2007 ACM workshop on Storage security and survivability
Towards tamper-evident storage on patterned media
FAST'08 Proceedings of the 6th USENIX Conference on File and Storage Technologies
Localization of credential information to address increasingly inevitable data breaches
Proceedings of the 2008 workshop on New security paradigms
HIPAA compliance in home health: a neo-institutional theoretic perspective
Proceedings of the first ACM workshop on Security and privacy in medical and home-care systems
Protecting health information on mobile devices
Proceedings of the second ACM conference on Data and Application Security and Privacy
Hi-index | 0.00 |
Many storage security breaches have recently been reported in the mass media as the direct result of new breach disclosure state laws across the United States (unfortunately, not internationally). In this paper, we provide an empirical analysis of disclosed storage security breaches for the period of 2005-2006. By processing raw data from the best available sources, we seek to understand the what, who, how, where, and when questions about storage security breaches so that others can build upon this evidence when developing best practices for preventing and mitigating storage breaches. While some policy formulation has already started in reaction to media reports (many without empirical analysis), this work provides initial empirical analysis upon which future empirical analysis and future policy decisions can be based.