ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Privacy and Identity Management. Data for Better Living: AI and Privacy: 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, ... and Communication Technology, 576)

دانلود کتاب مدیریت حریم خصوصی و هویت داده ها برای زندگی بهتر: هوش مصنوعی و حریم خصوصی: چهاردهمین دوره IFIP WG 9.2، 9.6/11.7، 11.6/SIG 9.2.2 مدرسه تابستانی بین المللی، ... و فناوری ارتباطات، 576)

Privacy and Identity Management. Data for Better Living: AI and Privacy: 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, ... and Communication Technology, 576)

مشخصات کتاب

Privacy and Identity Management. Data for Better Living: AI and Privacy: 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, ... and Communication Technology, 576)

ویرایش:  
نویسندگان: , , , ,   
سری:  
ISBN (شابک) : 3030425037, 9783030425036 
ناشر: Springer 
سال نشر: 2020 
تعداد صفحات: 480 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 25 مگابایت 

قیمت کتاب (تومان) : 60,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 3


در صورت تبدیل فایل کتاب Privacy and Identity Management. Data for Better Living: AI and Privacy: 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, ... and Communication Technology, 576) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب مدیریت حریم خصوصی و هویت داده ها برای زندگی بهتر: هوش مصنوعی و حریم خصوصی: چهاردهمین دوره IFIP WG 9.2، 9.6/11.7، 11.6/SIG 9.2.2 مدرسه تابستانی بین المللی، ... و فناوری ارتباطات، 576) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب مدیریت حریم خصوصی و هویت داده ها برای زندگی بهتر: هوش مصنوعی و حریم خصوصی: چهاردهمین دوره IFIP WG 9.2، 9.6/11.7، 11.6/SIG 9.2.2 مدرسه تابستانی بین المللی، ... و فناوری ارتباطات، 576)



این کتاب شامل مقالات منتخب ارائه شده در چهاردهمین دوره مدرسه تابستانی بین المللی IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 در مدیریت حریم خصوصی و هویت است که در ویندیش، سوئیس برگزار شد. ، در آگوست 2019.

22 مقاله کامل موجود در این جلد به دقت بررسی و از بین 31 مقاله ارسالی انتخاب شدند. همچنین شامل مقالات بررسی شده است که نتایج کارگاه ها و آموزش هایی را که در مدرسه تابستانی برگزار شد و همچنین مقالات ارائه شده توسط چند نفر از سخنرانان مدعو ارائه شده است. این مقالات رویکردهای بین رشته‌ای را برای گرد هم آوردن مجموعه‌ای از دیدگاه‌ها که در بخش‌های موضوعی منعکس می‌شوند ترکیب می‌کنند: زبان و حریم خصوصی. قانون، اخلاق و هوش مصنوعی؛ بیومتریک و حریم خصوصی؛ ابزارهایی که از انطباق حفاظت از داده ها پشتیبانی می کنند. طبقه بندی حریم خصوصی و ارزیابی امنیتی؛ فن‌آوری‌های افزایش حریم خصوصی در زمینه‌های خاص.

فصل‌های \"نگاه شما چه چیزی درباره شما آشکار می‌کند؟ در مورد پیامدهای حریم خصوصی ردیابی چشم\" و \"پیام‌های حریم خصوصی صدا و تجزیه و تحلیل گفتار - افشای اطلاعات توسط استنتاج\" تحت مجوز CC BY 4.0 در link.springer.com دسترسی آزاد دارند.



توضیحاتی درمورد کتاب به خارجی

This book contains selected papers presented at the 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Windisch, Switzerland, in August 2019.

The 22 full papers included in this volume were carefully reviewed and selected from 31 submissions. Also included are reviewed papers summarizing the results of workshops and tutorials that were held at the Summer School as well as papers contributed by several of the invited speakers. The papers combine interdisciplinary approaches to bring together a host of perspectives, which are reflected in the topical sections: language and privacy; law, ethics and AI; biometrics and privacy; tools supporting data protection compliance; privacy classification and security assessment; privacy enhancing technologies in specific contexts.

The chapters \"What Does Your Gaze Reveal About You? On the Privacy Implications of Eye Tracking\" and \"Privacy Implications of Voice and Speech Analysis - Information Disclosure by Inference\" are open access under a CC BY 4.0 license at link.springer.com.




