logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

일간
|
주간
|
월간

실시간 검색어

검색가능 서점

도서목록 제공

Introduction to Privacy Enhancing Technologies: A Classification-Based Approach to Understanding Pets

Introduction to Privacy Enhancing Technologies: A Classification-Based Approach to Understanding Pets (Paperback, 2021)

Carlisle Adams (지은이)
Springer
110,990원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
91,010원 -18% 0원
4,560원
86,450원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
서점 유형 등록개수 최저가 구매하기
로딩중

eBook

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

책 이미지

Introduction to Privacy Enhancing Technologies: A Classification-Based Approach to Understanding Pets
eBook 미리보기

책 정보

· 제목 : Introduction to Privacy Enhancing Technologies: A Classification-Based Approach to Understanding Pets (Paperback, 2021) 
· 분류 : 외국도서 > 컴퓨터 > 인터넷 > 보안
· ISBN : 9783030810429
· 쪽수 : 324쪽
· 출판일 : 2021-10-31

목차

1.    The Privacy Minefield

1.1.     Threats to Privacy

1.2.     The Battle for Supremacy over Personal Data

1.3.     High-Stakes Hide-and-Seek

1.4.     Summary

References

2.    A Collection of Tools:  The Privacy Tree

2.1.     Many Privacy Enhancing Technologies

2.2.     Classification (Privacy Tree)

2.3.     Previous Work on Classifications for Privacy

2.4.     The Selected Privacy Tree

2.5.     The Remainder of this Book

References

3.    Limiting Exposure by Hiding the Identity

3.1.     Mix Network

3.1.1.   The Basic Scheme

3.1.2.   Enhancements

3.1.3.   Strengths

3.1.4.   Disadvantages, Limitations, and Weaknesses

3.2.     Anonymous Remailer

3.2.1.   The Basic Scheme

3.2.2.   Enhancements

3.2.3.   Strengths

3.2.4.   Disadvantages, Limitations, and Weaknesses

3.3.     Onion Routing and Tor

3.3.1.   The Basic Scheme

3.3.2.   Enhancements

3.3.3.   Strengths

3.3.4.   Disadvantages, Limitations, and Weaknesses

3.4.     Summary

References

4.    Limiting Exposure by Hiding the Action

4.1.     Transport Layer Security (SSL/TLS)

4.1.1.   The Basic Scheme

4.1.2.   Enhancements

4.1.3.   Strengths

4.1.4.   Disadvantages, Limitations, and Weaknesses

4.2.     Network Layer Security (IPsec in Transport Mode)

4.2.1.   The Basic Scheme

4.2.2.   Enhancements

4.2.3.   Strengths

4.2.4.   Disadvantages, Limitations, and Weaknesses

4.3.     Private Information Retrieval (PIR)

4.3.1.   The Basic Scheme

4.3.2.   Enhancements

4.3.3.   Strengths

4.3.4.   Disadvantages, Limitations, and Weaknesses

4.4.     Summary

References

5.    Limiting Exposure by Hiding the Identity-Action Pair

5.1.     Network Layer Security (IPsec in Tunnel Mode)

5.1.1.   The Basic Scheme

5.1.2.   Enhancements

5.1.3.   Strengths

5.1.4.   Disadvantages, Limitations, and Weaknesses

5.2.     Off-the-Record (OTR) Messaging

5.2.1.   The Basic Scheme

5.2.2.   Enhancements

5.2.3.   Strengths

5.2.4.   Disadvantages, Limitations, and Weaknesses

5.3.     Summary

References

6.    Limiting Disclosure by Hiding the Identity

6.1.     k-Anonymity

6.1.1.   The Basic Scheme

6.1.2.   Enhancements

6.1.3.   Strengths

6.1.4.   Disadvantages, Limitations, and Weaknesses

6.2.     Credential Systems

6.2.1.   The Basic Scheme

6.2.2.   Enhancements

6.2.3.   Strengths

6.2.4.   Disadvantages, Limitations, and Weaknesses

6.3.     Summary

References

7.    Limiting Disclosure by Hiding the Attribute

7.1.     Database Protection Approaches

7.1.1.   The Basic Scheme

7.1.2.   Enhancements

7.1.3.   Strengths

7.1.4.   Disadvantages, Limitations, and Weaknesses

7.2.     Multi-Party Computation

7.2.1.   The Basic Scheme

7.2.2.   Enhancements

7.2.3.   Strengths

7.2.4.   Disadvantages, Limitations, and Weaknesses

7.3.     e-Differential Privacy

7.3.1.   The Basic Scheme

7.3.2.   Enhancements

7.3.3.   Strengths

7.3.4.   Disadvantages, Limitations, and Weaknesses

7.4.     Summary

References

8.    Limiting Disclosure by Hiding the Identity-Attribute Pair

8.1.     Hippocratic Databases (HDB)

8.1.1.   The Basic Scheme

8.1.2.   Enhancements

8.1.3.   Strengths

8.1.4.   Disadvantages, Limitations, and Weaknesses

8.2.     Platform for Privacy Preferences Project (P3P)

8.2.1.   The Basic Scheme

8.2.2.   Enhancements

8.2.3.   Strengths

8.2.4.   Disadvantages, Limitations, and Weaknesses

8.3.     Architecture for Privacy Enforcement using XML (APEX)

8.3.1.   The Basic Scheme

8.3.2.   Enhancements

8.3.3.   Strengths

8.3.4.   Disadvantages, Limitations, and Weaknesses

8.4.     Credential Systems Showing Properties of Attributes

8.4.1.   The Basic Scheme

8.4.2.   Enhancements

8.4.3.   Strengths

8.4.4.   Disadvantages, Limitations, and Weaknesses

8.5.     Summary

References

9.    Using the Privacy Tree in Practice

9.1.     In Conjunction with Security Technologies

9.2.     In Conjunction with the Legal Infrastructure

9.3.     In Conjunction with Other Technologies

9.3.1.   Software Defined Networking (SDN)

9.3.2.   Machine Learning (ML)

9.4.     Summary

References

10. The Path Forward

10.1.  The First Step:  Decisions

10.1.1.    Hide-and-Seek (Revisited)

10.1.2.    Defense-in-Depth

10.2.  The Next Step:  Actions

10.3.  Summary

References

 

Supplemental Chapters

11. Crypto Primer

11.1.  Terminology

11.2.  Goals:  Confidentiality, Integrity, Authenticity, Cryptographic Strength

11.3.  Realizing These Goals in Practice

11.3.1.    Confidentiality

11.3.2.    Integrity

11.3.3.    Authenticity

11.3.4.    Cryptographic Strength

11.4.  Summary

References

12. Source Material

12.1.  Full List of Hyperlinked References

12.2.  Hyperlinked Bibliography

12.3.  Further Reading on Selected Topics

Glossary

Index

저자소개

Carlisle Adams (지은이)    정보 더보기
선임 암호학자이면서 Entrust, Inc.의 상급 보안(advanced security)의 책임자다. 또한, IETF 공개키 기반구조 X.509(PKIX)와 일반 인증 기술(CAT; Common Authentication Technology) 작업 그룹에 활발하게 참여하고 있다.
펼치기
이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
이 포스팅은 제휴마케팅이 포함된 광고로 커미션을 지급 받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책