LEADER 01442nam0 22003853i 450 001 PBE0016147 005 20231121125607.0 010 $a8842053171 100 $a20141212d2000 ||||0itac50 ba 101 | $aita 102 $ait 181 1$6z01$ai $bxxxe 182 1$6z01$an 200 1 $aViaggiare nel Medioevo$edall'ospitalitą alla locanda$fHans Conrad Peyer 205 $a3. ed 210 $aRoma - Bari$cGLF Editori Laterza$d2000 215 $a397 p.$d21 cm 225 | $aEconomica Laterza 300 $aTrad. di Nicola Antonacci 410 0$1001TO00741782$12001 $aEconomica Laterza 606 $aViaggi$xMedioevo$2FIR$3RMLC008690$9I 606 $aAlberghi$xMedioevo$2FIR$3RMLC402121$9I 606 $aOspitalitą$xMedioevo$2FIR$3RMLC402122$9I 620 $aIT$dRoma$3LO1L002924 676 $a914.041$9Geografia dell'Europa. Viaggi. Origini-1453$v21 700 1$aPeyer$b, Hans Conrad$3CFIV111902$0437524 801 3$aIT$bIT-01$c20141212 850 $aIT-RM0459 $aIT-FR0017 899 $aARCHIVIO DI STATO DI ROMA$bRM0459 899 $aBiblioteca umanistica Giorgio Aprea$bFR0017 912 $aPBE0016147 950 0$aBiblioteca umanistica Giorgio Aprea$d 52CIS 9/118$e 52VM 0000166695 VM barcode:00048298. - Inventario:22247 FLSVM$fA $h20020423$i20121204 977 $a 12$a 52 996 $aViaggiare nel Medioevo$9142553 997 $aUNICAS LEADER 03127nam 2200481 450 001 9910813860603321 005 20230124193917.0 010 $a0-309-44743-7 010 $a0-309-44741-0 035 $a(CKB)3710000000915146 035 $a(MiAaPQ)EBC4720485 035 $a(EXLCZ)993710000000915146 100 $a20161028h20162016 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 10$aExploring encryption and potential mechanisms for authorized government access to plaintext $eproceedings of a workshop /$fAnne Johnson, Emily Grumbling, and Jon Eisenberg, rapporteurs 210 1$aWashington, District of Columbia :$cThe National Academies Press,$d2016. 210 4$d©2016 215 $a1 online resource (73 pages) $cillustrations 311 $a0-309-44740-2 327 $aOverview -- Welcome and opening remarks -- The current encryption landscape -- Use cases and the feasibility of segmenting encryption policies -- Security risks of architectures for enabling government access to plaintext -- Technical and policy mitigations for inaccessible plaintext -- Wrap-up session -- Appendixes. A. Workshop statement of task -- B. Workshop agenda -- C. Biographical sketches of workshop planning committee and staff -- D. Biographical sketches of invited workshop participants -- E. Acronyms and abbreviations. 330 $a"In June 2016 the National Academies of Sciences, Engineering, and Medicine convened the Workshop on Encryption and Mechanisms for Authorized Government Access to Plaintext. Participants at this workshop discussed potential encryption strategies that would enable access to plaintext information by law enforcement or national security agencies with appropriate authority. Although the focus of the workshop was on technical issues, there was some consideration of the broader policy context, and discussion about the topics of encryption and authorized exceptional analysis frequently addressed open policy questions as well as technical issues. This publication summarizes the presentations and discussions from the workshop"--Publisher's description. 606 $aData encryption (Computer science)$vCongresses 606 $aData encryption (Computer science)$xGovernment policy$zUnited States$vCongresses 606 $aInformation storage and retrieval systems$xAccess control$vCongresses 615 0$aData encryption (Computer science) 615 0$aData encryption (Computer science)$xGovernment policy 615 0$aInformation storage and retrieval systems$xAccess control 676 $a005.82 700 $aJohnson$b Anne$0459789 702 $aGrumbling$b Emily 702 $aEisenberg$b Jon 712 02$aNational Academies of Sciences, Engineering, and Medicine (U.S.).$bComputer Science and Telecommunications Board, 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910813860603321 996 $aExploring encryption and potential mechanisms for authorized government access to plaintext$94124023 997 $aUNINA