top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances in artificial intelligence for privacy protection and security [[electronic resource] /] / editors, Agusti Solanas, Antoni Martínez-Ballesté
Advances in artificial intelligence for privacy protection and security [[electronic resource] /] / editors, Agusti Solanas, Antoni Martínez-Ballesté
Pubbl/distr/stampa Hackensack, N.J., : World Scientific, c2010
Descrizione fisica 1 online resource (402 p.)
Disciplina 005.8/6
Altri autori (Persone) SolanasAgusti
Martínez-BallestéAntoni
Collana Intelligent information systems
Soggetto topico Information technology - Security measures
Computer security
Data protection
Artificial intelligence
Soggetto genere / forma Electronic books.
ISBN 1-282-76021-1
9786612760211
981-279-033-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Contents; Preface; 1. Introduction A. Solanas and A. Martnez-Balleste; 1.1. Organization of the book; References; PART 1: A Brief Introduction to Privacy and Security; 2. An Introduction to Privacy Aspects of Information and Communication Technologies A. Martinez-Balleste and A. Solanas; Contents; 2.1. Introduction; 2.2. Privacy and the Internet; 2.2.1. Monitoring User Activity; 2.2.1.1. Tracking Cookies; 2.2.1.2. Spyware; 2.2.1.3. Social Engineering Attacks; 2.2.2. Privacy in Modern Web Services; 2.2.2.1. Privacy in Social Networks; 2.2.2.2. Privacy in E-Commerce
2.2.3. The Big Brothers of Internet 2.3. Privacy in Databases; 2.3.1. Privacy of the Respondents; 2.3.2. User Privacy; 2.4. Privacy in Ubiquitous Computing; 2.4.1. Location-Based Services; 2.4.1.1. TTP-Based Schemes; 2.4.1.2. TTP-Free Proposals; 2.4.2. Radio-Frequency Identific̄ation; 2.5. Conclusions; Disclaimer and Acknowledgements; References; 3. An Overview of Information Security A. Ribagorda Garnacho, A. I. Gonzalez-Tablas Ferreres, A. Alcaide Raya; Contents; 3.1. Introduction; 3.2. Vulnerabilities; 3.3. Threats; 3.4. Countermeasures; 3.5. Authentication mechanisms
3.5.1. Something you know 3.5.2. Something you are; 3.5.3. Something you have; 3.6. Access control mechanisms; 3.6.1. Access control policies; 3.6.2. Access control models; 3.6.2.1. Access matrix model; 3.6.2.2. Mandatory access control models; 3.7. Data encipherment mechanisms; 3.7.1. Attacks; 3.7.2. Cryptosystems classification; 3.7.2.1. Substitution, transposition and product ciphers; 3.7.2.2. Symmetric or secret key cryptosystems; 3.7.2.3. Asymmetric or public key cryptosystems; 3.7.3. Stream and block cryptosystems; 3.8. Digital signature mechanism; 3.9. Digital certificates
3.10. Audit logs 3.11. Physical security; 3.11.1. Intrusion prevention; 3.11.2. Electromagnetic emanations; 3.11.3. Physical access control systems; References; PART 2: Privacy Protection by means of Artificial Intelligence; 4. Data Mining in Large Databases | Strategies for Managing the Trade-O® Between Societal Benet̄ and Individual Privacy M. Schmid; Contents; 4.1. Introduction; 4.2. Examples of data-collecting institutions and data users; 4.3. Strategies for controlling privacy; 4.3.1. Input control and masked data sets; 4.3.2. Output control; 4.3.3. Query auditing
4.3.5. Measuring privacy and disclosure risk in published outputs 4.4. Measures of the utility of published data sets and outputs; 4.5. Conclusion; References; 5. Desemantization for Numerical Microdata Anonymization J. Pont-Tuset, J. Nin, P. Medrano-Gracia, J.-Ll. Larriba-Pey and V. Muntes-Mulero; Contents; 5.1. Introduction; 5.2. Background and State of the Art; 5.2.1. Microdata protection scenario; 5.2.2. Information loss and disclosure risk; 5.2.3. State of the art in microdata anonymization methods; 5.2.3.1. Rank swapping; 5.2.3.2. Microaggregation; 5.2.4. Artificial neural networks
5.2.4.1. The backpropagation algorithm
Record Nr. UNINA-9910456155703321
Hackensack, N.J., : World Scientific, c2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in artificial intelligence for privacy protection and security [[electronic resource] /] / editors, Agusti Solanas, Antoni Martínez-Ballesté
Advances in artificial intelligence for privacy protection and security [[electronic resource] /] / editors, Agusti Solanas, Antoni Martínez-Ballesté
Pubbl/distr/stampa Hackensack, N.J., : World Scientific, c2010
Descrizione fisica 1 online resource (402 p.)
