000 | 04182nam a22005655i 4500 | ||
---|---|---|---|
001 | 978-3-030-81043-6 | ||
003 | DE-He213 | ||
005 | 20240423130125.0 | ||
007 | cr nn 008mamaa | ||
008 | 211030s2021 sz | s |||| 0|eng d | ||
020 |
_a9783030810436 _9978-3-030-81043-6 |
||
024 | 7 |
_a10.1007/978-3-030-81043-6 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
050 | 4 | _aJC596-596.2 | |
072 | 7 |
_aURD _2bicssc |
|
072 | 7 |
_aCOM060040 _2bisacsh |
|
072 | 7 |
_aURD _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
082 | 0 | 4 |
_a323.448 _223 |
100 | 1 |
_aAdams, Carlisle. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
245 | 1 | 0 |
_aIntroduction to Privacy Enhancing Technologies _h[electronic resource] : _bA Classification-Based Approach to Understanding PETs / _cby Carlisle Adams. |
250 | _a1st ed. 2021. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2021. |
|
300 |
_aXIII, 324 p. 21 illus., 14 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
505 | 0 | _a1. The Privacy Minefield -- 2. A Collection of Tools: The Privacy Tree -- 3. Limiting Exposure by Hiding -- 4. Limiting Exposure by Hiding the Action -- 5. Limiting Exposure by Hiding the Identity-Action Pair -- 6. Limiting Disclosure by Hiding the Identity -- 7. Limiting Disclosure by Hiding the Attribute -- 8. Limiting Disclosure by Hiding the Identity-Attribute Pair -- 9. Using the Privacy Tree in Practice -- 10. The Path Forward -- Supplemental Chapters -- 11. Crypto Primer -- 12. Source Material -- Glossary -- Index. | |
520 | _aThis textbook provides a unique lens through which the myriad of existing Privacy Enhancing Technologies (PETs) can be easily comprehended and appreciated. It answers key privacy-centered questions with clear and detailed explanations. Why is privacy important? How and why is your privacy being eroded and what risks can this pose for you? What are some tools for protecting your privacy in online environments? How can these tools be understood, compared, and evaluated? What steps can you take to gain more control over your personal data? This book addresses the above questions by focusing on three fundamental elements: It introduces a simple classification of PETs that allows their similarities and differences to be highlighted and analyzed; It describes several specific PETs in each class, including both foundational technologies and important recent additions to the field; It explainshow to use this classification to determine which privacy goals are actually achievable in a given real-world environment. Once the goals are known, this allows the most appropriate PETs to be selected in order to add the desired privacy protection to the target environment. To illustrate, the book examines the use of PETs in conjunction with various security technologies, with the legal infrastructure, and with communication and computing technologies such as Software Defined Networking (SDN) and Machine Learning (ML). Designed as an introductory textbook on PETs, this book is essential reading for graduate-level students in computer science and related fields, prospective PETs researchers, privacy advocates, and anyone interested in technologies to protect privacy in online environments. | ||
650 | 0 |
_aData protection _xLaw and legislation. |
|
650 | 0 | _aCryptography. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 0 | _aData protection. | |
650 | 1 | 4 | _aPrivacy. |
650 | 2 | 4 | _aCryptology. |
650 | 2 | 4 | _aMobile and Network Security. |
650 | 2 | 4 | _aData and Information Security. |
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030810429 |
776 | 0 | 8 |
_iPrinted edition: _z9783030810443 |
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-81043-6 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
942 | _cSPRINGER | ||
999 |
_c185307 _d185307 |