25:
232:
This article explores key legal and regulatory issues arising from recent cloud localization initiatives, with a particular focus on calls to establish a Europe-only cloud. The analysis covers jurisdictional conflicts and extraterritoriality concerns, as well as the impact on fundamental rights such
333:
84:
activities of
British and American security and intelligence agencies. Germany and France want to control their own networks without the United States being a
338:
167:
266:
142:
76:
is the concept and proposal of a Europe-only integrated electronic communication/system network which emerged after the
291:
117:
323:
175:
328:
197:
35:
196:
Hon, W. Kuan; Millard, Christopher; Singh, Jatinder; Walden, Ian; Crowcroft, Jon (Autumn 2016).
262:
217:
81:
254:
209:
77:
317:
54:
85:
91:
In 2014, the US trade representatives voiced their opposition to
Schengen Cloud.
251:
2015 7th
International Conference on Cyber Conflict: Architectures in Cyberspace
94:
The proposal was first announced in 2011, but its status is unknown as of 2021.
258:
246:
292:"US fires warning shot over Europe's plans for protectionist 'Schengen cloud'"
221:
44:
213:
24:
245:
Maurer, Tim; Skierka, Isabel; Morgus, Robert; Hohmann, Mirko (2015).
198:"Policy, legal and regulatory implications of a Europe-only cloud"
18:
143:"Privacy, Security & The Geography Of Data Protection"
202:
International
Journal of Law and Information Technology
118:"USA opposes 'Schengen cloud' Eurocentric routing plan"
49:
39:
233:
as privacy, data protection and freedom of expression.
247:"Technological sovereignty: Missing the point?"
8:
334:Proposed telecommunications infrastructure
103:
286:
284:
111:
109:
107:
7:
116:Chirgwin, Richard (7 April 2014).
14:
339:Proposed infrastructure in Europe
16:Europe-only communication network
277:– via ieeexplore.ieee.org.
166:Mitchell, Bradley (2015-01-27).
23:
230:– via academic.oup.com.
1:
168:"What Is a Schengen Cloud?"
355:
259:10.1109/CYCON.2015.7158468
172:compnetworking.about.com
38:, as no other articles
80:and reporting on the
214:10.1093/ijlit/eaw006
147:www.darkreading.com
122:www.theregister.com
253:. pp. 53–68.
57:for suggestions.
47:to this page from
324:Computer networks
268:978-9-9499-5442-1
82:mass surveillance
71:
70:
346:
308:
307:
305:
303:
288:
279:
278:
276:
275:
242:
236:
235:
229:
228:
193:
187:
186:
184:
183:
174:. Archived from
163:
157:
156:
154:
153:
139:
133:
132:
130:
128:
113:
66:
63:
52:
50:related articles
27:
19:
354:
353:
349:
348:
347:
345:
344:
343:
314:
313:
312:
311:
301:
299:
290:
289:
282:
273:
271:
269:
244:
243:
239:
226:
224:
195:
194:
190:
181:
179:
165:
164:
160:
151:
149:
141:
140:
136:
126:
124:
115:
114:
105:
100:
67:
61:
58:
48:
45:introduce links
28:
17:
12:
11:
5:
352:
350:
342:
341:
336:
331:
326:
316:
315:
310:
309:
298:. 7 April 2014
280:
267:
237:
208:(3): 251–278.
188:
158:
134:
102:
101:
99:
96:
78:whistleblowing
74:Schengen Cloud
69:
68:
55:Find link tool
31:
29:
22:
15:
13:
10:
9:
6:
4:
3:
2:
351:
340:
337:
335:
332:
330:
329:Schengen Area
327:
325:
322:
321:
319:
297:
293:
287:
285:
281:
270:
264:
260:
256:
252:
248:
241:
238:
234:
223:
219:
215:
211:
207:
203:
199:
192:
189:
178:on 2015-01-27
177:
173:
169:
162:
159:
148:
144:
138:
135:
123:
119:
112:
110:
108:
104:
97:
95:
92:
89:
87:
83:
79:
75:
65:
56:
51:
46:
42:
41:
37:
32:This article
30:
26:
21:
20:
300:. Retrieved
295:
272:. Retrieved
250:
240:
231:
225:. Retrieved
205:
201:
191:
180:. Retrieved
176:the original
171:
161:
150:. Retrieved
146:
137:
125:. Retrieved
121:
93:
90:
73:
72:
59:
33:
318:Categories
296:diginomica
274:2024-03-19
227:2024-03-19
182:2024-03-19
152:2024-03-27
98:References
53:; try the
40:link to it
222:0967-0769
86:middleman
62:June 2016
43:. Please
302:29 April
127:29 April
265:
220:
36:orphan
34:is an
304:2021
263:ISBN
218:ISSN
129:2021
255:doi
210:doi
320::
294:.
283:^
261:.
249:.
216:.
206:24
204:.
200:.
170:.
145:.
120:.
106:^
88:.
306:.
257::
212::
185:.
155:.
131:.
64:)
60:(
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.