Disciplina 005.8/6
Altri autori (Persone) SolanasAgusti
Martínez-BallestéAntoni
Collana Intelligent information systems
Soggetto topico Information technology - Security measures
Computer security
Data protection
Artificial intelligence
ISBN 9789812790330 (e-book)
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Contents; Preface; 1. Introduction A. Solanas and A. Martnez-Balleste; 1.1. Organization of the book; References; PART 1: A Brief Introduction to Privacy and Security; 2. An Introduction to Privacy Aspects of Information and Communication Technologies A. Martinez-Balleste and A. Solanas; Contents; 2.1. Introduction; 2.2. Privacy and the Internet; 2.2.1. Monitoring User Activity; 2.2.1.1. Tracking Cookies; 2.2.1.2. Spyware; 2.2.1.3. Social Engineering Attacks; 2.2.2. Privacy in Modern Web Services; 2.2.2.1. Privacy in Social Networks; 2.2.2.2. Privacy in E-Commerce
2.2.3. The Big Brothers of Internet 2.3. Privacy in Databases; 2.3.1. Privacy of the Respondents; 2.3.2. User Privacy; 2.4. Privacy in Ubiquitous Computing; 2.4.1. Location-Based Services; 2.4.1.1. TTP-Based Schemes; 2.4.1.2. TTP-Free Proposals; 2.4.2. Radio-Frequency Identific̄ation; 2.5. Conclusions; Disclaimer and Acknowledgements; References; 3. An Overview of Information Security A. Ribagorda Garnacho, A. I. Gonzalez-Tablas Ferreres, A. Alcaide Raya; Contents; 3.1. Introduction; 3.2. Vulnerabilities; 3.3. Threats; 3.4. Countermeasures; 3.5. Authentication mechanisms
3.5.1. Something you know 3.5.2. Something you are; 3.5.3. Something you have; 3.6. Access control mechanisms; 3.6.1. Access control policies; 3.6.2. Access control models; 3.6.2.1. Access matrix model; 3.6.2.2. Mandatory access control models; 3.7. Data encipherment mechanisms; 3.7.1. Attacks; 3.7.2. Cryptosystems classification; 3.7.2.1. Substitution, transposition and product ciphers; 3.7.2.2. Symmetric or secret key cryptosystems; 3.7.2.3. Asymmetric or public key cryptosystems; 3.7.3. Stream and block cryptosystems; 3.8. Digital signature mechanism; 3.9. Digital certificates
3.10. Audit logs 3.11. Physical security; 3.11.1. Intrusion prevention; 3.11.2. Electromagnetic emanations; 3.11.3. Physical access control systems; References; PART 2: Privacy Protection by means of Artificial Intelligence; 4. Data Mining in Large Databases | Strategies for Managing the Trade-O® Between Societal Benet̄ and Individual Privacy M. Schmid; Contents; 4.1. Introduction; 4.2. Examples of data-collecting institutions and data users; 4.3. Strategies for controlling privacy; 4.3.1. Input control and masked data sets; 4.3.2. Output control; 4.3.3. Query auditing
4.3.5. Measuring privacy and disclosure risk in published outputs 4.4. Measures of the utility of published data sets and outputs; 4.5. Conclusion; References; 5. Desemantization for Numerical Microdata Anonymization J. Pont-Tuset, J. Nin, P. Medrano-Gracia, J.-Ll. Larriba-Pey and V. Muntes-Mulero; Contents; 5.1. Introduction; 5.2. Background and State of the Art; 5.2.1. Microdata protection scenario; 5.2.2. Information loss and disclosure risk; 5.2.3. State of the art in microdata anonymization methods; 5.2.3.1. Rank swapping; 5.2.3.2. Microaggregation; 5.2.4. Artificial neural networks
5.2.4.1. The backpropagation algorithm
Record Nr. UNINA-9910780726503321
Hackensack, N.J., : World Scientific, c2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in artificial intelligence for privacy protection and security / / editors, Agusti Solanas, Antoni Martínez-Ballesté
Advances in artificial intelligence for privacy protection and security / / editors, Agusti Solanas, Antoni Martínez-Ballesté
Edizione [1st ed.]
Pubbl/distr/stampa Hackensack, N.J., : World Scientific, c2010
Descrizione fisica 1 online resource (402 p.)
