skip to main content
10.1145/2322176.2322190acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesacm-turingConference Proceedingsconference-collections
panel

Information, Data, Security in a Networked Future

Published: 15 June 2012 Publication History

Abstract

The digital information revolution begins as giants such as Alan Turing, Claude Shannon and John von neumann, among many others, recognize the power of digital representations and programmable computers. Although rooted in the technology of his time, Vannevar Bush's portrait of the information revolution has emerged and fl ourished especially in the form of the World Wide Web resting atop the global Internet.
The panelists will explore some specifi cs of the digital information revolution, notably theory and practice in securing, authenticating and maintaining the integrity of information (Cerf); and roots of modern cryptography and current topics in this area (rivest and Shamir). They will also gain insight into the long-term problem of identifying, fi nding, and assuring the integrity of digital objects in the most general sense of that term (Kahn). Finally, they look at how our understanding of computer science is changing (Hopcroft) and how that evolution will affect the digital world in which are we spending an increasing fraction of our daily lives.

Supplementary Material

JPG File (12-sat-acm.jpg)
MP4 File (12-sat-acm.mp4)

Cited By

View all
  • (2017)A Review of Modern Cryptography: From the World War II Era to the Big-Data EraOptimization and Control for Systems in the Big-Data Era10.1007/978-3-319-53518-0_7(101-120)Online publication date: 6-May-2017

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ACM-TURING '12: ACM Turing Centenary Celebration
June 2012
35 pages
ISBN:9781450339193
DOI:10.1145/2322176
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 15 June 2012

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Panel

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 08 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2017)A Review of Modern Cryptography: From the World War II Era to the Big-Data EraOptimization and Control for Systems in the Big-Data Era10.1007/978-3-319-53518-0_7(101-120)Online publication date: 6-May-2017

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media