Trusted data : (Record no. 73614)

000 -LEADER
fixed length control field 03698nam a2200541 i 4500
001 - CONTROL NUMBER
control field 8900792
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220712204943.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 200313s2020 mau ob 001 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9780262356053
-- electronic bk.
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
-- electronic bk.
082 04 - CLASSIFICATION NUMBER
Call Number 005.8/3
245 00 - TITLE STATEMENT
Title Trusted data :
Sub Title a new framework for identity and data sharing /
250 ## - EDITION STATEMENT
Edition statement Revised and expanded edition.
300 ## - PHYSICAL DESCRIPTION
Number of Pages 1 PDF (288 pages).
490 1# - SERIES STATEMENT
Series statement MIT Connection Science & Engineering
520 ## - SUMMARY, ETC.
Summary, etc How to create an Internet of Trusted Data in which insights from data can be extracted without collecting, holding, or revealing the underlying data. Trusted Data describes a data architecture that places humans and their societal values at the center of the discussion. By involving people from all parts of the ecosystem of information, this new approach allows us to realize the benefits of data-driven algorithmic decision making while minimizing the risks and unintended consequences. It proposes a software architecture and legal framework for an Internet of Trusted Data that provides safe, secure access for everyone and protects against bias, unfairness, and other unintended effects. This approach addresses issues of data privacy, security, ownership, and trust by allowing insights to be extracted from data held by different people, companies, or governments without collecting, holding, or revealing the underlying data. The software architecture, called Open Algorithms, or OPAL, sends algorithms to databases rather than copying or sharing data. The data is protected by existing firewalls; only encrypted results are shared. Data never leaves its repository. A higher security architecture, ENIGMA, built on OPAL, is fully encrypted. Contributors /Michiel Bakker, Yves-Alexandre de Montjoye, Daniel Greenwood, Thomas Hardjoni, Jake Kendall, Cameron Kerry, Bruno Lepri, Alexander Lipton, Takeo Nishikata, Alejandro Noriega-Campero, Nuria Oliver, Alex Pentland, David L. Shrier, Jacopo Staiano, Guy Zyskind An MIT Connection Science and Engineering Book.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Economic aspects.
700 1# - AUTHOR 2
Author 2 Hardjono, Thomas,
700 1# - AUTHOR 2
Author 2 Shrier, David L.,
700 1# - AUTHOR 2
Author 2 Pentland, Alex,
856 42 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=8900792
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Cambridge :
-- MIT Press,
-- 2019.
264 #2 -
-- [Piscataqay, New Jersey] :
-- IEEE Xplore,
-- [2019]
336 ## -
-- text
-- rdacontent
337 ## -
-- electronic
-- isbdmedia
338 ## -
-- online resource
-- rdacarrier
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Electronic data interchange
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data transmission systems.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Trust

No items available.