Disciplina 005.8/6
Altri autori (Persone) SolanasAgusti
Martínez-BallestéAntoni
Collana Intelligent information systems
Soggetto topico Information technology - Security measures
Computer security
Data protection
Artificial intelligence
ISBN 9789812790330 (e-book)
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Contents; Preface; 1. Introduction A. Solanas and A. Martnez-Balleste; 1.1. Organization of the book; References; PART 1: A Brief Introduction to Privacy and Security; 2. An Introduction to Privacy Aspects of Information and Communication Technologies A. Martinez-Balleste and A. Solanas; Contents; 2.1. Introduction; 2.2. Privacy and the Internet; 2.2.1. Monitoring User Activity; 2.2.1.1. Tracking Cookies; 2.2.1.2. Spyware; 2.2.1.3. Social Engineering Attacks; 2.2.2. Privacy in Modern Web Services; 2.2.2.1. Privacy in Social Networks; 2.2.2.2. Privacy in E-Commerce
2.2.3. The Big Brothers of Internet 2.3. Privacy in Databases; 2.3.1. Privacy of the Respondents; 2.3.2. User Privacy; 2.4. Privacy in Ubiquitous Computing; 2.4.1. Location-Based Services; 2.4.1.1. TTP-Based Schemes; 2.4.1.2. TTP-Free Proposals; 2.4.2. Radio-Frequency Identific̄ation; 2.5. Conclusions; Disclaimer and Acknowledgements; References; 3. An Overview of Information Security A. Ribagorda Garnacho, A. I. Gonzalez-Tablas Ferreres, A. Alcaide Raya; Contents; 3.1. Introduction; 3.2. Vulnerabilities; 3.3. Threats; 3.4. Countermeasures; 3.5. Authentication mechanisms
3.5.1. Something you know 3.5.2. Something you are; 3.5.3. Something you have; 3.6. Access control mechanisms; 3.6.1. Access control policies; 3.6.2. Access control models; 3.6.2.1. Access matrix model; 3.6.2.2. Mandatory access control models; 3.7. Data encipherment mechanisms; 3.7.1. Attacks; 3.7.2. Cryptosystems classification; 3.7.2.1. Substitution, transposition and product ciphers; 3.7.2.2. Symmetric or secret key cryptosystems; 3.7.2.3. Asymmetric or public key cryptosystems; 3.7.3. Stream and block cryptosystems; 3.8. Digital signature mechanism; 3.9. Digital certificates
3.10. Audit logs 3.11. Physical security; 3.11.1. Intrusion prevention; 3.11.2. Electromagnetic emanations; 3.11.3. Physical access control systems; References; PART 2: Privacy Protection by means of Artificial Intelligence; 4. Data Mining in Large Databases | Strategies for Managing the Trade-O® Between Societal Benet̄ and Individual Privacy M. Schmid; Contents; 4.1. Introduction; 4.2. Examples of data-collecting institutions and data users; 4.3. Strategies for controlling privacy; 4.3.1. Input control and masked data sets; 4.3.2. Output control; 4.3.3. Query auditing
4.3.5. Measuring privacy and disclosure risk in published outputs 4.4. Measures of the utility of published data sets and outputs; 4.5. Conclusion; References; 5. Desemantization for Numerical Microdata Anonymization J. Pont-Tuset, J. Nin, P. Medrano-Gracia, J.-Ll. Larriba-Pey and V. Muntes-Mulero; Contents; 5.1. Introduction; 5.2. Background and State of the Art; 5.2.1. Microdata protection scenario; 5.2.2. Information loss and disclosure risk; 5.2.3. State of the art in microdata anonymization methods; 5.2.3.1. Rank swapping; 5.2.3.2. Microaggregation; 5.2.4. Artificial neural networks
5.2.4.1. The backpropagation algorithm
Record Nr. UNINA-9910824069403321
Hackensack, N.J., : World Scientific, c2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Application recovery tool for IMS and DB2 databases [[electronic resource] ] : a data recovery guide / / [Paolo Bruni ... et al.]
Application recovery tool for IMS and DB2 databases [[electronic resource] ] : a data recovery guide / / [Paolo Bruni ... et al.]
Edizione [1st ed.]
Pubbl/distr/stampa [San Jose, Calif.], : IBM International Technical Support Organization, 2002
Descrizione fisica xviii, 166 p. : ill
Disciplina 005.8/6
Altri autori (Persone) BruniPaolo
Collana IBM redbooks
Soggetto topico Data recovery (Computer science)
IMS (DL/I) (Computer system)
Soggetto genere / forma Electronic books.
