Cargando…

Advances in artificial intelligence for privacy protection and security /

In this book, we aim to collect the most recent advances in artificial intelligence techniques (i.e. neural networks, fuzzy systems, multi-agent systems, genetic algorithms, image analysis, clustering, etc), which are applied to the protection of privacy and security. The symbiosis between these fie...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Solanas, Agusti, Martínez-Ballesté, Antoni
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Hackensack, N.J. : World Scientific, ©2010.
Colección:Intelligent information systems ; v. 1.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBSCO_ocn670429622
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 101018s2010 njua ob 001 0 eng d
010 |z  2010285038 
040 |a N$T  |b eng  |e pn  |c N$T  |d YDXCP  |d E7B  |d OCLCQ  |d UIU  |d OCLCQ  |d DEBSZ  |d OCLCQ  |d NLGGC  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCF  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d AZK  |d LOA  |d JBG  |d COCUF  |d AGLDB  |d MOR  |d CCO  |d PIFAG  |d OCLCQ  |d U3W  |d OCLCA  |d STF  |d WRM  |d OCLCQ  |d VTS  |d INT  |d VT2  |d OCLCQ  |d WYU  |d OCLCQ  |d M8D  |d UKAHL  |d HS0  |d UKCRE  |d VLY  |d OCLCQ  |d OCLCO  |d SFB  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 712994994  |a 764546149  |a 961560047  |a 962622995  |a 966181223  |a 988473678  |a 992025479  |a 1037785988  |a 1038572937  |a 1055341437  |a 1062929684  |a 1081279206  |a 1153499785  |a 1162570176  |a 1228553873  |a 1241750086  |a 1290037711  |a 1300460785 
020 |a 9789812790330  |q (electronic bk.) 
020 |a 9812790330  |q (electronic bk.) 
020 |a 1282760211 
020 |a 9781282760219 
020 |a 9786612760211 
020 |a 6612760214 
020 |z 9789812790323 
020 |z 9812790322 
029 1 |a AU@  |b 000051428625 
029 1 |a DEBBG  |b BV043137087 
029 1 |a DEBSZ  |b 372732887 
029 1 |a DEBSZ  |b 421676434 
029 1 |a NZ1  |b 13850813 
035 |a (OCoLC)670429622  |z (OCoLC)712994994  |z (OCoLC)764546149  |z (OCoLC)961560047  |z (OCoLC)962622995  |z (OCoLC)966181223  |z (OCoLC)988473678  |z (OCoLC)992025479  |z (OCoLC)1037785988  |z (OCoLC)1038572937  |z (OCoLC)1055341437  |z (OCoLC)1062929684  |z (OCoLC)1081279206  |z (OCoLC)1153499785  |z (OCoLC)1162570176  |z (OCoLC)1228553873  |z (OCoLC)1241750086  |z (OCoLC)1290037711  |z (OCoLC)1300460785 
050 4 |a QA76.9.A25  |b A356 2010eb 
072 7 |a COM  |x 019000  |2 bisacsh 
082 0 4 |a 005.8/6  |2 22 
049 |a UAMI 
245 0 0 |a Advances in artificial intelligence for privacy protection and security /  |c editors, Agusti Solanas, Antoni Martínez-Ballesté. 
246 3 0 |a Artificial intelligence for privacy protection and security 
260 |a Hackensack, N.J. :  |b World Scientific,  |c ©2010. 
300 |a 1 online resource (ix, 391 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file 
490 1 |a Intelligent information systems ;  |v v. 1 
504 |a Includes bibliographical references and indexes. 
588 0 |a Print version record. 
