語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Security Infrastructure Technology f...
~
SpringerLink (Online service)
Security Infrastructure Technology for Integrated Utilization of Big Data = Applied to the Living Safety and Medical Fields /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Security Infrastructure Technology for Integrated Utilization of Big Data/ edited by Atsuko Miyaji, Tomoaki Mimoto.
其他題名:
Applied to the Living Safety and Medical Fields /
其他作者:
Mimoto, Tomoaki.
面頁冊數:
IX, 166 p. 61 illus., 55 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Security. -
電子資源:
https://doi.org/10.1007/978-981-15-3654-0
ISBN:
9789811536540
Security Infrastructure Technology for Integrated Utilization of Big Data = Applied to the Living Safety and Medical Fields /
Security Infrastructure Technology for Integrated Utilization of Big Data
Applied to the Living Safety and Medical Fields /[electronic resource] :edited by Atsuko Miyaji, Tomoaki Mimoto. - 1st ed. 2020. - IX, 166 p. 61 illus., 55 illus. in color.online resource.
Introduction -- Cryptography Core Technology -- Secure Primitive for big data utilization -- Secure Data Management Technology -- Living Safety Testbed Group -- Health Test Bed Group.
Open Access
This open access book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical institutions, and user institutions in a circle of trust. It begins by discussing the most relevant technical issues involved in creating safe and privacy-preserving big data distribution platforms, and especially focuses on cryptographic primitives and privacy-preserving techniques, which are essential prerequisites. The book also covers elliptic curve cryptosystems, which offer compact public key cryptosystems; and LWE-based cryptosystems, which are a type of post-quantum cryptosystem. Since big data distribution platforms require appropriate data handling, the book also describes a privacy-preserving data integration protocol and privacy-preserving classification protocol for secure computation. Furthermore, it introduces an anonymization technique and privacy risk evaluation technique. This book also describes the latest related findings in both the living safety and medical fields. In the living safety field, to prevent injuries occurring in everyday life, it is necessary to analyze injury data, find problems, and implement suitable measures. But most cases don’t include enough information for injury prevention because the necessary data is spread across multiple organizations, and data integration is difficult from a security standpoint. This book introduces a system for solving this problem by applying a method for integrating distributed data securely and introduces applications concerning childhood injury at home and school injury. In the medical field, privacy protection and patient consent management are crucial for all research. The book describes a medical test bed for the secure collection and analysis of electronic medical records distributed among various medical institutions. The system promotes big-data analysis of medical data with a cloud infrastructure and includes various security measures developed in our project to avoid privacy violations.
ISBN: 9789811536540
Standard No.: 10.1007/978-981-15-3654-0doiSubjects--Topical Terms:
1114130
Security.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Security Infrastructure Technology for Integrated Utilization of Big Data = Applied to the Living Safety and Medical Fields /
LDR
:03697nam a22004215i 4500
001
1017528
003
DE-He213
005
20200701083829.0
007
cr nn 008mamaa
008
210318s2020 si | s |||| 0|eng d
020
$a
9789811536540
$9
978-981-15-3654-0
024
7
$a
10.1007/978-981-15-3654-0
$2
doi
035
$a
978-981-15-3654-0
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
082
0 4
$a
005.8
$2
23
245
1 0
$a
Security Infrastructure Technology for Integrated Utilization of Big Data
$h
[electronic resource] :
$b
Applied to the Living Safety and Medical Fields /
$c
edited by Atsuko Miyaji, Tomoaki Mimoto.
250
$a
1st ed. 2020.
264
1
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2020.
300
$a
IX, 166 p. 61 illus., 55 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
505
0
$a
Introduction -- Cryptography Core Technology -- Secure Primitive for big data utilization -- Secure Data Management Technology -- Living Safety Testbed Group -- Health Test Bed Group.
506
0
$a
Open Access
520
$a
This open access book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical institutions, and user institutions in a circle of trust. It begins by discussing the most relevant technical issues involved in creating safe and privacy-preserving big data distribution platforms, and especially focuses on cryptographic primitives and privacy-preserving techniques, which are essential prerequisites. The book also covers elliptic curve cryptosystems, which offer compact public key cryptosystems; and LWE-based cryptosystems, which are a type of post-quantum cryptosystem. Since big data distribution platforms require appropriate data handling, the book also describes a privacy-preserving data integration protocol and privacy-preserving classification protocol for secure computation. Furthermore, it introduces an anonymization technique and privacy risk evaluation technique. This book also describes the latest related findings in both the living safety and medical fields. In the living safety field, to prevent injuries occurring in everyday life, it is necessary to analyze injury data, find problems, and implement suitable measures. But most cases don’t include enough information for injury prevention because the necessary data is spread across multiple organizations, and data integration is difficult from a security standpoint. This book introduces a system for solving this problem by applying a method for integrating distributed data securely and introduces applications concerning childhood injury at home and school injury. In the medical field, privacy protection and patient consent management are crucial for all research. The book describes a medical test bed for the secure collection and analysis of electronic medical records distributed among various medical institutions. The system promotes big-data analysis of medical data with a cloud infrastructure and includes various security measures developed in our project to avoid privacy violations.
650
1 4
$a
Security.
$3
1114130
650
0
$a
Data protection.
$3
557764
700
1
$a
Mimoto, Tomoaki.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1312369
700
1
$a
Miyaji, Atsuko.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
716494
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9789811536533
776
0 8
$i
Printed edition:
$z
9789811536557
776
0 8
$i
Printed edition:
$z
9789811536564
856
4 0
$u
https://doi.org/10.1007/978-981-15-3654-0
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
912
$a
ZDB-2-SOB
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入