MARC details
000 -LEADER |
fixed length control field |
03787nam a22004575i 4500 |
001 - CONTROL NUMBER |
control field |
978-1-84996-238-4 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
DE-He213 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20170628034002.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
100716s2010 xxk| s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781849962384 |
-- |
978-1-84996-238-4 |
024 7# - OTHER STANDARD IDENTIFIER |
Standard number or code |
10.1007/978-1-84996-238-4 |
Source of number or code |
doi |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9.A25 |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
UR |
Source |
bicssc |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
UTN |
Source |
bicssc |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
COM053000 |
Source |
bisacsh |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition number |
23 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Nin, Jordi. |
Relator term |
editor. |
245 10 - TITLE STATEMENT |
Title |
Privacy and Anonymity in Information Management Systems |
Medium |
[electronic resource] : |
Remainder of title |
New Techniques for New Practical Problems / |
Statement of responsibility, etc |
edited by Jordi Nin, Javier Herranz. |
264 #1 - |
-- |
London : |
-- |
Springer London : |
-- |
Imprint: Springer, |
-- |
2010. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
XIV, 198 p. |
Other physical details |
online resource. |
336 ## - |
-- |
text |
-- |
txt |
-- |
rdacontent |
337 ## - |
-- |
computer |
-- |
c |
-- |
rdamedia |
338 ## - |
-- |
online resource |
-- |
cr |
-- |
rdacarrier |
347 ## - |
-- |
text file |
-- |
PDF |
-- |
rda |
490 1# - SERIES STATEMENT |
Series statement |
Advanced Information and Knowledge Processing, |
International Standard Serial Number |
1610-3947 |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Overview -- to Privacy and Anonymity in Information Management Systems -- Advanced Privacy-Preserving Data Management and Analysis -- Theory of SDC -- Practical Applications in Statistical Disclosure Control Using R -- Disclosure Risk Assessment for Sample Microdata Through Probabilistic Modeling -- Exploiting Auxiliary Information in the Estimation of Per-Record Risk of Disclosure -- Statistical Disclosure Control in Tabular Data -- Preserving Privacy in Distributed Applications -- From Collaborative to Privacy-Preserving Sequential Pattern Mining -- Pseudonymized Data Sharing -- Privacy-Aware Access Control in Social Networks: Issues and Solutions. |
520 ## - SUMMARY, ETC. |
Summary, etc |
The development of information technologies in the last few years has been remarkable. Large amounts of data are collected and stored by both public institutions and private companies every day. There are clear threats to the privacy of citizens if no care is taken when collecting, storing and disseminating data. Ensuring privacy for individuals in a society when dealing with digital information, is a task which involves many agents, including politicians, legal authorities, managers, developers, and system administrators. Privacy and Anonymity in Information Management Systems deals with the more technical parts of this `privacy cycle', those issues that are mostly related to computer science, and discusses the process by which different privacy mechanisms are motivated, designed, analyzed, tested and finally implemented in companies or institutions. The book is written in such a way that several of the chapters are self-contained and accessible to students, covering topics such as the problem of Statistical Disclosure Control (SDC), i.e. how to modify datasets that contain statistical information before publicly releasing them, and doing so in such a way that the privacy of the confidential original information is preserved; and specific distributed applications involving privacy – how different agents have private inputs but want to cooperate to run some protocol in their own interest, without revealing unnecessary parts of their private inputs. Graduate students and researchers will find this book an excellent resource. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer science. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Data protection. |
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer Science. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Systems and Data Security. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Herranz, Javier. |
Relator term |
editor. |
710 2# - ADDED ENTRY--CORPORATE NAME |
Corporate name or jurisdiction name as entry element |
SpringerLink (Online service) |
773 0# - HOST ITEM ENTRY |
Title |
Springer eBooks |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Display text |
Printed edition: |
International Standard Book Number |
9781849962377 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE |
Uniform title |
Advanced Information and Knowledge Processing, |
-- |
1610-3947 |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
<a href="http://dx.doi.org/10.1007/978-1-84996-238-4">http://dx.doi.org/10.1007/978-1-84996-238-4</a> |
912 ## - |
-- |
ZDB-2-SCS |