Vanishing files: protocols and regulations for immaterial documents Online publication date: Tue, 24-Jan-2017
by Rosario Culmone; Maria Concetta De Vivo
International Journal of Electronic Security and Digital Forensics (IJESDF), Vol. 9, No. 1, 2017
Abstract: Regulatory and technological aspects of cloud technology are showing both opportunities and gaps in the rules on security and accessibility. Our proposal aims at addressing a problem that has not yet manifested using a protocol and discussing the normative aspects regarding the possibility of rendering a document completely immaterial. Our article proposes a protocol that uses the network in an unconventional way to make a document fully immaterial. By immaterial we mean that is not localisable anywhere in its entirety. If we continue the analogy to climate, we want to realise a fog of files rather than a cloud. The files are distributed on a public or private network and only the injectors and extractors can access them. The inaccessibility by others, the non-location, and the dynamics of the system offer significant advantages in terms of security but raise some legal problems.
Online publication date: Tue, 24-Jan-2017
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Electronic Security and Digital Forensics (IJESDF):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email email@example.com