Privacy Computing - Fenghua Li, Hui Li, Ben Niu

Privacy Computing (eBook)

Theory and Technology

, , (Autoren)

eBook Download: PDF
2024 | 1st ed. 2024
XIV, 204 Seiten
Springer Nature Singapore (Verlag)
978-981-99-4943-4 (ISBN)
Systemvoraussetzungen
160,49 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

The continuous evolution and widespread application of communication technology, network technology and computing technology have promoted the intelligent interconnection of all things and ubiquitous sharing of information. The cross-border, cross-system, and cross-ecosystem exchange of user data has become commonplace. At the same time, difficulties in the prevention of private information abuse and lack of protection methods have become global problems. As such, there is an urgent need to intensify basic theoretical research in this field to support the protection of personal information in a ubiquitously interconnected environment.

The authors of this book proposed the concept, definition and research scope of privacy computing for the first time in 2015. This book represents their original and innovative scientific research achievement dedicated to privacy computing research, and systematically explains the basic theory and technology involved. It introduces readers to the connection between personal information and privacy protection, defines privacy protection and privacy desensitization, clarifies and summarizes the limitations of existing privacy-preserving technologies in practical information system applications, analyzes the necessity of conducting privacy computing research, and proposes the concept, definition and research scope of privacy computing. It comprehensively expounds the theoretical system of privacy computing and some privacy-preserving algorithms based on the idea of privacy computing. In closing, it outlines future research directions.




Fenghua Li received his B.S. degree in Computer Software and his M.S. and Ph.D. degrees in Computer Systems Architecture from Xidian University in 1987, 1990 and 2009 respectively. Currently, he is working as a professor and doctoral supervisor at the Institute of Information Engineering, Chinese Academy of Sciences. He is also a doctoral supervisor at Xidian University and at the University of Science and Technology of China. His research interests are in the areas of network security, privacy computing, system security and data security. He has published more than 150 papers and won the State Technological Invention Award (the Second Prize)of China in 2020.

Hui Li received his B.S. degree from Fudan University in 1990 and his M.S. and Ph.D. degrees from Xidian University in 1993 and 1998. Since 2005, he has been a professor at the School of Cyber Engineering, Xidian University, Xi'an Shaanxi, China. His research interests are in the areas of cryptography, privacy computing, and information theory. He was the chair of ACM SIGSAC CHINA from 2016 to 2020 and has published more than 300 papers.

Ben Niu received his B.S. degree in Information Security and his M.S. and Ph.D. degrees in Cryptography from Xidian University in 2006, 2010 and 2014 respectively. Currently, he is working as an associate professor and doctoral supervisor at the Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China. He was a visiting scholar at Pennsylvania State University from 2011 to 2013. His main research interest is in privacy computing. He has published more than 60 papers.



The continuous evolution and widespread application of communication technology, network technology and computing technology have promoted the intelligent interconnection of all things and ubiquitous sharing of information. The cross-border, cross-system, and cross-ecosystem exchange of user data has become commonplace. At the same time, difficulties in the prevention of private information abuse and lack of protection methods have become global problems. As such, there is an urgent need to intensify basic theoretical research in this field to support the protection of personal information in a ubiquitously interconnected environment.The authors of this book proposed the concept, definition and research scope of privacy computing for the first time in 2015. This book represents their original and innovative scientific research achievement dedicated to privacy computing research, and systematically explains the basic theory and technology involved. It introduces readers to the connection between personal information and privacy protection, defines privacy protection and privacy desensitization, clarifies and summarizes the limitations of existing privacy-preserving technologies in practical information system applications, analyzes the necessity of conducting privacy computing research, and proposes the concept, definition and research scope of privacy computing. It comprehensively expounds the theoretical system of privacy computing and some privacy-preserving algorithms based on the idea of privacy computing. In closing, it outlines future research directions.
Erscheint lt. Verlag 12.2.2024
Zusatzinfo XIV, 204 p. 54 illus., 42 illus. in color.
Sprache englisch
Themenwelt Mathematik / Informatik Informatik Datenbanken
Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Künstliche Intelligenz / Robotik
Mathematik / Informatik Informatik Web / Internet
Technik
Schlagworte forensics and traceability • forward-backward extended control • full life cycle protection • on demand desensitization • Privacy computing • privacy quantification
ISBN-10 981-99-4943-2 / 9819949432
ISBN-13 978-981-99-4943-4 / 9789819949434
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 7,9 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation

von Holger Kaschner

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
34,99
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
42,99