|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
EBSCO_ocn670429622 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
101018s2010 njua ob 001 0 eng d |
010 |
|
|
|z 2010285038
|
040 |
|
|
|a N$T
|b eng
|e pn
|c N$T
|d YDXCP
|d E7B
|d OCLCQ
|d UIU
|d OCLCQ
|d DEBSZ
|d OCLCQ
|d NLGGC
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCF
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d AZK
|d LOA
|d JBG
|d COCUF
|d AGLDB
|d MOR
|d CCO
|d PIFAG
|d OCLCQ
|d U3W
|d OCLCA
|d STF
|d WRM
|d OCLCQ
|d VTS
|d INT
|d VT2
|d OCLCQ
|d WYU
|d OCLCQ
|d M8D
|d UKAHL
|d HS0
|d UKCRE
|d VLY
|d OCLCQ
|d OCLCO
|d SFB
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 712994994
|a 764546149
|a 961560047
|a 962622995
|a 966181223
|a 988473678
|a 992025479
|a 1037785988
|a 1038572937
|a 1055341437
|a 1062929684
|a 1081279206
|a 1153499785
|a 1162570176
|a 1228553873
|a 1241750086
|a 1290037711
|a 1300460785
|
020 |
|
|
|a 9789812790330
|q (electronic bk.)
|
020 |
|
|
|a 9812790330
|q (electronic bk.)
|
020 |
|
|
|a 1282760211
|
020 |
|
|
|a 9781282760219
|
020 |
|
|
|a 9786612760211
|
020 |
|
|
|a 6612760214
|
020 |
|
|
|z 9789812790323
|
020 |
|
|
|z 9812790322
|
029 |
1 |
|
|a AU@
|b 000051428625
|
029 |
1 |
|
|a DEBBG
|b BV043137087
|
029 |
1 |
|
|a DEBSZ
|b 372732887
|
029 |
1 |
|
|a DEBSZ
|b 421676434
|
029 |
1 |
|
|a NZ1
|b 13850813
|
035 |
|
|
|a (OCoLC)670429622
|z (OCoLC)712994994
|z (OCoLC)764546149
|z (OCoLC)961560047
|z (OCoLC)962622995
|z (OCoLC)966181223
|z (OCoLC)988473678
|z (OCoLC)992025479
|z (OCoLC)1037785988
|z (OCoLC)1038572937
|z (OCoLC)1055341437
|z (OCoLC)1062929684
|z (OCoLC)1081279206
|z (OCoLC)1153499785
|z (OCoLC)1162570176
|z (OCoLC)1228553873
|z (OCoLC)1241750086
|z (OCoLC)1290037711
|z (OCoLC)1300460785
|
050 |
|
4 |
|a QA76.9.A25
|b A356 2010eb
|
072 |
|
7 |
|a COM
|x 019000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8/6
|2 22
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Advances in artificial intelligence for privacy protection and security /
|c editors, Agusti Solanas, Antoni Martínez-Ballesté.
|
246 |
3 |
0 |
|a Artificial intelligence for privacy protection and security
|
260 |
|
|
|a Hackensack, N.J. :
|b World Scientific,
|c ©2010.
|
300 |
|
|
|a 1 online resource (ix, 391 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a data file
|
490 |
1 |
|
|a Intelligent information systems ;
|v v. 1
|
504 |
|
|
|a Includes bibliographical references and indexes.
