• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Introduction to Privacy Enhancing Technologies: A Classification-Based Approach to Understanding Pets » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946912]
• Literatura piękna
 [1852311]

  więcej...
• Turystyka
 [71421]
• Informatyka
 [150889]
• Komiksy
 [35717]
• Encyklopedie
 [23177]
• Dziecięca
 [617324]
• Hobby
 [138808]
• AudioBooki
 [1671]
• Literatura faktu
 [228371]
• Muzyka CD
 [400]
• Słowniki
 [2841]
• Inne
 [445428]
• Kalendarze
 [1545]
• Podręczniki
 [166819]
• Poradniki
 [480180]
• Religia
 [510412]
• Czasopisma
 [525]
• Sport
 [61271]
• Sztuka
 [242929]
• CD, DVD, Video
 [3371]
• Technologie
 [219258]
• Zdrowie
 [100961]
• Książkowe Klimaty
 [124]
• Zabawki
 [2341]
• Puzzle, gry
 [3766]
• Literatura w języku ukraińskim
 [255]
• Art. papiernicze i szkolne
 [7810]
Kategorie szczegółowe BISAC

Introduction to Privacy Enhancing Technologies: A Classification-Based Approach to Understanding Pets

ISBN-13: 9783030810429 / Angielski / Miękka / 2021 / 287 str.

Carlisle Adams
Introduction to Privacy Enhancing Technologies: A Classification-Based Approach to Understanding Pets Adams, Carlisle 9783030810429 Springer - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Introduction to Privacy Enhancing Technologies: A Classification-Based Approach to Understanding Pets

ISBN-13: 9783030810429 / Angielski / Miękka / 2021 / 287 str.

Carlisle Adams
cena 200,77
(netto: 191,21 VAT:  5%)

Najniższa cena z 30 dni: 192,74
Termin realizacji zamówienia:
ok. 22 dni roboczych
Dostawa w 2026 r.

Darmowa dostawa!
Kategorie:
Informatyka, Bazy danych
Kategorie BISAC:
Computers > Internet - Online Safety & Privacy
Computers > Security - Network Security
Wydawca:
Springer
Język:
Angielski
ISBN-13:
9783030810429
Rok wydania:
2021
Wydanie:
2021
Ilość stron:
287
Waga:
0.47 kg
Wymiary:
23.39 x 15.6 x 1.8
Oprawa:
Miękka
Wolumenów:
01
Dodatkowe informacje:
Bibliografia
Glosariusz/słownik
Wydanie ilustrowane

