Privacy Computing [electronic resource] : Theory and Technology / by Fenghua Li, Hui Li, Ben Niu.

Por: Li, Fenghua [author.]Colaborador(es): Li, Hui [author.] | Niu, Ben [author.] | SpringerLink (Online service)Tipo de material: TextoTextoEditor: Singapore : Springer Nature Singapore : Imprint: Springer, 2024Edición: 1st ed. 2024Descripción: XIV, 204 p. 54 illus., 42 illus. in color. online resourceTipo de contenido: text Tipo de medio: computer Tipo de portador: online resourceISBN: 9789819949434Tema(s): Computational intelligence | Data protection -- Law and legislation | Data protection | Artificial intelligence -- Data processing | Computational Intelligence | Privacy | Data and Information Security | Data ScienceFormatos físicos adicionales: Printed edition:: Sin título; Printed edition:: Sin título; Printed edition:: Sin títuloClasificación CDD: 006.3 Clasificación LoC:Q342Recursos en línea: Libro electrónicoTexto
Contenidos:
Chapter 1 Introduction -- Chapter 2 Privacy Protection Related Technologies -- Chapter 3 Privacy Computing Theory -- Chapter 4 Privacy Computing Technology -- Chapter 5 The future trend of privacy computing.
En: Springer Nature eBookResumen: The continuous evolution and widespread application of communication technology, network technology and computing technology have promoted the intelligent interconnection of all things and ubiquitous sharing of information. The cross-border, cross-system, and cross-ecosystem exchange of user data has become commonplace. At the same time, difficulties in the prevention of private information abuse and lack of protection methods have become global problems. As such, there is an urgent need to intensify basic theoretical research in this field to support the protection of personal information in a ubiquitously interconnected environment. The authors of this book proposed the concept, definition and research scope of privacy computing for the first time in 2015. This book represents their original and innovative scientific research achievement dedicated to privacy computing research, and systematically explains the basic theory and technology involved. It introduces readers to the connection between personal information and privacy protection, defines privacy protection and privacy desensitization, clarifies and summarizes the limitations of existing privacy-preserving technologies in practical information system applications, analyzes the necessity of conducting privacy computing research, and proposes the concept, definition and research scope of privacy computing. It comprehensively expounds the theoretical system of privacy computing and some privacy-preserving algorithms based on the idea of privacy computing. In closing, it outlines future research directions.
Star ratings
    Valoración media: 0.0 (0 votos)
Existencias
Tipo de ítem Biblioteca actual Colección Signatura Copia número Estado Fecha de vencimiento Código de barras
Libro Electrónico Biblioteca Electrónica
Colección de Libros Electrónicos 1 No para préstamo

Chapter 1 Introduction -- Chapter 2 Privacy Protection Related Technologies -- Chapter 3 Privacy Computing Theory -- Chapter 4 Privacy Computing Technology -- Chapter 5 The future trend of privacy computing.

The continuous evolution and widespread application of communication technology, network technology and computing technology have promoted the intelligent interconnection of all things and ubiquitous sharing of information. The cross-border, cross-system, and cross-ecosystem exchange of user data has become commonplace. At the same time, difficulties in the prevention of private information abuse and lack of protection methods have become global problems. As such, there is an urgent need to intensify basic theoretical research in this field to support the protection of personal information in a ubiquitously interconnected environment. The authors of this book proposed the concept, definition and research scope of privacy computing for the first time in 2015. This book represents their original and innovative scientific research achievement dedicated to privacy computing research, and systematically explains the basic theory and technology involved. It introduces readers to the connection between personal information and privacy protection, defines privacy protection and privacy desensitization, clarifies and summarizes the limitations of existing privacy-preserving technologies in practical information system applications, analyzes the necessity of conducting privacy computing research, and proposes the concept, definition and research scope of privacy computing. It comprehensively expounds the theoretical system of privacy computing and some privacy-preserving algorithms based on the idea of privacy computing. In closing, it outlines future research directions.

UABC ; Perpetuidad

Con tecnología Koha