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Preface; 1. Introduction A. Solanas and A. Martnez-Balleste; 1.1. Organization of the book; References; PART 1: A Brief Introduction to Privacy and Security; 2. An Introduction to Privacy Aspects of Information and Communication Technologies A. Martinez-Balleste and A. Solanas; Contents; 2.1. Introduction; 2.2. Privacy and the Internet; 2.2.1. Monitoring User Activity; 2.2.1.1. Tracking Cookies; 2.2.1.2. Spyware; 2.2.1.3. Social Engineering Attacks; 2.2.2. Privacy in Modern Web Services; 2.2.2.1. Privacy in Social Networks; 2.2.2.2. Privacy in E-Commerce
|
505 |
8 |
|
|a 2.2.3. The Big Brothers of Internet 2.3. Privacy in Databases; 2.3.1. Privacy of the Respondents; 2.3.2. User Privacy; 2.4. Privacy in Ubiquitous Computing; 2.4.1. Location-Based Services; 2.4.1.1. TTP-Based Schemes; 2.4.1.2. TTP-Free Proposals; 2.4.2. Radio-Frequency Identific̄ation; 2.5. Conclusions; Disclaimer and Acknowledgements; References; 3. An Overview of Information Security A. Ribagorda Garnacho, A.I. Gonzalez-Tablas Ferreres, A. Alcaide Raya; Contents; 3.1. Introduction; 3.2. Vulnerabilities; 3.3. Threats; 3.4. Countermeasures; 3.5. Authentication mechanisms
|
505 |
8 |
|
|a 3.5.1. Something you know 3.5.2. Something you are; 3.5.3. Something you have; 3.6. Access control mechanisms; 3.6.1. Access control policies; 3.6.2. Access control models; 3.6.2.1. Access matrix model; 3.6.2.2. Mandatory access control models; 3.7. Data encipherment mechanisms; 3.7.1. Attacks; 3.7.2. Cryptosystems classification; 3.7.2.1. Substitution, transposition and product ciphers; 3.7.2.2. Symmetric or secret key cryptosystems; 3.7.2.3. Asymmetric or public key cryptosystems; 3.7.3. Stream and block cryptosystems; 3.8. Digital signature mechanism; 3.9. Digital certificates
|
505 |
8 |
|
|a 4.3.5. Measuring privacy and disclosure risk in published outputs 4.4. Measures of the utility of published data sets and outputs; 4.5. Conclusion; References; 5. Desemantization for Numerical Microdata Anonymization J. Pont-Tuset, J. Nin, P. Medrano-Gracia, J.-Ll. Larriba-Pey and V. Muntes-Mulero; Contents; 5.1. Introduction; 5.2. Background and State of the Art; 5.2.1. Microdata protection scenario; 5.2.2. Information loss and disclosure risk; 5.2.3. State of the art in microdata anonymization methods; 5.2.3.1. Rank swapping; 5.2.3.2. Microaggregation; 5.2.4. Artificial neural networks
|
520 |
|
|
|a In this book, we aim to collect the most recent advances in artificial intelligence techniques (i.e. neural networks, fuzzy systems, multi-agent systems, genetic algorithms, image analysis, clustering, etc), which are applied to the protection of privacy and security. The symbiosis between these fields leads to a pool of invigorating ideas, which are explored in this book. On the one hand, individual privacy protection is a hot topic and must be addressed in order to guarantee the proper evolution of a modern society. On the other, security can invade individual privacy, especially after the.
|
546 |
|
|
|a English.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Information technology
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Artificial intelligence.
|
650 |
|
6 |
|a Technologie de l'information
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|
650 |
|
6 |
|a Intelligence artificielle.
|
650 |
|
7 |
|a artificial intelligence.
|2 aat
|
650 |
|
7 |
|a COMPUTERS
|x System Administration
|x Disaster & Recovery.
|2 bisacsh
|
650 |
|
7 |
|a Artificial intelligence
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Data protection
|2 fast
|
650 |
|
7 |
|a Information technology
|x Security measures
|2 fast
|
700 |
1 |
|
|a Solanas, Agusti.
|
700 |
1 |
|
|a Martínez-Ballesté, Antoni.
|
776 |
0 |
8 |
|i Print version:
|t Advances in artificial intelligence for privacy protection and security.
|d Hackensack, N.J. : World Scientific, ©2010
|z 9789812790323
|w (DLC) 2010285038
|w (OCoLC)664519756
|
830 |
|
0 |
|a Intelligent information systems ;
|v v. 1.
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=340517
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH24684898
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10421991
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 340517
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 3511307
|
994 |
|
|
|a 92
|b IZTAP
|