000 04182nam a22005655i 4500
001 978-3-030-81043-6
003 DE-He213
005 20240423130125.0
007 cr nn 008mamaa
008 211030s2021 sz | s |||| 0|eng d
020 _a9783030810436
_9978-3-030-81043-6
024 7 _a10.1007/978-3-030-81043-6
_2doi
050 4 _aQA76.9.A25
050 4 _aJC596-596.2
072 7 _aURD
_2bicssc
072 7 _aCOM060040
_2bisacsh
072 7 _aURD
_2thema
082 0 4 _a005.8
_223
082 0 4 _a323.448
_223
100 1 _aAdams, Carlisle.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 0 _aIntroduction to Privacy Enhancing Technologies
_h[electronic resource] :
_bA Classification-Based Approach to Understanding PETs /
_cby Carlisle Adams.
250 _a1st ed. 2021.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2021.
300 _aXIII, 324 p. 21 illus., 14 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _a1. The Privacy Minefield -- 2. A Collection of Tools: The Privacy Tree -- 3. Limiting Exposure by Hiding -- 4. Limiting Exposure by Hiding the Action -- 5. Limiting Exposure by Hiding the Identity-Action Pair -- 6. Limiting Disclosure by Hiding the Identity -- 7. Limiting Disclosure by Hiding the Attribute -- 8. Limiting Disclosure by Hiding the Identity-Attribute Pair -- 9. Using the Privacy Tree in Practice -- 10. The Path Forward -- Supplemental Chapters -- 11. Crypto Primer -- 12. Source Material -- Glossary -- Index.
520 _aThis textbook provides a unique lens through which the myriad of existing Privacy Enhancing Technologies (PETs) can be easily comprehended and appreciated. It answers key privacy-centered questions with clear and detailed explanations. Why is privacy important? How and why is your privacy being eroded and what risks can this pose for you? What are some tools for protecting your privacy in online environments? How can these tools be understood, compared, and evaluated? What steps can you take to gain more control over your personal data? This book addresses the above questions by focusing on three fundamental elements: It introduces a simple classification of PETs that allows their similarities and differences to be highlighted and analyzed; It describes several specific PETs in each class, including both foundational technologies and important recent additions to the field; It explainshow to use this classification to determine which privacy goals are actually achievable in a given real-world environment. Once the goals are known, this allows the most appropriate PETs to be selected in order to add the desired privacy protection to the target environment. To illustrate, the book examines the use of PETs in conjunction with various security technologies, with the legal infrastructure, and with communication and computing technologies such as Software Defined Networking (SDN) and Machine Learning (ML). Designed as an introductory textbook on PETs, this book is essential reading for graduate-level students in computer science and related fields, prospective PETs researchers, privacy advocates, and anyone interested in technologies to protect privacy in online environments.
650 0 _aData protection
_xLaw and legislation.
650 0 _aCryptography.
650 0 _aData encryption (Computer science).
650 0 _aComputer networks
_xSecurity measures.
650 0 _aData protection.
650 1 4 _aPrivacy.
650 2 4 _aCryptology.
650 2 4 _aMobile and Network Security.
650 2 4 _aData and Information Security.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030810429
776 0 8 _iPrinted edition:
_z9783030810443
856 4 0 _uhttps://doi.org/10.1007/978-3-030-81043-6
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cSPRINGER
999 _c185307
_d185307