1995
DOI: 10.1016/0167-4048(95)00014-y
|View full text |Cite
|
Sign up to set email alerts
|

The need for decentralization and privacy in mobile communications networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

1995
1995
2013
2013

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 6 publications
0
1
0
Order By: Relevance
“…[5,61 The authors and analysts are to be commended for their serious efforts in identiQing and mitigating system risks up front. In sharing their experiences, the authors pointed out difficulties such as: convincing auditors that old controls don't apply to new systems, reducing redundant controls, trading off privacy and data collection, and the need to compare vastly different approaches.…”
Section: Introductionmentioning
confidence: 99%
“…[5,61 The authors and analysts are to be commended for their serious efforts in identiQing and mitigating system risks up front. In sharing their experiences, the authors pointed out difficulties such as: convincing auditors that old controls don't apply to new systems, reducing redundant controls, trading off privacy and data collection, and the need to compare vastly different approaches.…”
Section: Introductionmentioning
confidence: 99%