|
|
|
|
| LEADER |
05389nam a22003973i 4500 |
| 001 |
EBC6191379 |
| 003 |
MiAaPQ |
| 005 |
20231204023214.0 |
| 006 |
m o d | |
| 007 |
cr cnu|||||||| |
| 008 |
231204s2020 xx o ||||0 eng d |
| 020 |
|
|
|a 9789811536540
|q (electronic bk.)
|
| 020 |
|
|
|z 9789811536533
|
| 035 |
|
|
|a (MiAaPQ)EBC6191379
|
| 035 |
|
|
|a (Au-PeEL)EBL6191379
|
| 035 |
|
|
|a (OCoLC)1153062197
|
| 040 |
|
|
|a MiAaPQ
|b eng
|e rda
|e pn
|c MiAaPQ
|d MiAaPQ
|
| 050 |
|
4 |
|a QA76.9.A25
|
| 100 |
1 |
|
|a Miyaji, Atsuko.
|
| 245 |
1 |
0 |
|a Security Infrastructure Technology for Integrated Utilization of Big Data :
|b Applied to the Living Safety and Medical Fields.
|
| 250 |
|
|
|a 1st ed.
|
| 264 |
|
1 |
|a Singapore :
|b Springer Singapore Pte. Limited,
|c 2020.
|
| 264 |
|
4 |
|c Ã2020.
|
| 300 |
|
|
|a 1 online resource (171 pages)
|
| 336 |
|
|
|a text
|b txt
|2 rdacontent
|
| 337 |
|
|
|a computer
|b c
|2 rdamedia
|
| 338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
| 505 |
0 |
|
|a Intro -- Foreword -- Preface -- Contents -- 1 Introduction -- 1.1 Purpose of Miyaji-CREST -- 1.2 Roles of Each Group -- 1.2.1 Security Core Group -- 1.2.2 Security Management Group -- 1.2.3 Living Safety Testbed Group -- 1.2.4 Health Testbed Group -- 2 Cryptography Core Technology -- 2.1 Analysis on ECDLP -- 2.1.1 Introduction -- 2.1.2 Previous Works -- 2.1.3 Montgomery and Hessian Curves -- 2.1.4 Experiments on PDP Solving -- 2.1.5 Analysis -- 2.1.6 Concluding Remarks -- 2.2 Analysis on Ring-LWE over Decomposition Fields -- 2.2.1 Introduction -- 2.2.2 Preliminaries -- 2.2.3 Ring-LWE over Cyclotomic and Decomposition Fields -- 2.2.4 Our Experimental Analysis -- References -- 3 Secure Primitive for Big Data Utilization -- 3.1 Privacy-Preserving Data Integration -- 3.1.1 Introduction -- 3.1.2 Preliminaries -- 3.1.3 Previous Work -- 3.1.4 Practical MPSI -- 3.1.5 Efficiency -- 3.1.6 System and Performance -- 3.2 Classification -- 3.2.1 Error-Correcting Code -- 3.2.2 Security Assumptions -- 3.2.3 Security Requirements for 2PC -- 3.2.4 HQC Encryption Scheme -- 3.2.5 Proposed Protocol -- 3.2.6 Support Vector Machine from Secure Linear Function Evaluation and Secure Comparison -- References -- 4 Secure Data Management Technology -- 4.1 Introduction -- 4.2 Anonymization Techniques and Adversary Models, Revisited -- 4.2.1 k-Anonymization -- 4.2.2 Noise Addition -- 4.2.3 K-Anonymization for Combined Datasets -- 4.2.4 Matrix Factorization for Time-Sequence Data -- 4.2.5 Anonymization Techniques for User History Graphs -- 4.2.6 Other Notions -- 4.2.7 Combination of Anonymization Techniques -- 4.3 (p, N)-Identifiability -- 4.3.1 Common Adversary Model -- 4.3.2 Success Probability Analysis Based on the Common Adversary Model -- 4.3.3 Experiment -- 4.3.4 Results -- 4.4 Extension to Time-Sequence Data -- 4.4.1 Privacy Definition -- 4.4.2 Utility Definition.
|
| 505 |
8 |
|
|a 4.4.3 Matrix Factorization -- 4.4.4 Anonymization Using Matrix Factorization -- 4.4.5 Experiment -- 4.4.6 Results -- 4.5 Anonymization and Privacy Risk Evaluation Tool -- 4.6 Conclusion -- References -- 5 Living Safety Testbed Group -- 5.1 Necessity of Living Safety -- 5.2 Overview of Test Bed System for Living Safety -- 5.3 Severity Cliff Analysis of School Injury -- 5.3.1 Development of Severity Cliff Analysis System -- 5.3.2 Severity Cliff Analysis -- 5.4 Trend Analysis of School Injury -- 5.4.1 Trend Analysis for Evaluating Intervention -- 5.4.2 Analysis of Judo Accident -- 5.5 Childhood Home-Injury Simulation -- 5.5.1 Background of Simulation -- 5.5.2 Home-Injury-Situation Simulation System -- 5.5.3 Development Behavior Prediction Function -- 5.5.4 Accident Situation Search Function -- 5.5.5 Similar-Risk-Product Classification Function -- 5.5.6 Simulation Example of the Accident Situation -- 5.5.7 System Verification -- 5.6 Social Impact Engagement Based on Big Data Analysis in Cooperation with Multiple Stakeholders -- 5.6.1 Engagement for Preventing Soccer Goal Turnover -- 5.6.2 Engagement for Preventing Vaulting Box Accidents -- 5.7 Conclusion -- References -- 6 Health Test Bed Group -- 6.1 Overview of Legislation and Standardization for the Secondary Use of Electronic Medical Records -- 6.1.1 Personal Information Protection Act and Next-Generation Medical Infrastructure Act -- 6.1.2 Ethical Guidelines and Anonymization of Medical Information -- 6.1.3 Standardization of EMRs -- 6.2 Medical Test Bed Concepts and Requirements -- 6.3 Features and Implementations of Secondary Use Infrastructure Development -- 6.3.1 SS-MIX2 Standardized Storage -- 6.3.2 Secure Collection of Distributed Medical Information -- 6.3.3 Privacy Risk Assessment of Extracted Datasets -- 6.3.4 Secondary Use and Traceability -- 6.4 Integration and Prospects -- References.
|
| 588 |
|
|
|a Description based on publisher supplied metadata and other sources.
|
| 590 |
|
|
|a Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2023. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
|
| 655 |
|
4 |
|a Electronic books.
|
| 700 |
1 |
|
|a Mimoto, Tomoaki.
|
| 776 |
0 |
8 |
|i Print version:
|a Miyaji, Atsuko
|t Security Infrastructure Technology for Integrated Utilization of Big Data
|d Singapore : Springer Singapore Pte. Limited,c2020
|z 9789811536533
|
| 797 |
2 |
|
|a ProQuest (Firm)
|
| 856 |
4 |
0 |
|u https://ebookcentral.proquest.com/lib/matrademy/detail.action?docID=6191379
|z Click to View
|