فهرست مطالب

Preface
Organization
Contents
Invited Papers
Privacy as Enabler of Innovation
	1 The Role of Privacy in Innovation Processes
	2 Privacy and Data Protection – Two Sides of the Coin
		2.1 From Privacy to Data Protection
		2.2 Companies Active in Data Protection
	3 Two Takes on Privacy Markets
		3.1 Tools Focusing on Privacy Protection
		3.2 Privacy-Friendly Products and Services
	4 Challenges and Ways Forward
	5 Conclusions
	References
Fair Enough? On (Avoiding) Bias in Data, Algorithms and Decisions
	1 Introduction
	2 Abstract Objectivity and Human Construction
	3 How Is Bias Relevant in Computational Technologies?
	4 Biases in Natural Language
	5 Should We Do Something About Bias?
	6 Formal Methods as Tools for Understanding
	7 Concluding Remarks
	References
Workshop and Tutorial Papers
Opportunities and Challenges of Dynamic Consent in Commercial Big Data Analytics
	1 Introduction
	2 Background and Motivation
		2.1 The Concept of Dynamic Consent
		2.2 Imaginary Scenario
	3 Methodology
		3.1 Designing the Prototype
		3.2 Evaluating the Prototype
	4 Results
		4.1 Implementing Dynamic Consent
		4.2 Perception of Dynamic Consent
	5 Discussion
		5.1 Reflecting on Dynamic Consent
		5.2 Limits
	6 Related Work
	7 Conclusion
	References
Identity Management: State of the Art, Challenges and Perspectives-8pt
	1 Introduction
	2 Identity Management and Existing Solutions
		2.1 The Problem with Online Identity
		2.2 Current Identity Management Solutions
	3 Privacy-Enhancing Attribute-Based Credentials
	4 Single Sign-On with Distributed Trust
		4.1 The OLYMPUS Approach
		4.2 Open Questions
		4.3 Discussions at the Workshop
	References
SoK: Cryptography for Neural Networks
	1 Introduction
	2 Neural Networks
		2.1 Definition
		2.2 Architecture
		2.3 Approximation of NN Layers
		2.4 Security Requirements
	3 Cryptographic Techniques
		3.1 Multi-party Computation
		3.2 Fully Homomorphic Encryption
	4 Existing Solutions
		4.1 MPC-Based Privacy Preserving NN Solutions
		4.2 FHE-Based Privacy Preserving NN Solutions
		4.3 Hybrid Solution
	5 Performance Study
		5.1 Arrhythmia Case Study
		5.2 Image Classification Case Study
		5.3 Performance Evaluation of Cryptographic Techniques on Arrhythmia Classification
	6 Summary
	References
Workshop on Privacy Challenges in Public and Private Organizations
	1 Introduction
	2 Motivation and Objectives
	3 Workshop Format
	4 Lessons Learned from the PoSeID-on Project Perspective
		4.1 Use Cases
		4.2 Dashboard and Data Analysis Modules
	5 Lessons Learned from the PAPAYA Project Perspective
	6 Conclusion
	References
News Diversity and Recommendation Systems: Setting the Interdisciplinary Scene
	1 Introduction
	2 News Recommendations Systems Today
	3 A Fundamental Right to Diverse Information
	4 Unravelling News Diversity
		4.1 Normative Assumptions
		4.2 Conceptual Assumptions
	5 Automated Extraction of Content Dimensions in Written News
		5.1 Topics
		5.2 Events
	6 Towards a Diversity-Promoting News Recommender
	References
Language and Privacy
Ontology-Based Modeling of Privacy Vulnerabilities for Data Sharing
	1 Introduction
	2 Related Work
		2.1 Protection Methods
		2.2 Data Transformation
		2.3 Ontologies and Taxonomies
		2.4 Summary
	3 Analysis of Domain Cases
	4 Ontology-Based Modeling
	5 Models of Domain Cases
	6 Modeling an Open Dataset
	7 Discussion
	8 Conclusion
	References
On the Design of a Privacy-Centered Data Lifecycle for Smart Living Spaces
	1 Introduction
		1.1 Data Flow Diagrams
		1.2 IoT Entities, Processes, and Data Flows
		1.3 Organization of the Paper
	2 Background and Related Work
	3 IoT Privacy Goals and Threats
	4 Privacy-Centered Smart Living Data Lifecycle
	5 Application of the Privacy-Centered Smart Living Data Lifecycle
	6 Discussion
	7 Conclusions and Future Work
	References
Language-Based Mechanisms for Privacy-by-Design
	1 Introduction
	2 Language Constructs for Policy Specification
		2.1 Policy Compliance Definition
	3 Embedding Policy with Program Constructs
	4 An Effect System for Privacy
	5 Case Study
	6 Related Work
	7 Conclusion
	References
Law, Ethics and AI
Aid and AI: The Challenge of Reconciling Humanitarian Principles and Data Protection
	1 Introduction
		1.1 Terminology
	2 The Evolution of Humanitarian Action
	3 AI and Biometrics in Humanitarian Action
		3.1 General Trends in AI-Based Facial Recognition
