000 03698nam a2200541 i 4500
001 8900792
003 IEEE
005 20220712204943.0
006 m o d
007 cr |n|||||||||
008 200313s2020 mau ob 001 eng d
020 _a9780262356053
_qelectronic bk.
020 _z0262356058
_qelectronic bk.
020 _z9780262043212
020 _z0262043211
035 _a(CaBNVSL)mat08900792
035 _a(IDAMS)0b0000648b9621f9
040 _aCaBNVSL
_beng
_erda
_cCaBNVSL
_dCaBNVSL
050 4 _aHF5548.37
_b.T79 2019eb
082 0 4 _a005.8/3
_223
245 0 0 _aTrusted data :
_ba new framework for identity and data sharing /
_cedited by Thomas Hardjono, David L. Shrier, and Alex Pentland.
250 _aRevised and expanded edition.
264 1 _aCambridge :
_bMIT Press,
_c2019.
264 2 _a[Piscataqay, New Jersey] :
_bIEEE Xplore,
_c[2019]
300 _a1 PDF (288 pages).
336 _atext
_2rdacontent
337 _aelectronic
_2isbdmedia
338 _aonline resource
_2rdacarrier
490 1 _aMIT Connection Science & Engineering
504 _aIncludes bibliographical references and index.
506 _aRestricted to subscribers or individual electronic text purchasers.
520 _aHow to create an Internet of Trusted Data in which insights from data can be extracted without collecting, holding, or revealing the underlying data. Trusted Data describes a data architecture that places humans and their societal values at the center of the discussion. By involving people from all parts of the ecosystem of information, this new approach allows us to realize the benefits of data-driven algorithmic decision making while minimizing the risks and unintended consequences. It proposes a software architecture and legal framework for an Internet of Trusted Data that provides safe, secure access for everyone and protects against bias, unfairness, and other unintended effects. This approach addresses issues of data privacy, security, ownership, and trust by allowing insights to be extracted from data held by different people, companies, or governments without collecting, holding, or revealing the underlying data. The software architecture, called Open Algorithms, or OPAL, sends algorithms to databases rather than copying or sharing data. The data is protected by existing firewalls; only encrypted results are shared. Data never leaves its repository. A higher security architecture, ENIGMA, built on OPAL, is fully encrypted. Contributors /Michiel Bakker, Yves-Alexandre de Montjoye, Daniel Greenwood, Thomas Hardjoni, Jake Kendall, Cameron Kerry, Bruno Lepri, Alexander Lipton, Takeo Nishikata, Alejandro Noriega-Campero, Nuria Oliver, Alex Pentland, David L. Shrier, Jacopo Staiano, Guy Zyskind An MIT Connection Science and Engineering Book.
530 _aAlso available in print.
538 _aMode of access: World Wide Web
650 0 _aElectronic data interchange
_xSecurity measures.
_925750
650 0 _aData transmission systems.
_96868
650 0 _aTrust
_xEconomic aspects.
_915291
655 4 _aElectronic books.
_93294
700 1 _aHardjono, Thomas,
_eeditor.
_925751
700 1 _aShrier, David L.,
_eeditor.
_925752
700 1 _aPentland, Alex,
_d1952-
_eeditor.
_925753
710 2 _aIEEE Xplore (Online Service),
_edistributor.
_925754
710 2 _aMIT Press,
_epublisher.
_925755
776 0 8 _iPrint version:
_tTrusted data.
_bRevised and expanded edition
_z9780262043212
_w(DLC) 2019006325
_w(OCoLC)1086524517
830 0 _aMIT connection science & engineering.
_925756
856 4 2 _3Abstract with links to resource
_uhttps://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=8900792
942 _cEBK
999 _c73614
_d73614