|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-319-06749-0 |
003 |
DE-He213 |
005 |
20220115064821.0 |
007 |
cr nn 008mamaa |
008 |
140515s2014 sz | s |||| 0|eng d |
020 |
|
|
|a 9783319067490
|9 978-3-319-06749-0
|
024 |
7 |
|
|a 10.1007/978-3-319-06749-0
|2 doi
|
050 |
|
4 |
|a QA76.9.C66
|
072 |
|
7 |
|a UBJ
|2 bicssc
|
072 |
|
7 |
|a COM079000
|2 bisacsh
|
072 |
|
7 |
|a UBJ
|2 thema
|
082 |
0 |
4 |
|a 303.4834
|2 23
|
245 |
1 |
0 |
|a Privacy Technologies and Policy
|h [electronic resource] :
|b Second Annual Privacy Forum, APF 2014, Athens, Greece, May 20-21, 2014, Proceedings /
|c edited by Bart Preneel, Demosthenes Ikonomou.
|
250 |
|
|
|a 1st ed. 2014.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2014.
|
300 |
|
|
|a XII, 191 p. 39 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 8450
|
505 |
0 |
|
|a Privacy by Design: From Technologies to Architectures -- PEARs: Privacy Enhancing Architectures -- Privacy-Preserving Statistical Data Analysis on Federated Databases -- Privacy by Encrypted Databases -- Accountable Surveillance Practices: Is the EU Moving in the Right Direction? -- TAM-VS: A Technology Acceptance Model for Video Surveillance -- Towards a Multidisciplinary Framework to Include Privacy in the Design of Video Surveillance Systems -- A Framework for Privacy Analysis of ICN Architectures -- Auctioning Privacy-Sensitive Goods: A Note on Incentive-Compatibility -- Privacy-ABCs to Leverage Identity Management as a Service -- My Data, Your Data, Our Data: Managing Privacy Preferences in Multiple Subjects Personal Data -- Towards Electronic Identification and Trusted Services for Biometric Authenticated Transactions in the Single Euro Payments Area.
|
520 |
|
|
|a This book constitutes the refereed proceedings of the Second Annual Privacy Forum, APF 2014, held in Athens, Greece, in May 2014. The 12 revised papers presented in this volume were carefully reviewed and selected from 21 submissions. The topics include: the concept and implementation of "privacy by design", with applications to encrypted databases; the study of video surveillance architectures and new networking concepts and innovative solutions for identity management. The papers address the technical, legal, and economic aspects of these problems.
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Electronic commerce.
|
650 |
|
0 |
|a Application software.
|
650 |
1 |
4 |
|a Computers and Society.
|
650 |
2 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a e-Commerce and e-Business.
|
650 |
2 |
4 |
|a Computer and Information Systems Applications.
|
700 |
1 |
|
|a Preneel, Bart.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Ikonomou, Demosthenes.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319067506
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319067483
|
830 |
|
0 |
|a Security and Cryptology ;
|v 8450
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-319-06749-0
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|