找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Security Infrastructure Technology for Integrated Utilization of Big Data; Applied to the Livin Atsuko Miyaji,Tomoaki Mimoto Book‘‘‘‘‘‘‘‘ 2

[复制链接]
查看: 13141|回复: 38
发表于 2025-3-21 17:53:36 | 显示全部楼层 |阅读模式
书目名称Security Infrastructure Technology for Integrated Utilization of Big Data
副标题Applied to the Livin
编辑Atsuko Miyaji,Tomoaki Mimoto
视频video
概述Describes the technologies needed to build a secure big data infrastructure that connects data owners, analytical institutions, and user institutions in a circle of trust.Presents a safe and privacy-p
图书封面Titlebook: Security Infrastructure Technology for Integrated Utilization of Big Data; Applied to the Livin Atsuko Miyaji,Tomoaki Mimoto Book‘‘‘‘‘‘‘‘ 2
描述This open access book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical institutions, and user institutions in a circle of trust. It begins by discussing the most relevant technical issues involved in creating safe and privacy-preserving big data distribution platforms, and especially focuses on cryptographic primitives and privacy-preserving techniques, which are essential prerequisites. The book also covers elliptic curve cryptosystems, which offer compact public key cryptosystems; and LWE-based cryptosystems, which are a type of post-quantum cryptosystem. Since big data distribution platforms require appropriate data handling, the book also describes a privacy-preserving data integration protocol and privacy-preserving classification protocol for secure computation. Furthermore, it introduces an anonymization technique and privacy risk evaluation technique..This book also describes the latest related findings in both the living safety and medical fields. In the living safety field, to prevent injuries occurring in everyday life, it is necessary to analyze injury data, find problems, and implement suitable measur
出版日期Book‘‘‘‘‘‘‘‘ 2020
关键词Secure Date Management; Privacy Protection; Big Data Security; Information Security; Cyber Security; Open
版次1
doihttps://doi.org/10.1007/978-981-15-3654-0
isbn_softcover978-981-15-3656-4
isbn_ebook978-981-15-3654-0
copyrightThe Editor(s) (if applicable) and The Author(s) 2020
The information of publication is updating

书目名称Security Infrastructure Technology for Integrated Utilization of Big Data影响因子(影响力)




书目名称Security Infrastructure Technology for Integrated Utilization of Big Data影响因子(影响力)学科排名




书目名称Security Infrastructure Technology for Integrated Utilization of Big Data网络公开度




书目名称Security Infrastructure Technology for Integrated Utilization of Big Data网络公开度学科排名




书目名称Security Infrastructure Technology for Integrated Utilization of Big Data被引频次




书目名称Security Infrastructure Technology for Integrated Utilization of Big Data被引频次学科排名




书目名称Security Infrastructure Technology for Integrated Utilization of Big Data年度引用




书目名称Security Infrastructure Technology for Integrated Utilization of Big Data年度引用学科排名




书目名称Security Infrastructure Technology for Integrated Utilization of Big Data读者反馈




书目名称Security Infrastructure Technology for Integrated Utilization of Big Data读者反馈学科排名




单选投票, 共有 0 人参与投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用户组没有投票权限
发表于 2025-3-21 20:15:20 | 显示全部楼层
https://doi.org/10.1007/978-981-15-3654-0Secure Date Management; Privacy Protection; Big Data Security; Information Security; Cyber Security; Open
发表于 2025-3-22 03:07:42 | 显示全部楼层
发表于 2025-3-22 05:54:11 | 显示全部楼层
Atsuko Miyaji,Tomoaki MimotoDescribes the technologies needed to build a secure big data infrastructure that connects data owners, analytical institutions, and user institutions in a circle of trust.Presents a safe and privacy-p
发表于 2025-3-22 10:37:43 | 显示全部楼层
发表于 2025-3-22 15:14:59 | 显示全部楼层
titutions in a circle of trust.Presents a safe and privacy-pThis open access book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical institutions, and user institutions in a circle of trust. It begins by discussing the most relevant
发表于 2025-3-22 18:35:47 | 显示全部楼层
发表于 2025-3-22 23:22:53 | 显示全部楼层
Cryptography Core Technology, the public-key cryptosystems that can achieve a short key size but it is not a post-quantum cryptosystem. Another is analysis to learning with error (LWE), which is a post-quantum cryptosystem and has the functionality of .. These two security bases have important roles in each protocol described i
发表于 2025-3-23 02:03:35 | 显示全部楼层
Secure Primitive for Big Data Utilization,d in different organizations. This primitive integrates the same data among databases kept in different organizations while keeping any different data in an organization secret to other organizations. Another is a privacy-preserving classification. This primitive executes a procedure for server’s cl
发表于 2025-3-23 07:04:08 | 显示全部楼层
Secure Data Management Technology,ating the (maximum) reidentification risk from anonymized datasets and is generally defined as a quantitative index based on adversary models. The adversary models are implicitly defined according to the attributes in the datasets, use cases, and anonymization techniques. We first review existing an
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-25 03:26
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表