|
|
|
|
LEADER |
03882nmm a2200433 u 4500 |
001 |
EB000386168 |
003 |
EBX01000000000000000239220 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
130626 ||| eng |
020 |
|
|
|a 9783642190506
|
100 |
1 |
|
|a Camenisch, Jan
|e [editor]
|
245 |
0 |
0 |
|a Digital Privacy
|h Elektronische Ressource
|b PRIME - Privacy and Identity Management for Europe
|c edited by Jan Camenisch, Ronald Leenes, Dieter Sommer
|
250 |
|
|
|a 1st ed. 2011
|
260 |
|
|
|a Berlin, Heidelberg
|b Springer Berlin Heidelberg
|c 2011, 2011
|
300 |
|
|
|a 800 p. 105 illus., 58 illus. in color
|b online resource
|
505 |
0 |
|
|a Part I Privacy and Identity Management -- An Introduction to Privacy-Enhancing Identity Management -- Part II Setting the Stage -- The Identity Landscape -- The Need for Privacy-Enhancing Identity Management -- Regulating Identity Management -- User-Centric Privacy-Enhancing Identity Management -- Privacy-Enhancing Identity Management in Business -- Part III What Technology Can Do for Privacy and How -- Introduction: Privacy, Trust, and Identity Management -- Architecture -- Pseudonyms and Private Credentials -- Privacy Models and Languages: Access Control and Data -- Privacy Models and Languages: Obligation Policies -- Privacy Models and Languages: Assurance Checking -- Privacy-Aware Access Control System -- Privacy-Aware Identity Lifecycle Management -- Privacy Assurance Checking -- Security/Trustworthiness Assessment of Platforms -- Further Privacy Mechanisms -- Reputation Management -- Human-Computer Interaction -- Technology Assurance -- Multilateral Interactions -- Part IV PRIME Applied -- Collaborative E-Learning -- Location-Based Services -- e-Health -- Airport Security Controls -- Privacy and Identity Management Requirements -- Part V Conclusion and Outlook
|
653 |
|
|
|a Models of Computation
|
653 |
|
|
|a Computers and Society
|
653 |
|
|
|a Computer science
|
653 |
|
|
|a Cryptography
|
653 |
|
|
|a Electronic data processing / Management
|
653 |
|
|
|a Application software
|
653 |
|
|
|a Computer Application in Administrative Data Processing
|
653 |
|
|
|a Data encryption (Computer science)
|
653 |
|
|
|a Cryptology
|
653 |
|
|
|a Computer and Information Systems Applications
|
653 |
|
|
|a Information technology / Management
|
653 |
|
|
|a IT Operations
|
653 |
|
|
|a Computers and civilization
|
700 |
1 |
|
|a Leenes, Ronald
|e [editor]
|
700 |
1 |
|
|a Sommer, Dieter
|e [editor]
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b Springer
|a Springer eBooks 2005-
|
490 |
0 |
|
|a Security and Cryptology
|
028 |
5 |
0 |
|a 10.1007/978-3-642-19050-6
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-642-19050-6?nosfx=y
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 303.4834
|
520 |
|
|
|a This book documents the R&D outcome of the PRIME Project, an R&D project partially funded by the European Union’s Sixth Framework Programme and the Swiss Federal Office for Education and Science. PRIME has focused on privacy-enhancing identity management techniques and systems to support users’ sovereignty over their personal privacy and enterprises’ privacy-compliant data processing. During the course of four years, the project has involved over a hundred researchers and professionals from 22 major European academic and industrial organizations conducting R&D work in areas relevant to digital privacy. The book presents 28 detailed chapters organized in five parts: - Introductory summary - Legal, social, and economic aspects - Realization of privacy-enhancing user-centric identity management - Exploitation of PRIME results for applications - Conclusions drawn and an outlook on future work As the first coherent presentation of the topic, this book will serve as a valuable source of reference and inspiration for anybody working on digital privacy
|