Data privacy: foundations, new developments and the big data challenge:
Gespeichert in:
Internformat
MARC
LEADER | 00000nam a2200000zcb4500 | ||
---|---|---|---|
001 | BV044334880 | ||
003 | DE-604 | ||
005 | 20210915 | ||
007 | cr|uuu---uuuuu | ||
008 | 170601s2017 xx a||| o|||| 00||| eng d | ||
020 | |a 9783319573588 |c Online |9 978-3-319-57358-8 | ||
024 | 7 | |a 10.1007/978-3-319-57358-8 |2 doi | |
035 | |a (ZDB-2-ENG)9783319573588 | ||
035 | |a (OCoLC)989821988 | ||
035 | |a (DE-599)BVBBV044334880 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-859 |a DE-860 |a DE-91 |a DE-1046 |a DE-1043 |a DE-Aug4 |a DE-898 |a DE-861 |a DE-573 |a DE-863 |a DE-706 |a DE-634 |a DE-862 |a DE-92 |a DE-83 | ||
082 | 0 | |a 006.3 |2 23 | |
084 | |a PZ 4600 |0 (DE-625)141181: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a ELT 000 |2 stub | ||
084 | |a MAS 000 |2 stub | ||
100 | 1 | |a Torra, Vicenç |e Verfasser |0 (DE-588)1127080679 |4 aut | |
245 | 1 | 0 | |a Data privacy: foundations, new developments and the big data challenge |c Vicenç Torra |
264 | 1 | |a Cham |b Springer |c [2017] | |
264 | 4 | |c © 2017 | |
300 | |a 1 Online-Ressource (xiv, 269 Seiten) |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Studies in Big Data |v 28 | |
650 | 4 | |a Engineering | |
650 | 4 | |a Artificial intelligence | |
650 | 4 | |a Computational intelligence | |
650 | 4 | |a Computational Intelligence | |
650 | 4 | |a Artificial Intelligence (incl. Robotics) | |
650 | 4 | |a Ingenieurwissenschaften | |
650 | 4 | |a Künstliche Intelligenz | |
650 | 0 | 7 | |a Data Mining |0 (DE-588)4428654-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 2 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 0 | 3 | |a Data Mining |0 (DE-588)4428654-5 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-319-57356-4 |
830 | 0 | |a Studies in Big Data |v 28 |w (DE-604)BV041583423 |9 28 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-57358-8 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029738059&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
912 | |a ZDB-2-ENG | ||
940 | 1 | |q ZDB-2-ENG_2017 | |
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-029738059 | |
966 | e | |u https://doi.org/10.1007/978-3-319-57358-8 |l DE-634 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-57358-8 |l DE-1043 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-57358-8 |l DE-1046 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-57358-8 |l DE-Aug4 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-57358-8 |l DE-573 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-57358-8 |l DE-92 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-57358-8 |l DE-898 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-57358-8 |l DE-859 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-57358-8 |l DE-860 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-57358-8 |l DE-861 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-57358-8 |l DE-863 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-57358-8 |l DE-862 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-57358-8 |l DE-91 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-57358-8 |l DE-706 |p ZDB-2-ENG |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-TUM_katkey | 2264369 |
---|---|
_version_ | 1821933153186480128 |
adam_text | Titel: Data privacy: foundations, new developments and the big data challenge
Autor: Torra, Vicenç
Jahr: 2017
Contents
1 Introduction.............................................. 1
1.1 Motivations for Data Privacy............................. 2
1.2 Privacy and Society.................................... 5
1.3 Terminology.......................................... 6
1.3.1 The Framework.................................. 7
1.3.2 Anonymity and Unlinkability....................... 8
1.3.3 Disclosure...................................... 10
1.3.4 Undetectability and Unobservability.................. 13
1.3.5 Pseudonyms and Identity.......................... 14
1.3.6 Transparency.................................... 16
1.4 Privacy and Disclosure.................................. 17
1.5 Privacy by Design..................................... 17
References................................................ 19
2 Machine and Statistical Learning............................. 23
2.1 Classification of Techniques.............................. 24
2.2 Supervised Learning.................................... 25
2.2.1 Classification.................................... 25
2.2.2 Regression...................................... 26
2.2.3 Validation of Results: k-Fold Cross-Validation.......... 27
2.3 Unsupervised Learning.................................. 28
2.3.1 Clustering...................................... 28
2.3.2 Association Rules................................ 44
2.3.3 Expectation-Maximization Algorithm................. 51
References................................................ 53
3 On the Classification of Protection Procedures.................. 55
