000 | 03698nam a2200541 i 4500 | ||
---|---|---|---|
001 | 8900792 | ||
003 | IEEE | ||
005 | 20220712204943.0 | ||
006 | m o d | ||
007 | cr |n||||||||| | ||
008 | 200313s2020 mau ob 001 eng d | ||
020 |
_a9780262356053 _qelectronic bk. |
||
020 |
_z0262356058 _qelectronic bk. |
||
020 | _z9780262043212 | ||
020 | _z0262043211 | ||
035 | _a(CaBNVSL)mat08900792 | ||
035 | _a(IDAMS)0b0000648b9621f9 | ||
040 |
_aCaBNVSL _beng _erda _cCaBNVSL _dCaBNVSL |
||
050 | 4 |
_aHF5548.37 _b.T79 2019eb |
|
082 | 0 | 4 |
_a005.8/3 _223 |
245 | 0 | 0 |
_aTrusted data : _ba new framework for identity and data sharing / _cedited by Thomas Hardjono, David L. Shrier, and Alex Pentland. |
250 | _aRevised and expanded edition. | ||
264 | 1 |
_aCambridge : _bMIT Press, _c2019. |
|
264 | 2 |
_a[Piscataqay, New Jersey] : _bIEEE Xplore, _c[2019] |
|
300 | _a1 PDF (288 pages). | ||
336 |
_atext _2rdacontent |
||
337 |
_aelectronic _2isbdmedia |
||
338 |
_aonline resource _2rdacarrier |
||
490 | 1 | _aMIT Connection Science & Engineering | |
504 | _aIncludes bibliographical references and index. | ||
506 | _aRestricted to subscribers or individual electronic text purchasers. | ||
520 | _aHow to create an Internet of Trusted Data in which insights from data can be extracted without collecting, holding, or revealing the underlying data. Trusted Data describes a data architecture that places humans and their societal values at the center of the discussion. By involving people from all parts of the ecosystem of information, this new approach allows us to realize the benefits of data-driven algorithmic decision making while minimizing the risks and unintended consequences. It proposes a software architecture and legal framework for an Internet of Trusted Data that provides safe, secure access for everyone and protects against bias, unfairness, and other unintended effects. This approach addresses issues of data privacy, security, ownership, and trust by allowing insights to be extracted from data held by different people, companies, or governments without collecting, holding, or revealing the underlying data. The software architecture, called Open Algorithms, or OPAL, sends algorithms to databases rather than copying or sharing data. The data is protected by existing firewalls; only encrypted results are shared. Data never leaves its repository. A higher security architecture, ENIGMA, built on OPAL, is fully encrypted. Contributors /Michiel Bakker, Yves-Alexandre de Montjoye, Daniel Greenwood, Thomas Hardjoni, Jake Kendall, Cameron Kerry, Bruno Lepri, Alexander Lipton, Takeo Nishikata, Alejandro Noriega-Campero, Nuria Oliver, Alex Pentland, David L. Shrier, Jacopo Staiano, Guy Zyskind An MIT Connection Science and Engineering Book. | ||
530 | _aAlso available in print. | ||
538 | _aMode of access: World Wide Web | ||
650 | 0 |
_aElectronic data interchange _xSecurity measures. _925750 |
|
650 | 0 |
_aData transmission systems. _96868 |
|
650 | 0 |
_aTrust _xEconomic aspects. _915291 |
|
655 | 4 |
_aElectronic books. _93294 |
|
700 | 1 |
_aHardjono, Thomas, _eeditor. _925751 |
|
700 | 1 |
_aShrier, David L., _eeditor. _925752 |
|
700 | 1 |
_aPentland, Alex, _d1952- _eeditor. _925753 |
|
710 | 2 |
_aIEEE Xplore (Online Service), _edistributor. _925754 |
|
710 | 2 |
_aMIT Press, _epublisher. _925755 |
|
776 | 0 | 8 |
_iPrint version: _tTrusted data. _bRevised and expanded edition _z9780262043212 _w(DLC) 2019006325 _w(OCoLC)1086524517 |
830 | 0 |
_aMIT connection science & engineering. _925756 |
|
856 | 4 | 2 |
_3Abstract with links to resource _uhttps://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=8900792 |
942 | _cEBK | ||
999 |
_c73614 _d73614 |