Protecting persons while protecting the people : second annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008, revised selected papers / Cecilia S. Gal, Paul B. Kantor, Michael E. Lesk, (eds.).

By: (2nd : Annual Workshop on Information Privacy and National Security (2nd : 2008 : New Brunswick, N.J.)
Contributor(s): Gal, Cecilia S | Kantor, Paul B | Lesk, Michael
Material type: TextTextSeries: SerienbezeichnungLecture notes in computer science: 5661.Publisher: Berlin : Springer, ©2009Description: 1 online resource (x, 137 pages) : illustrationsContent type: text Media type: computer Carrier type: online resourceISBN: 9783642102332; 3642102336Subject(s): Computer security -- Congresses | National security -- Congresses | Privacy, Right of -- Congresses | Information society -- Congresses | National security | Privacy, Right of | Information society | Computer security | Informatique | Computer security | Information society | National security | Privacy, Right of | Anonymität | Computersicherheit | Datensicherung | Identitätsverwaltung | Kryptoanalyse | Monitoring Informatik | Netzwerkverwaltung | Privatsphäre | Sicherheit | Internet | computers | samenleving | society | recht | law | biometrie | biometry | gegevensbeheer | data management | computerwetenschappen | computer sciences | datamining | data mining | Information and Communication Technology (General) | Informatie- en communicatietechnologie (algemeen)Genre/Form: Electronic books. | Conference papers and proceedings. | Kongress 2008. Additional physical formats: Print version:: Protecting persons while protecting the people.DDC classification: 005.8 LOC classification: QA76.9.A25 | A554 2008Other classification: TP309-532 | SS 4800 | DAT 461f | DAT 465f | DAT 050f Online resources: Click here to access online
Contents:
The Challenges of Seeking Security While Respecting Privacy -- The Challenges of Seeking Security While Respecting Privacy -- Section One: Statement of the Problem -- Intelligence Policy and the Science of Intelligence -- Cyber Security: Assessing Our Vulnerabilities and Developing an Effective Defense -- Intelligence, Dataveillance, and Information Privacy -- Results of Workshops on Privacy Protection Technologies -- Words Matter: Privacy, Security, and Related Terms -- Section Two: Theoretical Approaches to the Problem -- kACTUS 2: Privacy Preserving in Classification Tasks Using k-Anonymity -- Valid Statistical Analysis for Logistic Regression with Multiple Sources -- Section Three: Practical Approaches to the Problem -- Suspicious Activity Reporting (SAR) -- Stable Statistics of the Blogograph -- Privacy-Preserving Accountable Accuracy Management Systems (PAAMS) -- On the Statistical Dependency of Identity Theft on Demographics.
Summary: Annotation This book constitutes the revised selected papers of the Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, held in New Brunswick, NJ, USA, in May 2008. The 11 revised full papers were carefully reviewed and selected from numerous submissions. The papers deal with the inherent tension between the need to gather intelligence necessary to protect the security of persons and nations, and the privacy rights of persons and organizations.
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current location Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library

Electronic Book@IST

EBook Available
Total holds: 0

Includes bibliographical references and index.

Annotation This book constitutes the revised selected papers of the Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, held in New Brunswick, NJ, USA, in May 2008. The 11 revised full papers were carefully reviewed and selected from numerous submissions. The papers deal with the inherent tension between the need to gather intelligence necessary to protect the security of persons and nations, and the privacy rights of persons and organizations.

Print version record.

The Challenges of Seeking Security While Respecting Privacy -- The Challenges of Seeking Security While Respecting Privacy -- Section One: Statement of the Problem -- Intelligence Policy and the Science of Intelligence -- Cyber Security: Assessing Our Vulnerabilities and Developing an Effective Defense -- Intelligence, Dataveillance, and Information Privacy -- Results of Workshops on Privacy Protection Technologies -- Words Matter: Privacy, Security, and Related Terms -- Section Two: Theoretical Approaches to the Problem -- kACTUS 2: Privacy Preserving in Classification Tasks Using k-Anonymity -- Valid Statistical Analysis for Logistic Regression with Multiple Sources -- Section Three: Practical Approaches to the Problem -- Suspicious Activity Reporting (SAR) -- Stable Statistics of the Blogograph -- Privacy-Preserving Accountable Accuracy Management Systems (PAAMS) -- On the Statistical Dependency of Identity Theft on Demographics.

There are no comments for this item.

to post a comment.

Powered by Koha