3.1 Dimensions........................................... 55
3.1.1 On Whose Privacy Is Being Sought.................. 56
3.1.2 On the Computations to be Done.................... 58
3.1.3 On the Number of Data Sources..................... 60
3.1.4 Knowledge Intensive Data Privacy................... 61
3.1.5 Other Dimensions and Discussion.................... 62
3.1.6 Summary....................................... 63
_________________________________________________________________Contents
3.2 Respondent and Holder Privacy........................... 64
3.3 Data-Driven Methods................................... 65
3.4 Computation-Driven Methods............................. 66
3.4.1 Single Database: Differential Privacy................. 66
3.4.2 Multiple Databases: Cryptographic Approaches......... 69
3.4.3 Discussion...................................... 70
3.5 Result-Driven Approaches............................... 71
3.6 Tabular Data.......................................... 76
3.6.1 Cell Suppression................................. 80
3.6.2 Controlled Tabular Adjustment...................... 83
References................................................ 85
User s Privacy............................................ 89
4.1 User Privacy in Communications.......................... 90
4.1.1 Protecting the Identity of the User................... 90
4.1.2 Protecting the Data of the User...................... 95
4.2 User Privacy in Information Retrieval...................... 97
4.2.1 Protecting the Identity of the User................... 97
4.2.2 Protecting the Query of the User..................... 98
4.3 Private Information Retrieval............................. 101
4.3.1 Information-Theoretic PIR with k Databases............ 101
4.3.2 Computational PIR............................... 104
4.3.3 Other Contexts.................................. 108
References................................................ 108
Privacy Models and Disclosure Risk Measures.................. Ill
5.1 Definition and Controversies.............................. Ill
5.1.1 A Boolean or Measurable Condition.................. 114
5.2 Attribute Disclosure.................................... 115
5.2.1 Attribute Disclosure for a Numerical Variable.......... 115
5.2.2 Attribute Disclosure for a Categorical Variable.......... 116
5.3 Identity Disclosure..................................... 118
5.3.1 An Scenario for Identity Disclosure.................. 118
5.3.2 Measures for Identity Disclosure..................... 121
5.3.3 Uniqueness..................................... 122
5.3.4 Reidentification.................................. 123
5.3.5 The Worst-Case Scenario.......................... 125
5.4 Matching and Integration: A Database Based Approach......... 126
5.4.1 Heterogenous Distributed Databases.................. 127
5.4.2 Data Integration................................. 127
5.4.3 Schema Matching................................ 131
5.4.4 Data Matching.................................. 133
5.4.5 Preprocessing................................... 134
5.4.6 Indexing and Blocking............................ 135
Contents_______________________________________._______ xiii
5.4.7 Record Pair Comparison: Distances and Similarities...... 136
5.4.8 Classification of Record Pairs....................... 140
5.5 Probabilistic Record Linkage............................. 142
5.5.1 Alternative Expressions for Decision Rules............. 152
5.5.2 Computation of Rp(a, b)........................... 156
5.5.3 Estimation of the Probabilities...................... 158
5.5.4 Extensions for Computing Probabilities............... 160
5.5.5 Final Notes..................................... 163
5.6 Distance-Based Record Linkage........................... 163
5.6.1 Weighted Distances............................... 164
5.6.2 Distance and Normalization........................ 167
5.6.3 Parameter Determination for Record Linkage........... 168
5.7 Record Linkage Without Common Variables................. 171
5.8 ^-Anonymity and Other Boolean Conditions
for Identity Disclosure.................................. 172
5.8.1 fc-Anonymity and Anonymity Sets: A-Confusion......... 173
5.8.2 ^-Anonymity and Attribute Disclosure: Attacks......... 176
5.8.3 Other Related Approaches to fc-Anonymity............. 178
5.9 Discussion on Record Linkage............................ 178
5.9.1 Formalization of Reidentification Algorithms........... 178
5.9.2 Comparison of Record Linkage Algorithms............ 179
5.9.3 Disclosure Risk and Big Data....................... 180
5.9.4 Some Guidelines and Research Issues................. 182
References................................................ 183
6 Masking Methods......................................... 191
6.1 Perturbative Methods................................... 193
6.1.1 Data and Rank Swapping.......................... 193
6.1.2 Microaggregation................................ 200
