| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910456155703321 |
|
|
Titolo |
Advances in artificial intelligence for privacy protection and security [[electronic resource] /] / editors, Agusti Solanas, Antoni Martínez-Ballesté |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Hackensack, N.J., : World Scientific, c2010 |
|
|
|
|
|
|
|
ISBN |
|
1-282-76021-1 |
9786612760211 |
981-279-033-0 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (402 p.) |
|
|
|
|
|
|
Collana |
|
Intelligent information systems ; ; v. 1 |
|
|
|
|
|
|
Altri autori (Persone) |
|
SolanasAgusti |
Martínez-BallestéAntoni |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Information technology - Security measures |
Computer security |
Data protection |
Artificial intelligence |
Electronic books. |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and indexes. |
|
|
|
|
|
|
Nota di contenuto |
|
Contents; Preface; 1. Introduction A. Solanas and A. Martnez-Balleste; 1.1. Organization of the book; References; PART 1: A Brief Introduction to Privacy and Security; 2. An Introduction to Privacy Aspects of Information and Communication Technologies A. Martinez-Balleste and A. Solanas; Contents; 2.1. Introduction; 2.2. Privacy and the Internet; 2.2.1. Monitoring User Activity; 2.2.1.1. Tracking Cookies; 2.2.1.2. Spyware; 2.2.1.3. Social Engineering Attacks; 2.2.2. Privacy in Modern Web Services; 2.2.2.1. Privacy in Social Networks; 2.2.2.2. Privacy in E-Commerce |
2.2.3. The Big Brothers of Internet 2.3. Privacy in Databases; 2.3.1. Privacy of the Respondents; 2.3.2. User Privacy; 2.4. Privacy in Ubiquitous Computing; 2.4.1. Location-Based Services; 2.4.1.1. TTP-Based Schemes; 2.4.1.2. TTP-Free Proposals; 2.4.2. Radio-Frequency Identific̄ation; 2.5. Conclusions; Disclaimer and Acknowledgements; References; 3. An Overview of Information Security A. Ribagorda |
|
|
|
|
|
|
|
|
|
|
|
Garnacho, A. I. Gonzalez-Tablas Ferreres, A. Alcaide Raya; Contents; 3.1. Introduction; 3.2. Vulnerabilities; 3.3. Threats; 3.4. Countermeasures; 3.5. Authentication mechanisms |
3.5.1. Something you know 3.5.2. Something you are; 3.5.3. Something you have; 3.6. Access control mechanisms; 3.6.1. Access control policies; 3.6.2. Access control models; 3.6.2.1. Access matrix model; 3.6.2.2. Mandatory access control models; 3.7. Data encipherment mechanisms; 3.7.1. Attacks; 3.7.2. Cryptosystems classification; 3.7.2.1. Substitution, transposition and product ciphers; 3.7.2.2. Symmetric or secret key cryptosystems; 3.7.2.3. Asymmetric or public key cryptosystems; 3.7.3. Stream and block cryptosystems; 3.8. Digital signature mechanism; 3.9. Digital certificates |
3.10. Audit logs 3.11. Physical security; 3.11.1. Intrusion prevention; 3.11.2. Electromagnetic emanations; 3.11.3. Physical access control systems; References; PART 2: Privacy Protection by means of Artificial Intelligence; 4. Data Mining in Large Databases | Strategies for Managing the Trade-O® Between Societal Benet̄ and Individual Privacy M. Schmid; Contents; 4.1. Introduction; 4.2. Examples of data-collecting institutions and data users; 4.3. Strategies for controlling privacy; 4.3.1. Input control and masked data sets; 4.3.2. Output control; 4.3.3. Query auditing |
4.3.5. Measuring privacy and disclosure risk in published outputs 4.4. Measures of the utility of published data sets and outputs; 4.5. Conclusion; References; 5. Desemantization for Numerical Microdata Anonymization J. Pont-Tuset, J. Nin, P. Medrano-Gracia, J.-Ll. Larriba-Pey and V. Muntes-Mulero; Contents; 5.1. Introduction; 5.2. Background and State of the Art; 5.2.1. Microdata protection scenario; 5.2.2. Information loss and disclosure risk; 5.2.3. State of the art in microdata anonymization methods; 5.2.3.1. Rank swapping; 5.2.3.2. Microaggregation; 5.2.4. Artificial neural networks |
5.2.4.1. The backpropagation algorithm |
|
|
|
|
|
|
Sommario/riassunto |
|
In this book, we aim to collect the most recent advances in artificial intelligence techniques (i.e. neural networks, fuzzy systems, multi-agent systems, genetic algorithms, image analysis, clustering, etc), which are applied to the protection of privacy and security. The symbiosis between these fields leads to a pool of invigorating ideas, which are explored in this book. On the one hand, individual privacy protection is a hot topic and must be addressed in order to guarantee the proper evolution of a modern society. On the other, security can invade individual privacy, especially after the |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910458918803321 |
|
|
Autore |
Slap Andrew L |
|
|
Titolo |
The doom of Reconstruction [[electronic resource] ] : the liberal Republicans in the Civil War era / / Andrew L. Slap |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
New York, : Fordham University Press, 2006 |
|
|
|
|
|
|
|
ISBN |
|
0-8232-3499-1 |
0-8232-4773-2 |
1-282-77592-8 |
9786612775925 |
0-8232-2711-1 |
|
|
|
|
|
|
|
|
Edizione |
[1st ed.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (xxv, 306 p. ) |
|
|
|
|
|
|
Collana |
|
Reconstructing America series ; ; no. 12 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Presidents - United States - Election - 1872 |
Reconstruction (U.S. history, 1865-1877) |
Electronic books. |
United States Politics and government 1849-1861 |
United States Politics and government 1861-1865 |
United States Politics and government 1865-1877 |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Bibliographic Level Mode of Issuance: Monograph |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Rehearsal in Missouri for the Liberal Republican Movement, 1865-1870 -- The Liberal Republican Conception of Party, 1848-1872 -- Preserving the Republic while defeating the slave power, 1848-1865 -- The Liberal Republican dilemma over reconstruction, 1865-1868 -- Legacies of the Civil War threaten the Republic, 1865-1872 -- Grant and the republic, 1868-1872 -- The national phase of the Liberal Republican Movement, 1870-1872 -- The experience of a third party in the nineteenth century -- The lasting effect of 1872 campaign rhetoric -- The Liberal Republicans try again, 1872-1876. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
In the election of 1872, the conflict between President U.S. Grant and Horace Greeley has been typically understood as a battle for the soul of the Republican Party. In this study, Andrew Slap argues that the campaign was more than a narrow struggle between party elites and a |
|
|
|
|
|
|
|
|
|
|
class-based radical reform movement. |
|
|
|
|
|
| |