		3.2 The Prospective Use of Facial Recognition to Identify Missing Persons in the Humanitarian Sector
	4 Privacy and Data Protection Concerns
		4.1 Purpose Limitation
		4.2 Data Security
		4.3 Fairness and Bias
	5 Application of Humanitarian Principles
		5.1 ‘Do No Harm’
		5.2 Participation by Beneficiaries and Building on Local Capacity
		5.3 Accountability: Value for Money or Humanitarian Effectiveness
	6 Outlook for Future Engagement
	References
Get to Know Your Geek: Towards a Sociological Understanding of Incentives Developing Privacy-Friendly Free and Open Source Software
	1 Introduction
	2 Related Work
	3 Research Agenda
		3.1 Model Assumptions
		3.2 Data Collection
		3.3 Engineer the Game: Mechanism Design
	4 Conclusion
	References
Recommended for You: “You Don’t Need No Thought Control”. An Analysis of News Personalisation in Light of Article 22 GDPR
	1 Introduction
	2 News Personalisation at News Websites
	3 A Prohibition Based on Article 22 GDPR and Freedom to Form Thoughts and Opinions Concerning Matters of General Interest
		3.1 Generating News Recommendations by Solely Automated Means
		3.2 Limitations on the Basis of the Freedom to Form Thoughts and Opinions Concerning Matters of General Interest
		3.3 Explicit Consent as an Exception
	4 Conclusion
	References
Biometrics and Privacy
Data Privatizer for Biometric Applications and Online Identity Management
	1 Introduction
	2 Related Work
	3 Private Feature Extraction Framework
		3.1 High-Level Framework and Threat Model
		3.2 Privacy-Preserving Training Objective
		3.3 Neural Networks Architecture
		3.4 Optimization of the Networks
	4 Evaluation
		4.1 Experimental Setup
		4.2 Experimental Results
	5 Conclusion
	References
What Does Your Gaze Reveal About You? On the Privacy Implications of Eye Tracking
	1 Introduction
	2 Inference of Personal Information from Eye Tracking Data
		2.1 Biometric Identification
		2.2 Monitoring of Mental Workload and Cognitive Processes
		2.3 Inference of Personality Traits
		2.4 Inference of Cultural Affiliation and Ethnicity
		2.5 Skill Assessment
		2.6 Age and Gender Recognition
		2.7 Inference of Preferences and Aversions
		2.8 Detection of Short- and Medium-Term User States
		2.9 Health Assessment
	3 Discussion and Implications
	4 Conclusion
	References
Privacy Implications of Voice and Speech Analysis – Information Disclosure by Inference
	1 Introduction
	2 Inference of Personal Information from Voice Recordings
		2.1 Speaker Recognition
		2.2 Inference of Body Measures
		2.3 Mood and Emotion Recognition
		2.4 Inference of Age and Gender
		2.5 Inference of Personality Traits
		2.6 Deception Detection
		2.7 Detection of Sleepiness and Intoxication
		2.8 Accent Recognition
		2.9 Speaker Pathology
		2.10 Mental Health Assessment
		2.11 Prediction of Interpersonal Perception
		2.12 Inference of Socioeconomic Status
		2.13 Classification of Acoustic Scenes and Events
	3 Discussion and Implications
	4 Conclusion
	References
Border Control and Use of Biometrics: Reasons Why the Right to Privacy Can Not Be Absolute
	1 Introduction
	2 Background
		2.1 The Use of Biometrics for Border Control
		2.2 Right to Privacy
	3 Viewpoints of Privacy: Why It Can Not Be Absolute
		3.1 Privacy versus National Security
		3.2 Privacy Properties Conflicting with Border Risk Analysis
		3.3 Privacy by Design (PbD) and Engineering Design
	4 Conclusions
	References
Tools Supporting Data Protection Compliance
Making GDPR Usable: A Model to Support Usability Evaluations of Privacy
	1 Introduction
	2 Putting the Work into Context
	3 The Usable Privacy Cube Model
	4 EuroPriSe
	5 Usable Privacy Goals
	6 Usable Privacy Criteria
		6.1 List of up Criteria
	7 Interactions Between the Three Axes
	8 Conclusion and Further Work
	References
Decision Support for Mobile App Selection via Automated Privacy Assessment
	1 Introduction
	2 Related Work
	3 Approach Overview and Design Goals
		3.1 Overview
		3.2 Requirements
	4 System Design
		4.1 App Isolation Module
		4.2 Metadata Downloader
		4.3 Parameters Inspection Modules
		4.4 Personalized Privacy Assessment
		4.5 Visualization Engine (VE) and Graphical User Interface (GUI)
	5 Evaluation and Discussion
	6 Conclusion and Future Work
	References
Tool-Assisted Risk Analysis for Data Protection Impact Assessment
	1 Introduction
	2 Background
	3 Our Methodology
		3.1 First Step: Processing Analysis
