|
|
|
|
LEADER |
00000cam a2200000M 4500 |
001 |
EBOOKCENTRAL_ocn729020405 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr un|---uuuuu |
008 |
101115s2009 xx o 000 0 eng d |
040 |
|
|
|a IDEBK
|b eng
|e pn
|c IDEBK
|d OCLCQ
|d MHW
|d EBLCP
|d OCLCQ
|d DEBSZ
|d OCLCQ
|d ZCU
|d OCLCQ
|d MERUC
|d ICG
|d OCLCO
|d OCLCF
|d AU@
|d OCLCQ
|d DKC
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCL
|
019 |
|
|
|a 816582643
|
020 |
|
|
|a 1282760211
|
020 |
|
|
|a 9781282760219
|
020 |
|
|
|a 9789812790330
|
020 |
|
|
|a 9812790330
|
029 |
1 |
|
|a AU@
|b 000055764968
|
029 |
1 |
|
|a DEBBG
|b BV044178795
|
029 |
1 |
|
|a DEBSZ
|b 431676852
|
035 |
|
|
|a (OCoLC)729020405
|z (OCoLC)816582643
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UXC, UZD
|2 bicssc
|
082 |
0 |
4 |
|a 005.8
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Advances In Artificial Intelligence For Privacy Protection And Security.
|
260 |
|
|
|b World Scientific
|c 2009.
|
300 |
|
|
|a 1 online resource (404)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
505 |
0 |
|
|a Cover13; -- Contents -- Preface -- 1. Introduction A. Solanas and A. Mart182;179;nez-Ballest182;e -- 1.1. Organization of the book -- References -- PART 1: A Brief Introduction to Privacy and Security -- 2. An Introduction to Privacy Aspects of Information and Communication Technologies A. Martinez-Balleste and A. Solanas -- Contents -- 2.1. Introduction -- 2.2. Privacy and the Internet -- 2.3. Privacy in Databases -- 2.4. Privacy in Ubiquitous Computing -- 2.5. Conclusions -- Disclaimer and Acknowledgements -- References -- 3. An Overview of Information Security A. Ribagorda Garnacho, A.I. Gonz182;alez-Tablas Ferreres, A. Alcaide Raya -- Contents -- 3.1. Introduction -- 3.2. Vulnerabilities -- 3.3. Threats -- 3.4. Countermeasures -- 3.5. Authentication mechanisms -- 3.6. Access control mechanisms -- 3.7. Data encipherment mechanisms -- 3.8. Digital signature mechanism -- 3.9. Digital certificates -- 3.10. Audit logs -- 3.11. Physical security -- References -- PART 2: Privacy Protection by means of Arti175;cial Intelligence -- 4. Data Mining in Large Databases ' Strategies for Managing the Trade-O174; Between Societal Bene175;t and Individual Privacy M. Schmid -- Contents -- 4.1. Introduction -- 4.2. Examples of data-collecting institutions and data users -- 4.3. Strategies for controlling privacy -- 4.4. Measures of the utility of published data sets and outputs -- 4.5. Conclusion -- References -- 5. Desemantization for Numerical Microdata Anonymization J. Pont-Tuset, J. Nin, P. Medrano-Gracia, J.-Ll. Larriba-Pey and V. Munt182;es-Mulero -- Contents -- 5.1. Introduction -- 5.2. Background and State of the Art -- 5.3. A New Desemantization Methodology -- 5.4. Data Preprocessing -- 5.5. Data Fitting -- 5.6. Experiments -- 5.7. Conclusions -- Acknowledgments -- References -- 6. Multi-Objective Evolutionary Optimization in Statistical Disclosure Control R. Dewri, I. Ray, I. Ray and D. Whitley -- Contents -- 6.1. Introduction -- 6.2. Multi-objective Optimization -- 6.3. Statistical Disclosure Control -- 6.4. Evolutionary Optimization -- 6.5. Some Empirical Results -- 6.6. Summary -- Acknowledgment -- References -- 7. On the Definition of Cluster-Speci175;c Information Loss Measures V. Torra -- Contents -- 7.1. Introduction -- 7.2. Preliminaries -- 7.3. Information loss measures for clustering -- 7.4. Conclusions and future work -- Acknowledgments -- References -- 8. Privacy Preserving and Use of Medical Information in a Multiagent System K. Gibert, A. Valls, L. Lhotska and P. Aubrecht -- Contents -- 8.1. Introduction -- 8.2. Privacy preserving and security in a distributed platform for medical domains -- 8.3. Identification and authentication -- 8.4. Authorization and information access rights -- 8.5. Multiagent system -- 8.6. Intermediate layer for knowledge-interface communications -- 8.7. Private data protection -- 8.8. A real case: the K4Care project -- 8.9. Discussion -- References -- PART 3: Security by means of Artificial Intelligence -- 9. Perimeter Security on Noise-Robust Vehicle Detection Using Nonlinear Hebbian Learning B. Lu, A. Dibazar, S. George and T.W. Berger -- Contents -- 9.1. Introduction -- 9.2. Description of the Proposed System -- 9.3. Unsupervised Nonlinear Hebbian Learning -- 9.4. Real-time Field T.
|
520 |
|
|
|a In this book, we aim to collect the most recent advances in artificial intelligence techniques (i.e. neural networks, fuzzy systems, multi-agent systems, genetic algorithms, image analysis, clustering, etc), which are applied to the protection of privacy and security. The symbiosis between these fields leads to a pool of invigorating ideas, which are explored in this book. On the one hand, individual privacy protection is a hot topic and must be addressed in order to guarantee the proper evolution of a modern society. On the other, security can invade individual privacy, especially after the a.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Information technology
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Artificial intelligence.
|
650 |
|
6 |
|a Technologie de l'information
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|
650 |
|
6 |
|a Intelligence artificielle.
|
650 |
|
7 |
|a artificial intelligence.
|2 aat
|
650 |
|
7 |
|a Artificial intelligence
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Data protection
|2 fast
|
650 |
|
7 |
|a Information technology
|x Security measures
|2 fast
|
655 |
|
4 |
|a Electronic resource.
|
720 |
|
|
|a Solanas Agusti Et Al.
|
758 |
|
|
|i has work:
|a Advances in artificial intelligence for privacy protection and security (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCFQfcwHVc38QPjKKMtgD4q
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1679374
|z Texto completo
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL1679374
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n 276021
|
994 |
|
|
|a 92
|b IZTAP
|