This book presents a comprehensive approach to protecting sensitive information when large data collections are released by their owners. It addresses three key requirements of data privacy: the protection of data explicitly released, the protection of information not explicitly released but potenti
Protecting Privacy in Data Release
โ Scribed by Giovanni Livraga (auth.)
- Publisher
- Springer International Publishing
- Year
- 2015
- Tongue
- English
- Leaves
- 204
- Series
- Advances in Information Security 57
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
This book presents a comprehensive approach to protecting sensitive information when large data collections are released by their owners. It addresses three key requirements of data privacy: the protection of data explicitly released, the protection of information not explicitly released but potentially vulnerable due to a release of other data, and the enforcement of owner-defined access restrictions to the released data. It is also the first book with a complete examination of how to enforce dynamic read and write access authorizations on released data, applicable to the emerging data outsourcing and cloud computing situations. Private companies, public organizations and final users are releasing, sharing, and disseminating their data to take reciprocal advantage of the great benefits of making their data available to others. This book weighs these benefits against the potential privacy risks. A detailed analysis of recent techniques for privacy protection in data release and case studies illustrate crucial scenarios. Protecting Privacy in Data Release targets researchers, professionals and government employees working in security and privacy. Advanced-level students in computer science and electrical engineering will also find this book useful as a secondary text or reference.
โฆ Table of Contents
Front Matter....Pages i-xv
Introduction....Pages 1-9
Related Work....Pages 11-33
Enforcing Confidentiality and Visibility Constraints....Pages 35-103
Counteracting Inferences from Sensitive Value Distributions....Pages 105-137
Enforcing Dynamic Read and Write Privileges....Pages 139-182
Conclusions....Pages 183-186
Back Matter....Pages 187-192
โฆ Subjects
Systems and Data Security; Database Management; Information Systems Applications (incl. Internet); Management of Computing and Information Systems
๐ SIMILAR VOLUMES
Between major privacy regulations like the GDPR and CCPA and expensive and notorious data breaches, there has never been so much pressure to ensure data privacy. Unfortunately, integrating privacy into data systems is still complicated. This essential guide will give you a fundamental understanding
Between major privacy regulations like the GDPR and CCPA and expensive and notorious data breaches, there has never been so much pressure for data scientists to ensure data privacy. Unfortunately, integrating privacy into your data science workflow is still complicated. This essential guide will giv
Biobanks are critical infrastructure for medical research but they are also the subject of considerable ethical and legal uncertainty. Given that biobanks process large quantities of genomic data, questions have emerged as to how genetic privacy should be protected. What types of genetic privacy ri