LEADER 05776nam 2200733 a 450 001 9910456155703321 005 20200520144314.0 010 $a1-282-76021-1 010 $a9786612760211 010 $a981-279-033-0 035 $a(CKB)2490000000001615 035 $a(EBL)1679374 035 $a(OCoLC)729020405 035 $a(SSID)ssj0000411073 035 $a(PQKBManifestationID)11281417 035 $a(PQKBTitleCode)TC0000411073 035 $a(PQKBWorkID)10371312 035 $a(PQKB)10634357 035 $a(MiAaPQ)EBC1679374 035 $a(WSP)00000504 035 $a(Au-PeEL)EBL1679374 035 $a(CaPaEBR)ebr10421991 035 $a(CaONFJC)MIL276021 035 $a(EXLCZ)992490000000001615 100 $a20100112d2010 uy 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt 182 $cc 183 $acr 200 00$aAdvances in artificial intelligence for privacy protection and security$b[electronic resource] /$feditors, Agusti Solanas, Antoni Marti?nez-Balleste? 210 $aHackensack, N.J. $cWorld Scientific$dc2010 215 $a1 online resource (402 p.) 225 1 $aIntelligent information systems ;$vv. 1 300 $aDescription based upon print version of record. 311 $a981-279-032-2 320 $aIncludes bibliographical references and indexes. 327 $aContents; Preface; 1. Introduction A. Solanas and A. Martnez-Balleste; 1.1. Organization of the book; References; PART 1: A Brief Introduction to Privacy and Security; 2. An Introduction to Privacy Aspects of Information and Communication Technologies A. Martinez-Balleste and A. Solanas; Contents; 2.1. Introduction; 2.2. Privacy and the Internet; 2.2.1. Monitoring User Activity; 2.2.1.1. Tracking Cookies; 2.2.1.2. Spyware; 2.2.1.3. Social Engineering Attacks; 2.2.2. Privacy in Modern Web Services; 2.2.2.1. Privacy in Social Networks; 2.2.2.2. Privacy in E-Commerce 327 $a2.2.3. The Big Brothers of Internet 2.3. Privacy in Databases; 2.3.1. Privacy of the Respondents; 2.3.2. User Privacy; 2.4. Privacy in Ubiquitous Computing; 2.4.1. Location-Based Services; 2.4.1.1. TTP-Based Schemes; 2.4.1.2. TTP-Free Proposals; 2.4.2. Radio-Frequency Identific?ation; 2.5. Conclusions; Disclaimer and Acknowledgements; References; 3. An Overview of Information Security A. Ribagorda Garnacho, A. I. Gonzalez-Tablas Ferreres, A. Alcaide Raya; Contents; 3.1. Introduction; 3.2. Vulnerabilities; 3.3. Threats; 3.4. Countermeasures; 3.5. Authentication mechanisms 327 $a3.5.1. Something you know 3.5.2. Something you are; 3.5.3. Something you have; 3.6. Access control mechanisms; 3.6.1. Access control policies; 3.6.2. Access control models; 3.6.2.1. Access matrix model; 3.6.2.2. Mandatory access control models; 3.7. Data encipherment mechanisms; 3.7.1. Attacks; 3.7.2. Cryptosystems classification; 3.7.2.1. Substitution, transposition and product ciphers; 3.7.2.2. Symmetric or secret key cryptosystems; 3.7.2.3. Asymmetric or public key cryptosystems; 3.7.3. Stream and block cryptosystems; 3.8. Digital signature mechanism; 3.9. Digital certificates 327 $a3.10. Audit logs 3.11. Physical security; 3.11.1. Intrusion prevention; 3.11.2. Electromagnetic emanations; 3.11.3. Physical access control systems; References; PART 2: Privacy Protection by means of Artificial Intelligence; 4. Data Mining in Large Databases | Strategies for Managing the Trade-OŽ Between Societal Benet? and Individual Privacy M. Schmid; Contents; 4.1. Introduction; 4.2. Examples of data-collecting institutions and data users; 4.3. Strategies for controlling privacy; 4.3.1. Input control and masked data sets; 4.3.2. Output control; 4.3.3. Query auditing 327 $a4.3.5. Measuring privacy and disclosure risk in published outputs 4.4. Measures of the utility of published data sets and outputs; 4.5. Conclusion; References; 5. Desemantization for Numerical Microdata Anonymization J. Pont-Tuset, J. Nin, P. Medrano-Gracia, J.-Ll. Larriba-Pey and V. Muntes-Mulero; Contents; 5.1. Introduction; 5.2. Background and State of the Art; 5.2.1. Microdata protection scenario; 5.2.2. Information loss and disclosure risk; 5.2.3. State of the art in microdata anonymization methods; 5.2.3.1. Rank swapping; 5.2.3.2. Microaggregation; 5.2.4. Artificial neural networks 327 $a5.2.4.1. The backpropagation algorithm 330 $aIn this book, we aim to collect the most recent advances in artificial intelligence techniques (i.e. neural networks, fuzzy systems, multi-agent systems, genetic algorithms, image analysis, clustering, etc), which are applied to the protection of privacy and security. The symbiosis between these fields leads to a pool of invigorating ideas, which are explored in this book. On the one hand, individual privacy protection is a hot topic and must be addressed in order to guarantee the proper evolution of a modern society. On the other, security can invade individual privacy, especially after the 410 0$aIntelligent information systems ;$vv. 1. 606 $aInformation technology$xSecurity measures 606 $aComputer security 606 $aData protection 606 $aArtificial intelligence 608 $aElectronic books. 615 0$aInformation technology$xSecurity measures. 615 0$aComputer security. 615 0$aData protection. 615 0$aArtificial intelligence. 676 $a005.8/6 701 $aSolanas$b Agusti$01054201 701 $aMarti?nez-Balleste?$b Antoni$01054202 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910456155703321 996 $aAdvances in artificial intelligence for privacy protection and security$92486613 997 $aUNINA