6.1.3 Additive and Multiplicative Noise.................... 212
6.1.4 PRAM......................................... 214
6.1.5 Lossy Compression and Other Transform-Based
Method........................................ 217
6.2 Non-perturbative Methods............................... 219
6.2.1 Generalization and Recoding........................ 219
6.2.2 Suppression..................................... 220
6.3 Synthetic Data Generators............................... 220
6.4 Masking Methods and ^-anonymity........................ 223
6.4.1 Mondrian...................................... 224
6.4.2 Algorithms for fc-anonymity: Variants and Big Data...... 225
6.5 Data Protection Procedures for Constrained Data.............. 226
6.5.1 Types of Constraints.............................. 227
6.6 Masking Methods and Big Data........................... 230
References................................................ 231
x]v_______________________________________________________________ Contents
7 Information Loss: Evaluation and Measures.................... 239
7.1 Generic Versus Specific Information Loss................... 239
7.2 Information Loss Measures............................... 240
7.3 Generic Information Loss Measures........................ 242
7.3.1 Numerical Data.................................. 242
7.3.2 Categorical Data................................. 245
7.4 Specific Information Loss................................ 248
7.4.1 Classification-Based Information Loss................. 248
7.4.2 Regression-Based Information Loss.................. 249
7.4.3 Clustering-Based Information Loss................... 249
7.5 Information Loss and Big Data............................ 250
References................................................ 251
8 Selection of Masking Methods............................... 255
8.1 Aggregation: A Score................................... 255
8.2 Visualization: R-U Maps................................ 256
8.3 Optimization and Postmasking............................ 257
References................................................ 258
9 Conclusions.............................................. 259
Reference................................................ 260
Index...................................................... 261
|
any_adam_object | 1 |
author | Torra, Vicenç |
author_GND | (DE-588)1127080679 |
author_facet | Torra, Vicenç |
author_role | aut |
author_sort | Torra, Vicenç |
author_variant | v t vt |
building | Verbundindex |
bvnumber | BV044334880 |
classification_rvk | PZ 4600 ST 276 |
classification_tum | ELT 000 MAS 000 |
collection | ZDB-2-ENG |
ctrlnum | (ZDB-2-ENG)9783319573588 (OCoLC)989821988 (DE-599)BVBBV044334880 |
dewey-full | 006.3 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 006 - Special computer methods |
dewey-raw | 006.3 |
dewey-search | 006.3 |
dewey-sort | 16.3 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Maschinenbau / Maschinenwesen Rechtswissenschaft Informatik Elektrotechnik / Elektronik / Nachrichtentechnik |
doi_str_mv | 10.1007/978-3-319-57358-8 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03982nam a2200805zcb4500</leader><controlfield tag="001">BV044334880</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20210915 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">170601s2017 xx a||| o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319573588</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-57358-8</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-57358-8</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-ENG)9783319573588</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)989821988</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044334880</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-859</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-1046</subfield><subfield code="a">DE-1043</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">006.3</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">PZ 4600</subfield><subfield code="0">(DE-625)141181:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ELT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">MAS 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Torra, Vicenç</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1127080679</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Data privacy: foundations, new developments and the big data challenge</subfield><subfield code="c">Vicenç Torra</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2017</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xiv, 269 Seiten)</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Studies in Big Data</subfield><subfield code="v">28</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computational intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computational Intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial Intelligence (incl. Robotics)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ingenieurwissenschaften</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Künstliche