ISBN-13: 9783030810429 / Angielski / Miękka / 2021 / 287 str.
ISBN-13: 9783030810429 / Angielski / Miękka / 2021 / 287 str.
1. The Privacy Minefield
1.1. Threats to Privacy
1.2. The Battle for Supremacy over Personal Data
1.3. High-Stakes Hide-and-Seek
1.4. Summary
References
2. A Collection of Tools: The Privacy Tree
2.1. Many Privacy Enhancing Technologies
2.2. Classification (Privacy Tree)
2.3. Previous Work on Classifications for Privacy
2.4. The Selected Privacy Tree
2.5. The Remainder of this Book
References
3. Limiting Exposure by Hiding the Identity
3.1. Mix Network
3.1.1. The Basic Scheme
3.1.2. Enhancements
3.1.3. Strengths
3.1.4. Disadvantages, Limitations, and Weaknesses
3.2. Anonymous Remailer
3.2.1. The Basic Scheme
3.2.2. Enhancements
3.2.3. Strengths
3.2.4. Disadvantages, Limitations, and Weaknesses
3.3. Onion Routing and Tor
3.3.1. The Basic Scheme
3.3.2. Enhancements
3.3.3. Strengths
3.3.4. Disadvantages, Limitations, and Weaknesses
3.4. Summary
References
4. Limiting Exposure by Hiding the Action
4.1. Transport Layer Security (SSL/TLS)
4.1.1. The Basic Scheme
4.1.2. Enhancements
4.1.3. Strengths
4.1.4. Disadvantages, Limitations, and Weaknesses
4.2. Network Layer Security (IPsec in Transport Mode)
4.2.1. The Basic Scheme
4.2.2. Enhancements
4.2.3. Strengths
4.2.4. Disadvantages, Limitations, and Weaknesses
4.3. Private Information Retrieval (PIR)
4.3.1. The Basic Scheme
4.3.2. Enhancements
4.3.3. Strengths
4.3.4. Disadvantages, Limitations, and Weaknesses
4.4. Summary
References
5. Limiting Exposure by Hiding the Identity-Action Pair
5.1. Network Layer Security (IPsec in Tunnel Mode)
5.1.1. The Basic Scheme
5.1.2. Enhancements
5.1.3. Strengths
5.1.4. Disadvantages, Limitations, and Weaknesses
5.2. Off-the-Record (OTR) Messaging
5.2.1. The Basic Scheme
5.2.2. Enhancements
5.2.3. Strengths
5.2.4. Disadvantages, Limitations, and Weaknesses
5.3. Summary
References
6. Limiting Disclosure by Hiding the Identity
6.1. k-Anonymity
6.1.1. The Basic Scheme
6.1.2. Enhancements
6.1.3. Strengths
6.1.4. Disadvantages, Limitations, and Weaknesses
6.2. Credential Systems
6.2.1. The Basic Scheme
6.2.2. Enhancements
6.2.3. Strengths
6.2.4. Disadvantages, Limitations, and Weaknesses
6.3. Summary
References
7. Limiting Disclosure by Hiding the Attribute
7.1. Database Protection Approaches
7.1.1. The Basic Scheme
7.1.2. Enhancements
7.1.3. Strengths
7.1.4. Disadvantages, Limitations, and Weaknesses
7.2. Multi-Party Computation
7.2.1. The Basic Scheme
7.2.2. Enhancements
7.2.3. Strengths
7.2.4. Disadvantages, Limitations, and Weaknesses
7.3. e-Differential Privacy
7.3.1. The Basic Scheme
7.3.2. Enhancements
7.3.3. Strengths
7.3.4. Disadvantages, Limitations, and Weaknesses
7.4. Summary
References
8. Limiting Disclosure by Hiding the Identity-Attribute Pair
8.1. Hippocratic Databases (HDB)8.1.1. The Basic Scheme
8.1.2. Enhancements
8.1.3. Strengths
8.1.4. Disadvantages, Limitations, and Weaknesses
8.2. Platform for Privacy Preferences Project (P3P)
8.2.1. The Basic Scheme
8.2.2. Enhancements
8.2.3. Strengths
8.2.4. Disadvantages, Limitations, and Weaknesses
8.3. Architecture for Privacy Enforcement using XML (APEX)
8.3.1. The Basic Scheme
8.3.2. Enhancements
8.3.3. Strengths
8.3.4. Disadvantages, Limitations, and Weaknesses
8.4. Credential Systems Showing Properties of Attributes
8.4.1. The Basic Scheme
8.4.2. Enhancements
8.4.3. Strengths
8.4.4. Disadvantages, Limitations, and Weaknesses
8.5. Summary
References
9. Using the Privacy Tree in Practice
9.1. In Conjunction with Security Technologies
9.2. In Conjunction with the Legal Infrastructure
9.3. In Conjunction with Other Technologies
9.3.1. Software Defined Networking (SDN)
9.3.2. Machine Learning (ML)
9.4. Summary
References
10. The Path Forward
10.1. The First Step: Decisions
10.1.1. Hide-and-Seek (Revisited)
10.1.2. Defense-in-Depth
10.2. The Next Step: Actions
10.3. Summary
References
Supplemental Chapters
11. Crypto Primer
11.1. Terminology
11.2. Goals: Confidentiality, Integrity, Authenticity, Cryptographic Strength11.3. Realizing These Goals in Practice
11.3.1. Confidentiality11.3.2. Integrity
11.3.3. Authenticity
11.3.4. Cryptographic Strength
11.4. Summary
References
12. Source Material
12.1. Full List of Hyperlinked References
12.2. Hyperlinked Bibliography
12.3. Further Reading on Selected Topics
GlossaryIndex
1997-2024 DolnySlask.com Agencja Internetowa