| 000 | 02936nam a22005175i 4500 | ||
|---|---|---|---|
| 001 | 978-3-642-17303-5 | ||
| 003 | DE-He213 | ||
| 005 | 20140220084550.0 | ||
| 007 | cr nn 008mamaa | ||
| 008 | 101117s2010 gw | s |||| 0|eng d | ||
| 020 |
_a9783642173035 _9978-3-642-17303-5 |
||
| 024 | 7 |
_a10.1007/978-3-642-17303-5 _2doi |
|
| 050 | 4 | _aQA76.9.D35 | |
| 072 | 7 |
_aUMB _2bicssc |
|
| 072 | 7 |
_aURY _2bicssc |
|
| 072 | 7 |
_aCOM031000 _2bisacsh |
|
| 082 | 0 | 4 |
_a005.74 _223 |
| 100 | 1 |
_aLeeuw, Elisabeth. _eeditor. |
|
| 245 | 1 | 0 |
_aPolicies and Research in Identity Management _h[electronic resource] : _bSecond IFIP WG 11.6 Working Conference, IDMAN 2010, Oslo, Norway, November 18-19, 2010. Proceedings / _cedited by Elisabeth Leeuw, Simone Fischer-Hübner, Lothar Fritsch. |
| 264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2010. |
|
| 300 |
_aX, 145p. 39 illus. _bonline resource. |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 347 |
_atext file _bPDF _2rda |
||
| 490 | 1 |
_aIFIP Advances in Information and Communication Technology, _x1868-4238 ; _v343 |
|
| 505 | 0 | _aPolicies and Research in Identity Management -- Mixing Identities with Ease -- Using CardSpace as a Password Manager -- Foreign Identities in the Austrian E-Government -- Understanding the Economics of Electronic Identity: Theoretical Approaches and Case Studies -- Profitable Investments Mitigating Privacy Risks -- A Security Analysis of OpenID -- Personal Federation Control with the Identity Dashboard -- The Plateau: Imitation Attack Resistance of Gait Biometrics -- Privacy-Friendly Incentives and Their Application to Wikipedia -- Policy Provisioning for Distributed Identity Management Systems. | |
| 520 | _aThis book constitutes the refereed proceedings of the Second IFIP WG 11.6 Working Conference on Policies and Research in Identity Management, IDMAN 2010, held in Oslo, Norway, in November 2010. The 10 thoroughly refereed papers presented were selected from numerous submissions. They focus on identity management in general and surveillance and monitoring in particular. | ||
| 650 | 0 | _aComputer science. | |
| 650 | 0 | _aData structures (Computer science). | |
| 650 | 0 | _aBiometrics. | |
| 650 | 0 | _aInformation Systems. | |
| 650 | 1 | 4 | _aComputer Science. |
| 650 | 2 | 4 | _aData Structures, Cryptology and Information Theory. |
| 650 | 2 | 4 | _aBiometrics. |
| 650 | 2 | 4 | _aManagement of Computing and Information Systems. |
| 700 | 1 |
_aFischer-Hübner, Simone. _eeditor. |
|
| 700 | 1 |
_aFritsch, Lothar. _eeditor. |
|
| 710 | 2 | _aSpringerLink (Online service) | |
| 773 | 0 | _tSpringer eBooks | |
| 776 | 0 | 8 |
_iPrinted edition: _z9783642173028 |
| 830 | 0 |
_aIFIP Advances in Information and Communication Technology, _x1868-4238 ; _v343 |
|
| 856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-642-17303-5 |
| 912 | _aZDB-2-SCS | ||
| 999 |
_c112904 _d112904 |
||