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910454616203321
[San Jose, Calif.], : IBM International Technical Support Organization, 2002
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Application recovery tool for IMS and DB2 databases [[electronic resource] ] : a data recovery guide / / [Paolo Bruni ... et al.]
Application recovery tool for IMS and DB2 databases [[electronic resource] ] : a data recovery guide / / [Paolo Bruni ... et al.]
Edizione [1st ed.]
Pubbl/distr/stampa [San Jose, Calif.], : IBM International Technical Support Organization, 2002
Descrizione fisica xviii, 166 p. : ill
Disciplina 005.8/6
Altri autori (Persone) BruniPaolo
Collana IBM redbooks
Soggetto topico Data recovery (Computer science)
IMS (DL/I) (Computer system)
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910782026403321
[San Jose, Calif.], : IBM International Technical Support Organization, 2002
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Application recovery tool for IMS and DB2 databases [[electronic resource] ] : a data recovery guide / / [Paolo Bruni ... et al.]
Application recovery tool for IMS and DB2 databases [[electronic resource] ] : a data recovery guide / / [Paolo Bruni ... et al.]
Edizione [1st ed.]
Pubbl/distr/stampa [San Jose, Calif.], : IBM International Technical Support Organization, 2002
Descrizione fisica xviii, 166 p. : ill
Disciplina 005.8/6
Altri autori (Persone) BruniPaolo
Collana IBM redbooks
Soggetto topico Data recovery (Computer science)
IMS (DL/I) (Computer system)
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910825052403321
[San Jose, Calif.], : IBM International Technical Support Organization, 2002
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
CICSVR usage guide [[electronic resource] /] / [Yolanda Cascajo Jimenez ... et al.]
CICSVR usage guide [[electronic resource] /] / [Yolanda Cascajo Jimenez ... et al.]
Edizione [1st ed.]
Pubbl/distr/stampa San Jose, Calif., : IBM Corporation, International Technical Support Organization, c2002
Descrizione fisica xviii, 114 p. : ill
Disciplina 005.8/6
Altri autori (Persone) Cascajo JimenezYolanda
Collana Redbooks
Soggetto topico Data recovery (Computer science)
Electronic data processing - Backup processing alternatives
Soggetto genere / forma Electronic books.
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910454639903321
San Jose, Calif., : IBM Corporation, International Technical Support Organization, c2002
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
CICSVR usage guide [[electronic resource] /] / [Yolanda Cascajo Jimenez ... et al.]
CICSVR usage guide [[electronic resource] /] / [Yolanda Cascajo Jimenez ... et al.]
Edizione [1st ed.]
Pubbl/distr/stampa San Jose, Calif., : IBM Corporation, International Technical Support Organization, c2002
Descrizione fisica xviii, 114 p. : ill
Disciplina 005.8/6
Altri autori (Persone) Cascajo JimenezYolanda
Collana Redbooks
Soggetto topico Data recovery (Computer science)
Electronic data processing - Backup processing alternatives
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910782043203321
San Jose, Calif., : IBM Corporation, International Technical Support Organization, c2002
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
CICSVR usage guide [[electronic resource] /] / [Yolanda Cascajo Jimenez ... et al.]
CICSVR usage guide [[electronic resource] /] / [Yolanda Cascajo Jimenez ... et al.]
Edizione [1st ed.]
Pubbl/distr/stampa San Jose, Calif., : IBM Corporation, International Technical Support Organization, c2002
Descrizione fisica xviii, 114 p. : ill
Disciplina 005.8/6
Altri autori (Persone) Cascajo JimenezYolanda
Collana Redbooks
Soggetto topico Data recovery (Computer science)
Electronic data processing - Backup processing alternatives
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910815992303321
San Jose, Calif., : IBM Corporation, International Technical Support Organization, c2002
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Content Manager backup/recovery and high availability [[electronic resource] ] : strategies, options, and procedures / / [Wei-Dong Jackie Zhu ... et al.]
Content Manager backup/recovery and high availability [[electronic resource] ] : strategies, options, and procedures / / [Wei-Dong Jackie Zhu ... et al.]
Edizione [1st ed.]
Pubbl/distr/stampa [S.l.], : IBM, International Technical Support Organization, c2004
Descrizione fisica xii, 262 p. : ill
Disciplina 005.8/6
Altri autori (Persone) ZhuWei-Dong Jackie
Collana IBM redbooks
Soggetto topico Electronic data processing - Backup processing alternatives
Data recovery (Computer science)
Soggetto genere / forma Electronic books.
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910450121603321
[S.l.], : IBM, International Technical Support Organization, c2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui