| 000 | 05142nam a22005895i 4500 | ||
|---|---|---|---|
| 001 | 978-3-642-14282-6 | ||
| 003 | DE-He213 | ||
| 005 | 20140220084541.0 | ||
| 007 | cr nn 008mamaa | ||
| 008 | 100628s2010 gw | s |||| 0|eng d | ||
| 020 |
_a9783642142826 _9978-3-642-14282-6 |
||
| 024 | 7 |
_a10.1007/978-3-642-14282-6 _2doi |
|
| 050 | 4 | _aTK5105.5-5105.9 | |
| 072 | 7 |
_aUKN _2bicssc |
|
| 072 | 7 |
_aCOM075000 _2bisacsh |
|
| 082 | 0 | 4 |
_a004.6 _223 |
| 100 | 1 |
_aBezzi, Michele. _eeditor. |
|
| 245 | 1 | 0 |
_aPrivacy and Identity Management for Life _h[electronic resource] : _b5th IFIP WG 9.2, 9.6/11.4, 11.6, 11.7/PrimeLife International Summer School, Nice, France, September 7-11, 2009, Revised Selected Papers / _cedited by Michele Bezzi, Penny Duquenoy, Simone Fischer-Hübner, Marit Hansen, Ge Zhang. |
| 264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2010. |
|
| 300 |
_aXI, 316p. 59 illus. _bonline resource. |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 347 |
_atext file _bPDF _2rda |
||
| 490 | 1 |
_aIFIP Advances in Information and Communication Technology, _x1868-4238 ; _v320 |
|
| 505 | 0 | _aLifelong Privacy -- Lifelong Privacy: Privacy and Identity Management for Life -- Delegation for Privacy Management from Womb to Tomb – A European Perspective -- Saving On-Line Privacy -- Priavcy for Social Network Sites and Collabrative Systems -- Context Is Everything Sociality and Privacy in Online Social Network Sites -- The Freddi Staurs of Social Networking – A Legal Approach -- Facebook and Its EU Users – Applicability of the EU Data Protection Law to US Based SNS -- On the Security and Feasibility of Safebook: A Distributed Privacy-Preserving Online Social Network -- Privacy-Respecting Access Control in Collaborative Workspaces -- Privacy for eGovernment Applications -- A Three-Dimensional Framework to Analyse the Governance of Population Registers -- Use of ePassport for Identity Management in Network-Based Citizen-Life Processes -- The Use of Privacy Enhancing Technologies for Biometric Systems Analysed from a Legal Perspective -- Privacy and Identity Management for eHealth and Ambient Assisted Living Applications -- Assuring Privacy of Medical Records in an Open Collaborative Environment - A Case Study of Walloon Region’s eHealth Platform -- Goal-Oriented Access Control Model for Ambient Assisted Living -- Anonymisation and Privacy-Enhancing Technologies -- Privacy of Outsourced Data -- Sharing Data for Public Security -- An Analysis for Anonymity and Unlinkability for a VoIP Conversation -- PRIvacy LEakage Methodology (PRILE) for IDS Rules -- Identity Management and Multilateral Security -- Digital Personae and Profiles as Representations of Individuals -- Anonymous Credentials in Web Applications -- Reaching for Informed Revocation: Shutting Off the Tap on Personal Data -- Multilateral Privacy in Clouds: Requirements for Use in Industry -- Usability, Awareness and Transparency Tools -- PET-USES: Privacy-Enhancing Technology – Users’ Self-Estimation Scale -- Addressing the Privacy Paradox by Expanded Privacy Awareness – The Example of Context-Aware Services -- Secure Logging of Retained Data for an Anonymity Service -- Adding Secure Transparency Logging to the PRIME Core. | |
| 520 | _aThis book constitutes the thoroughly refereed post conference proceedings of the 5th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, held in Nice, France, in September 2009. The 25 revised papers were carefully selected from numerous submissions during two rounds of reviewing. They are organized in topical sections on lifelong privacy, privacy for social network sites and collaborative systems, privacy for e-government applications, privacy and identity management for e-health and ambient assisted living applications, anonymisation and privacy-enhancing technologies, identity management and multilateral security, and usability, awareness and transparency tools. | ||
| 650 | 0 | _aComputer science. | |
| 650 | 0 | _aComputer Communication Networks. | |
| 650 | 0 | _aData encryption (Computer science). | |
| 650 | 0 | _aComputer software. | |
| 650 | 0 | _aInformation systems. | |
| 650 | 0 | _aInformation Systems. | |
| 650 | 1 | 4 | _aComputer Science. |
| 650 | 2 | 4 | _aComputer Communication Networks. |
| 650 | 2 | 4 | _aManagement of Computing and Information Systems. |
| 650 | 2 | 4 | _aData Encryption. |
| 650 | 2 | 4 | _aComputers and Society. |
| 650 | 2 | 4 | _aInformation Systems Applications (incl.Internet). |
| 650 | 2 | 4 | _aAlgorithm Analysis and Problem Complexity. |
| 700 | 1 |
_aDuquenoy, Penny. _eeditor. |
|
| 700 | 1 |
_aFischer-Hübner, Simone. _eeditor. |
|
| 700 | 1 |
_aHansen, Marit. _eeditor. |
|
| 700 | 1 |
_aZhang, Ge. _eeditor. |
|
| 710 | 2 | _aSpringerLink (Online service) | |
| 773 | 0 | _tSpringer eBooks | |
| 776 | 0 | 8 |
_iPrinted edition: _z9783642142819 |
| 830 | 0 |
_aIFIP Advances in Information and Communication Technology, _x1868-4238 ; _v320 |
|
| 856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-642-14282-6 |
| 912 | _aZDB-2-SCS | ||
| 999 |
_c112441 _d112441 |
||