505 0 |a Preface; 1. Introduction A. Solanas and A. Martnez-Balleste; 1.1. Organization of the book; References; PART 1: A Brief Introduction to Privacy and Security; 2. An Introduction to Privacy Aspects of Information and Communication Technologies A. Martinez-Balleste and A. Solanas; Contents; 2.1. Introduction; 2.2. Privacy and the Internet; 2.2.1. Monitoring User Activity; 2.2.1.1. Tracking Cookies; 2.2.1.2. Spyware; 2.2.1.3. Social Engineering Attacks; 2.2.2. Privacy in Modern Web Services; 2.2.2.1. Privacy in Social Networks; 2.2.2.2. Privacy in E-Commerce 
505 8 |a 2.2.3. The Big Brothers of Internet 2.3. Privacy in Databases; 2.3.1. Privacy of the Respondents; 2.3.2. User Privacy; 2.4. Privacy in Ubiquitous Computing; 2.4.1. Location-Based Services; 2.4.1.1. TTP-Based Schemes; 2.4.1.2. TTP-Free Proposals; 2.4.2. Radio-Frequency Identific̄ation; 2.5. Conclusions; Disclaimer and Acknowledgements; References; 3. An Overview of Information Security A. Ribagorda Garnacho, A.I. Gonzalez-Tablas Ferreres, A. Alcaide Raya; Contents; 3.1. Introduction; 3.2. Vulnerabilities; 3.3. Threats; 3.4. Countermeasures; 3.5. Authentication mechanisms 
505 8 |a 3.5.1. Something you know 3.5.2. Something you are; 3.5.3. Something you have; 3.6. Access control mechanisms; 3.6.1. Access control policies; 3.6.2. Access control models; 3.6.2.1. Access matrix model; 3.6.2.2. Mandatory access control models; 3.7. Data encipherment mechanisms; 3.7.1. Attacks; 3.7.2. Cryptosystems classification; 3.7.2.1. Substitution, transposition and product ciphers; 3.7.2.2. Symmetric or secret key cryptosystems; 3.7.2.3. Asymmetric or public key cryptosystems; 3.7.3. Stream and block cryptosystems; 3.8. Digital signature mechanism; 3.9. Digital certificates 
505 8 |a 4.3.5. Measuring privacy and disclosure risk in published outputs 4.4. Measures of the utility of published data sets and outputs; 4.5. Conclusion; References; 5. Desemantization for Numerical Microdata Anonymization J. Pont-Tuset, J. Nin, P. Medrano-Gracia, J.-Ll. Larriba-Pey and V. Muntes-Mulero; Contents; 5.1. Introduction; 5.2. Background and State of the Art; 5.2.1. Microdata protection scenario; 5.2.2. Information loss and disclosure risk; 5.2.3. State of the art in microdata anonymization methods; 5.2.3.1. Rank swapping; 5.2.3.2. Microaggregation; 5.2.4. Artificial neural networks 
520 |a In this book, we aim to collect the most recent advances in artificial intelligence techniques (i.e. neural networks, fuzzy systems, multi-agent systems, genetic algorithms, image analysis, clustering, etc), which are applied to the protection of privacy and security. The symbiosis between these fields leads to a pool of invigorating ideas, which are explored in this book. On the one hand, individual privacy protection is a hot topic and must be addressed in order to guarantee the proper evolution of a modern society. On the other, security can invade individual privacy, especially after the. 
546 |a English. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Information technology  |x Security measures. 
650 0 |a Computer security. 
650 0 |a Data protection. 
650 0 |a Artificial intelligence. 
650 6 |a Technologie de l'information  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 6 |a Protection de l'information (Informatique) 
650 6 |a Intelligence artificielle. 
650 7 |a artificial intelligence.  |2 aat 
650 7 |a COMPUTERS  |x System Administration  |x Disaster & Recovery.  |2 bisacsh 
650 7 |a Artificial intelligence  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Data protection  |2 fast 
650 7 |a Information technology  |x Security measures  |2 fast 
700 1 |a Solanas, Agusti. 
700 1 |a Martínez-Ballesté, Antoni. 
776 0 8 |i Print version:  |t Advances in artificial intelligence for privacy protection and security.  |d Hackensack, N.J. : World Scientific, ©2010  |z 9789812790323  |w (DLC) 2010285038  |w (OCoLC)664519756 
830 0 |a Intelligent information systems ;  |v v. 1. 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=340517  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH24684898 
938 |a ebrary  |b EBRY  |n ebr10421991 
938 |a EBSCOhost  |b EBSC  |n 340517 
938 |a YBP Library Services  |b YANK  |n 3511307 
994 |a 92  |b IZTAP