1.    The Privacy Minefield

1.1.     Threats to Privacy

1.2.     The Battle for Supremacy over Personal Data

1.3.     High-Stakes Hide-and-Seek

1.4.     Summary

References

2.    A Collection of Tools:  The Privacy Tree

2.1.     Many Privacy Enhancing Technologies

2.2.     Classification (Privacy Tree)

2.3.     Previous Work on Classifications for Privacy

2.4.     The Selected Privacy Tree

2.5.     The Remainder of this Book

References

3.    Limiting Exposure by Hiding the Identity

3.1.     Mix Network

3.1.1.   The Basic Scheme

3.1.2.   Enhancements

3.1.3.   Strengths

3.1.4.   Disadvantages, Limitations, and Weaknesses

3.2.     Anonymous Remailer

3.2.1.   The Basic Scheme

3.2.2.   Enhancements

3.2.3.   Strengths

3.2.4.   Disadvantages, Limitations, and Weaknesses

3.3.     Onion Routing and Tor

3.3.1.   The Basic Scheme

3.3.2.   Enhancements

3.3.3.   Strengths

3.3.4.   Disadvantages, Limitations, and Weaknesses

3.4.     Summary

References

4.    Limiting Exposure by Hiding the Action

4.1.     Transport Layer Security (SSL/TLS)

4.1.1.   The Basic Scheme

4.1.2.   Enhancements

4.1.3.   Strengths

4.1.4.   Disadvantages, Limitations, and Weaknesses

4.2.     Network Layer Security (IPsec in Transport Mode)

4.2.1.   The Basic Scheme

4.2.2.   Enhancements

4.2.3.   Strengths

4.2.4.   Disadvantages, Limitations, and Weaknesses

4.3.     Private Information Retrieval (PIR)

4.3.1.   The Basic Scheme

4.3.2.   Enhancements

4.3.3.   Strengths

4.3.4.   Disadvantages, Limitations, and Weaknesses

4.4.     Summary

References

5.    Limiting Exposure by Hiding the Identity-Action Pair

5.1.     Network Layer Security (IPsec in Tunnel Mode)

5.1.1.   The Basic Scheme

5.1.2.   Enhancements

5.1.3.   Strengths

5.1.4.   Disadvantages, Limitations, and Weaknesses

5.2.     Off-the-Record (OTR) Messaging

5.2.1.   The Basic Scheme

5.2.2.   Enhancements

5.2.3.   Strengths

5.2.4.   Disadvantages, Limitations, and Weaknesses

5.3.     Summary

References

6.    Limiting Disclosure by Hiding the Identity

6.1.     k-Anonymity

6.1.1.   The Basic Scheme

6.1.2.   Enhancements

6.1.3.   Strengths

6.1.4.   Disadvantages, Limitations, and Weaknesses

6.2.     Credential Systems

6.2.1.   The Basic Scheme

6.2.2.   Enhancements

6.2.3.   Strengths

6.2.4.   Disadvantages, Limitations, and Weaknesses

6.3.     Summary

References

7.    Limiting Disclosure by Hiding the Attribute

7.1.     Database Protection Approaches

7.1.1.   The Basic Scheme

7.1.2.   Enhancements

7.1.3.   Strengths

7.1.4.   Disadvantages, Limitations, and Weaknesses

7.2.     Multi-Party Computation

7.2.1.   The Basic Scheme

7.2.2.   Enhancements

7.2.3.   Strengths

7.2.4.   Disadvantages, Limitations, and Weaknesses

7.3.     e-Differential Privacy

7.3.1.   The Basic Scheme

7.3.2.   Enhancements

7.3.3.   Strengths

7.3.4.   Disadvantages, Limitations, and Weaknesses

7.4.     Summary

References

8.    Limiting Disclosure by Hiding the Identity-Attribute Pair

8.1.     Hippocratic Databases (HDB)

8.1.1.   The Basic Scheme

8.1.2.   Enhancements

8.1.3.   Strengths

8.1.4.   Disadvantages, Limitations, and Weaknesses

8.2.     Platform for Privacy Preferences Project (P3P)

8.2.1.   The Basic Scheme

8.2.2.   Enhancements

8.2.3.   Strengths

8.2.4.   Disadvantages, Limitations, and Weaknesses

8.3.     Architecture for Privacy Enforcement using XML (APEX)

8.3.1.   The Basic Scheme

8.3.2.   Enhancements

8.3.3.   Strengths

8.3.4.   Disadvantages, Limitations, and Weaknesses

8.4.     Credential Systems Showing Properties of Attributes

8.4.1.   The Basic Scheme

8.4.2.   Enhancements

8.4.3.   Strengths

8.4.4.   Disadvantages, Limitations, and Weaknesses

8.5.     Summary

References

9.    Using the Privacy Tree in Practice

9.1.     In Conjunction with Security Technologies

9.2.     In Conjunction with the Legal Infrastructure

9.3.     In Conjunction with Other Technologies

9.3.1.   Software Defined Networking (SDN)

9.3.2.   Machine Learning (ML)

9.4.     Summary

References

10. The Path Forward

10.1.  The First Step:  Decisions

10.1.1.    Hide-and-Seek (Revisited)

10.1.2.    Defense-in-Depth

10.2.  The Next Step:  Actions

10.3.  Summary

References

 

Supplemental Chapters

11. Crypto Primer

11.1.  Terminology

11.2.  Goals:  Confidentiality, Integrity, Authenticity, Cryptographic Strength

11.3.  Realizing These Goals in Practice

11.3.1.    Confidentiality

11.3.2.    Integrity

11.3.3.    Authenticity

11.3.4.    Cryptographic Strength

11.4.  Summary

References

12. Source Material

12.1.  Full List of Hyperlinked References

12.2.  Hyperlinked Bibliography

12.3.  Further Reading on Selected Topics

Glossary

Index

Carlisle Adams is a Professor in the School of Electrical Engineering and Computer Science (EECS) at University of Ottawa.  Prior to his academic appointment in 2003, he worked for 13 years in industry (Nortel, Entrust) in the design and international standardization of a variety of cryptographic and security technologies for the Internet.  Dr. Adams’ research interests include all aspects of applied cryptography and security. Particular areas of interest and technical contributions include the design and analysis of symmetric encryption algorithms (including the CAST family of symmetric ciphers), the design of large-scale infrastructures for authentication (including secure protocols for authentication and certificate management in Public Key Infrastructure (PKI) environments), and comprehensive architectures and policy languages for access control in electronic networks (including X.509 attribute certificates and the XACML policy language).

Dr. Adams has maintained a long-standing interest in the creation of effective techniques to preserve and enhance privacy on the Internet.  His contributions in this area include techniques to add delegation, non-transferability, and multi-show to Digital Credentials, architectures to enforce privacy in web-browsing environments, and mechanisms to add privacy to location-based services and blockchains.  He was Co-Chair of the international conference Selected Areas in Cryptography (1997, 1999, 2007, and 2017), and was General Chair of the 7th International Privacy Enhancing Technologies Symposium (2007).

He lives in Ottawa with his wife and children and enjoys music, good food, and classic movies (old and new).

This textbook provides a unique lens through which the myriad of existing Privacy Enhancing Technologies (PETs) can be easily comprehended and appreciated. It answers key privacy-centered questions with clear and detailed explanations.
Why is privacy important? How and why is your privacy being eroded and what risks can this pose for you? What are some tools for protecting your privacy in online environments? How can these tools be understood, compared, and evaluated? What steps can you take to gain more control over your personal data?

This book addresses the above questions by focusing on three fundamental elements:
  • It introduces a simple classification of PETs that allows their similarities and differences to be highlighted and analyzed;
  • It describes several specific PETs in each class, including both foundational technologies and important recent additions to the field;
  • It explains how to use this classification to determine which privacy goals are actually achievable in a given real-world environment. Once the goals are known, this allows the most appropriate PETs to be selected in order to add the desired privacy protection to the target environment. To illustrate, the book examines the use of PETs in conjunction with various security technologies, with the legal infrastructure, and with communication and computing technologies such as Software Defined Networking (SDN) and Machine Learning (ML).
Designed as an introductory textbook on PETs, this book is essential reading for graduate-level students in computer science and related fields, prospective PETs researchers, privacy advocates, and anyone interested in technologies to protect privacy in online environments.



Udostępnij

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia