Back to Results
First PageMeta Content
Security / Legal aspects of computing / Computer security / Internet privacy / Malware / Stored Communications Act / Computer Fraud and Abuse Act / Privacy / Telephone tapping / Computer law / Ethics / Law


Conducting Cybersecurity Research Legally and Ethically Aaron J. Burstein University of California, Berkeley (School of Law) Abstract
Add to Reading List

Document Date: 2008-04-08 02:09:38


Open Document

File Size: 95,82 KB

Share Result on Facebook

Company

Southern California Law Review / Peak Computer Inc. / Universal City Studios Inc. / Indiana Harbor Belt Railroad Co. / Organizacion JD Ltda. / Texas Law Review / MAI Systems Corp. / National Academies Press / University of Illinois Law Review / /

Country

United States / /

/

Event

Person Communication and Meetings / /

Facility

Ethically Aaron J. Burstein University of California / Practicing Law Institute / /

IndustryTerm

Internet access / individual communications / realtime communications streams / stored communications / software vendors / friendly networks / communications privacy statutes / communications privacy law / tort law / communications privacy / electronic communications services / web browsing privacy / electronic communications privacy statutes / circumvention software / real-time collection / real-time communications streams / malicious software / communications contents / aburstein@law.berkeley.edu / credit card network / real systems / electronic communications privacy laws / federal law / networked information systems / electronic communications / malicious networks / federal communications privacy laws / examined statutory communications privacy / communications services / bank / vulnerabilities in software / intrusion detection algorithms / law enforcement investigations / Communications privacy laws / control server / network operator / real-time interception / law enforcement / Internet Measurement Conference / Internet users / record communications / open wireless network / contract law / electronic communications service / /

Organization

Practicing Law Institute / National Science Foundation / Harvard / U.S. government / DARPA / School of Law / University of California / Berkeley / IMC / United States Department of Justice / Congress / University of Illinois / U.S. Department of Justice / Department of Homeland Security / /

Person

Chris Jay Hoofnagle / Douglas Sicker / Seymour E. Goodman / Deirdre Mulligan / Ruoming Pang / Arvind Narayanan / Vitaly Shmatikov / Paul Ohm / Aaron J. Burstein / Dirk Grunwald / Richard Salgado / Douglas A. Barnes / Daniel J. Solove / Stanford Law / Mark Allman / Jason Lee / Jay Zarfoss / Herbert S. Lin / Fabian Monrose / Joseph P. Liu / Vern Paxson / /

Position

attorney / editor / chief information security officer / researcher / author / official / cybersecurity researcher / /

ProvinceOrState

Ohio / California / /

PublishedMedium

Berkeley Technology Law Journal / California Law Review / Texas Law Review / /

Region

Southern California / /

Technology

analysis technologies / RAM / peer-to-peer / intrusion detection algorithms / Berkeley Technology / encryption / cryptography / /

URL

http /

SocialTag