Booktopia has been placed into Voluntary Administration. Orders have been temporarily suspended, whilst the process for the recapitalisation of Booktopia and/or sale of its business is completed, following which services may be re-established. All enquiries from creditors, including customers with outstanding gift cards and orders and placed prior to 3 July 2024, please visit https://www.mcgrathnicol.com/creditors/booktopia-group/
Add free shipping to your order with these great books
Trusted Data, revised and expanded edition : A New Framework for Identity and Data Sharing - Thomas Hardjono

Trusted Data, revised and expanded edition

A New Framework for Identity and Data Sharing

By: Thomas Hardjono (Editor), David L. Shrier (Editor), Alex Pentland (Editor)

eBook | 12 November 2019

At a Glance

eBook


RRP $44.00

$35.99

18%OFF

or 4 interest-free payments of $9.00 with

Instant Digital Delivery to your Booktopia Reader App

How to create an Internet of Trusted Data in which insights from data can be extracted without collecting, holding, or revealing the underlying data.

Trusted Data describes a data architecture that places humans and their societal values at the center of the discussion. By involving people from all parts of the ecosystem of information, this new approach allows us to realize the benefits of data-driven algorithmic decision making while minimizing the risks and unintended consequences. It proposes a software architecture and legal framework for an Internet of Trusted Data that provides safe, secure access for everyone and protects against bias, unfairness, and other unintended effects. This approach addresses issues of data privacy, security, ownership, and trust by allowing insights to be extracted from data held by different people, companies, or governments without collecting, holding, or revealing the underlying data. The software architecture, called Open Algorithms, or OPAL, sends algorithms to databases rather than copying or sharing data. The data is protected by existing firewalls; only encrypted results are shared. Data never leaves its repository. A higher security architecture, ENIGMA, built on OPAL, is fully encrypted.

Contributors
Michiel Bakker, Yves-Alexandre de Montjoye, Daniel Greenwood, Thomas Hardjoni, Jake Kendall, Cameron Kerry, Bruno Lepri, Alexander Lipton, Takeo Nishikata, Alejandro Noriega-Campero, Nuria Oliver, Alex Pentland, David L. Shrier, Jacopo Staiano, Guy Zyskind

An MIT Connection Science and Engineering Book

on

More in Data Encryption

Android Malware Detection and Adversarial Methods - Weina Niu

eBOOK