Главная
Study mode:
on
1
Intro
2
Unpacking the Title
3
"Obvious" Solutions
4
Adversarial Cases
5
Dragchute Escrow - High Level
6
How the Encryption Happens
7
Lock - Creating the Time Window
8
Unlocking Data
9
Enabling Proofs of Compliance
10
Locking and Attesting
11
Lock Performance Comparison
Description:
Explore a 20-minute conference talk that delves into the challenges of protecting data subject to mandatory retention laws while mitigating the risks of data breaches. Unpack the complexities of the title, examine "obvious" solutions and their shortcomings, and analyze adversarial cases. Discover the innovative Dragchute Escrow approach, including its high-level concept, encryption methods, and the process of creating time windows for data access. Learn about unlocking data, enabling proofs of compliance, and the intricacies of locking and attesting. Compare lock performance to gain insights into the effectiveness of this approach in balancing data protection and legal compliance.

Mitigating Risk While Complying With Data Retention Laws

Association for Computing Machinery (ACM)
Add to list