		3.2 Second Step: Risk Analysis
	4 Related Work
	5 Conclusion and Future Work
	References
Privacy Classification and Security Assessment
How to Protect My Privacy? - Classifying End-User Information Privacy Protection Behaviors
	1 Introduction
	2 Related Work on End-User Privacy Protection Classification and Modeling
		2.1 High-Level Classifications
		2.2 Active and Passive
		2.3 Chronological Classifications
		2.4 Classification from a Technological Perspective
		2.5 Fine-Grained Approaches
		2.6 Taxonomies and Models
	3 Methodology
		3.1 Literature Review
		3.2 Classification of Behaviors and Model Generation
	4 Results and Explanation of the Model
	5 Discussion
		5.1 Implications
		5.2 Limitations
	6 Conclusion and Future Work
	References
Annotation-Based Static Analysis for Personal Data Protection
	1 Introduction
	2 Background and Related Work
		2.1 Categorisation by Problem Characteristics
		2.2 Categorisation by Solution Characteristics
		2.3 Related Work
	3 Tool
		3.1 Design of the Tool
		3.2 Implementation
	4 Discussion
		4.1 Metrics for Personal Data Prevalence
		4.2 Finding LPL Purposes
		4.3 Regarding the GDPR and Static Analysis
	5 Conclusion
	References
Order of Control and Perceived Control over Personal Information
	1 Introduction
	2 Order of Control for Personal Information
	3 Analysis of Literature on Perceptions of Control
	4 Preliminary Study on the Order of Control and Perceptions of Control
		4.1 Method
		4.2 Procedure
		4.3 Results
		4.4 Discussion
	5 General Discussion and Conclusion
	References
Aggregating Corporate Information Security Maturity Levels of Different Assets
	1 Introduction
	2 Background and Related Work
		2.1 Aggregation Types
		2.2 Aggregation of Security Metrics
	3 Research Methodology
		3.1 Different Aggregation Functions
		3.2 Data Collection
		3.3 Algorithm Method Selection
	4 Discussion of Different Aggregations
		4.1 General Aggregation Functions
		4.2 Derived Optimization Strategies
		4.3 Example with Real World Data
		4.4 More Complex Aggregations
		4.5 Priorization of Asset Classes
	5 Results of the Holistic Approach Considering Different Aggregation Types
		5.1 Results of Aggregated Maturity Levels
		5.2 Results of Priorization the Asset
	6 Discussion
		6.1 Limitations
	7 Conclusion and Future Work
	References
Privacy Enhancing Technologies in Specific Contexts
Differential Privacy in Online Dating Recommendation Systems
	1 Introduction
	2 Preliminiaries
		2.1 Differential Privacy
		2.2 Online Dating Recommendation Systems
	3 Results
		3.1 Social Collab
		3.2 RECON
		3.3 Stochastic Matching
	4 Conclusion and Open Problems
	References
Distributed Ledger for Provenance Tracking of Artificial Intelligence Assets
	1 Introduction
	2 Related Work
		2.1 Provenance Tracing for Data in AI Development
		2.2 Provenance Tracing Using Blockchain
		2.3 Limitations of State of the Art
	3 Provenance Model for AI Assets on a Public Permission-Less Blockchain
	4 Implementation
		4.1 System Overview
		4.2 Smart Contract
		4.3 Protocol Specification
	5 Validation
		5.1 Medical Use Case
		5.2 Smart Contract Interactions and Costs for TUM Use Case
		5.3 Smart Contract Limitations
	6 Discussion
	References
A Survey-Based Exploration of Users\' Awareness and Their Willingness to Protect Their Data with Smart Objects
	1 Introduction
	2 Related Work
	3 Methodology
	4 Results
		4.1 Demographics
		4.2 Knowledge and Experience
		4.3 Collection, Disclosure, and Privacy
		4.4 Information and Control Willingness
	5 Derived Requirements for User-Centric-Privacy-Preserving Solutions
	6 Discussion
	7 Conclusions and Outlook
	A  Appendix - Survey questions
	References
Self-Sovereign Identity Systems
	1 Introduction
	2 Self-Sovereign Identity
	3 Evaluation Framework
	4 State-of-the-Art Developments in Practice
		4.1 Sovrin
		4.2 uPort
		4.3 ShoCard
		4.4 Civic
		4.5 Blockstack
	5 Discussion
	6 Conclusion
	References
Privacy in Location-Based Services and Their Criticality Based on Usage Context
	1 Introduction
	2 Background
		2.1 Indoor and Outdoor Localization
		2.2 Privacy Patterns for Localization Information
	3 Related Work
	4 Methodology
	5 Analysis
		5.1 Use Cases of Location-Based Services
		5.2 Analysis of Typical Realizations of Use Cases
		5.3 Privacy Patterns in Location Based Services
	6 Discussion and Conclusion
	References
Author Index




نظرات کاربران