|
Showing 1 - 5 of
5 matches in All Departments
This open access book describes the technologies needed to
construct a secure big data infrastructure that connects data
owners, analytical institutions, and user institutions in a circle
of trust. It begins by discussing the most relevant technical
issues involved in creating safe and privacy-preserving big data
distribution platforms, and especially focuses on cryptographic
primitives and privacy-preserving techniques, which are essential
prerequisites. The book also covers elliptic curve cryptosystems,
which offer compact public key cryptosystems; and LWE-based
cryptosystems, which are a type of post-quantum cryptosystem. Since
big data distribution platforms require appropriate data handling,
the book also describes a privacy-preserving data integration
protocol and privacy-preserving classification protocol for secure
computation. Furthermore, it introduces an anonymization technique
and privacy risk evaluation technique.This book also describes the
latest related findings in both the living safety and medical
fields. In the living safety field, to prevent injuries occurring
in everyday life, it is necessary to analyze injury data, find
problems, and implement suitable measures. But most cases don't
include enough information for injury prevention because the
necessary data is spread across multiple organizations, and data
integration is difficult from a security standpoint. This book
introduces a system for solving this problem by applying a method
for integrating distributed data securely and introduces
applications concerning childhood injury at home and school injury.
In the medical field, privacy protection and patient consent
management are crucial for all research. The book describes a
medical test bed for the secure collection and analysis of
electronic medical records distributed among various medical
institutions. The system promotes big-data analysis of medical data
with a cloud infrastructure and includes various security measures
developed in our project to avoid privacy violations.
This book constitutes the refereed proceedings of the 17th
International Conference on Network and System Security, NSS 2023,
held in Canterbury, UK, August 14–16, 2023.The 12 full and 9
short papers presented together with 2 invited talks in this book
were carefully reviewed and selected from 64 submissions. They
focus on Attacks and Malware, Blockchain, Security through
Hardware, Machine learning and much more.
This open access book describes the technologies needed to
construct a secure big data infrastructure that connects data
owners, analytical institutions, and user institutions in a circle
of trust. It begins by discussing the most relevant technical
issues involved in creating safe and privacy-preserving big data
distribution platforms, and especially focuses on cryptographic
primitives and privacy-preserving techniques, which are essential
prerequisites. The book also covers elliptic curve cryptosystems,
which offer compact public key cryptosystems; and LWE-based
cryptosystems, which are a type of post-quantum cryptosystem. Since
big data distribution platforms require appropriate data handling,
the book also describes a privacy-preserving data integration
protocol and privacy-preserving classification protocol for secure
computation. Furthermore, it introduces an anonymization technique
and privacy risk evaluation technique.This book also describes the
latest related findings in both the living safety and medical
fields. In the living safety field, to prevent injuries occurring
in everyday life, it is necessary to analyze injury data, find
problems, and implement suitable measures. But most cases don't
include enough information for injury prevention because the
necessary data is spread across multiple organizations, and data
integration is difficult from a security standpoint. This book
introduces a system for solving this problem by applying a method
for integrating distributed data securely and introduces
applications concerning childhood injury at home and school injury.
In the medical field, privacy protection and patient consent
management are crucial for all research. The book describes a
medical test bed for the secure collection and analysis of
electronic medical records distributed among various medical
institutions. The system promotes big-data analysis of medical data
with a cloud infrastructure and includes various security measures
developed in our project to avoid privacy violations.
|
Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings (Paperback, 1st ed. 2017)
Dieter Gollmann, Atsuko Miyaji, Hiroaki Kikuchi
|
R1,694
Discovery Miles 16 940
|
Ships in 10 - 15 working days
|
This book constitutes the proceedings of the 15th International
Conference on Applied Cryptology and Network Security, ACNS 2017,
held in Kanazawa, Japan, in July 2017. The 34 papers presented in
this volume were carefully reviewed and selected from 149
submissions. The topics focus on innovative research and current
developments that advance the areas of applied cryptography,
security analysis, cyber security and privacy, data and server
security.
This book constitutes the refereed proceedings of the 9th
International Conference on Provable Security, ProvSec 2015, held
in Kanazawa, Japan, in November 2015. The 19 full papers and 7
short papers presented together with 3 invited talks were carefully
reviewed and selected from 60 submissions. The papers are grouped
in topical sections on fundamental, protocol, authenticated
encryption and key exchange, encryption and identification, privacy
and cloud, leakage-resilient cryptography and lattice cryptography,
signature and broadcast encryption.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
|