Intelligenz</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Data Mining</subfield><subfield code="0">(DE-588)4428654-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Data Mining</subfield><subfield code="0">(DE-588)4428654-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-319-57356-4</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Studies in Big Data</subfield><subfield code="v">28</subfield><subfield code="w">(DE-604)BV041583423</subfield><subfield code="9">28</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-57358-8</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029738059&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-ENG</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-ENG_2017</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029738059</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-57358-8</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-57358-8</subfield><subfield code="l">DE-1043</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-57358-8</subfield><subfield code="l">DE-1046</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-57358-8</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-57358-8</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-57358-8</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-57358-8</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-57358-8</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-57358-8</subfield><subfield code="l">DE-860</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-57358-8</subfield><subfield code="l">DE-861</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-57358-8</subfield><subfield code="l">DE-863</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-57358-8</subfield><subfield code="l">DE-862</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-57358-8</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-57358-8</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV044334880 |
illustrated | Illustrated |
indexdate | 2024-12-20T18:00:12Z |
institution | BVB |
isbn | 9783319573588 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029738059 |
oclc_num | 989821988 |
open_access_boolean | |
owner | DE-859 DE-860 DE-91 DE-BY-TUM DE-1046 DE-1043 DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-573 DE-863 DE-BY-FWS DE-706 DE-634 DE-862 DE-BY-FWS DE-92 DE-83 |
owner_facet | DE-859 DE-860 DE-91 DE-BY-TUM DE-1046 DE-1043 DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-573 DE-863 DE-BY-FWS DE-706 DE-634 DE-862 DE-BY-FWS DE-92 DE-83 |
physical | 1 Online-Ressource (xiv, 269 Seiten) Illustrationen |
psigel | ZDB-2-ENG ZDB-2-ENG_2017 |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | Springer |
record_format | marc |
series | Studies in Big Data |
series2 | Studies in Big Data |
spellingShingle | Torra, Vicenç Data privacy: foundations, new developments and the big data challenge Studies in Big Data Engineering Artificial intelligence Computational intelligence Computational Intelligence Artificial Intelligence (incl. Robotics) Ingenieurwissenschaften Künstliche Intelligenz Data Mining (DE-588)4428654-5 gnd Privatsphäre (DE-588)4123980-5 gnd Datenschutz (DE-588)4011134-9 gnd Datensicherung (DE-588)4011144-1 gnd |
subject_GND | (DE-588)4428654-5 (DE-588)4123980-5 (DE-588)4011134-9 (DE-588)4011144-1 |
title | Data privacy: foundations, new developments and the big data challenge |
title_auth | Data privacy: foundations, new developments and the big data challenge |
title_exact_search | Data privacy: foundations, new developments and the big data challenge |
title_full | Data privacy: foundations, new developments and the big data challenge Vicenç Torra |
title_fullStr | Data privacy: foundations, new developments and the big data challenge Vicenç Torra |
title_full_unstemmed | Data privacy: foundations, new developments and the big data challenge Vicenç Torra |
title_short | Data privacy: foundations, new developments and the big data challenge |
title_sort | data privacy foundations new developments and the big data challenge |
topic | Engineering Artificial intelligence Computational intelligence Computational Intelligence Artificial Intelligence (incl. Robotics) Ingenieurwissenschaften Künstliche Intelligenz Data Mining (DE-588)4428654-5 gnd Privatsphäre (DE-588)4123980-5 gnd Datenschutz (DE-588)4011134-9 gnd Datensicherung (DE-588)4011144-1 gnd |
topic_facet | Engineering Artificial intelligence Computational intelligence Computational Intelligence Artificial Intelligence (incl. Robotics) Ingenieurwissenschaften Künstliche Intelligenz Data Mining Privatsphäre Datenschutz Datensicherung |
url | https://doi.org/10.1007/978-3-319-57358-8 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029738059&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV041583423 |
work_keys_str_mv | AT torravicenc dataprivacyfoundationsnewdevelopmentsandthebigdatachallenge |