Cargando…

Policies and Research in Identity Management First IFIP WG 11.6 Working Conference on Policies and Research in Identity Management (IDMAN'07), RSM Erasmus University, Rotterdam, The Netherlands, October 11-12, 2007 /

International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: de Leeuw, Elisabeth (Editor ), Fischer-Hübner, Simone (Editor ), Tseng, Jimmy C. (Editor ), Borking, John (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York, NY : Springer US : Imprint: Springer, 2008.
Edición:1st ed. 2008.
Colección:IFIP Advances in Information and Communication Technology, 261
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Analysis of Identification Schemes
  • Keynote Paper: Politics and Identity Management
  • Insecure Flight: Broken Boarding Passes and Ineffective Terrorist Watch Lists
  • Privacy and Identity Management
  • Context Based Enforcement of Authorization for Privacy and Security in Identity Management
  • Automated Privacy Audits to Complement the Notion of Control for Identity Management
  • Privacy Enhancing Technologies
  • Keynote Paper: Privacy and trust in the Information Society
  • Biometrics
  • Keynote Paper: Biometric Encryption: Technology for Strong Authentication, Security and Privacy
  • Investigating and Comparing Multimodal Biometric Techniques
  • BASE: a Proposed Secure Biometric Authentication System
  • Identity and Privacy Protection
  • Keynote Paper: Are State-Mediated Forms of Identification a Reaction to Physical Mobility? The case of England, 1500-2007
  • Privacy Risk Perceptions and Privacy Protection Strategies
  • A Contextual Method for Evaluating Privacy Preferences
  • Authentication
  • Implementing Strong Authentication Interoperability with Legacy Systems.