|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-319-31456-3 |
003 |
DE-He213 |
005 |
20220112160819.0 |
007 |
cr nn 008mamaa |
008 |
160309s2016 sz | s |||| 0|eng d |
020 |
|
|
|a 9783319314563
|9 978-3-319-31456-3
|
024 |
7 |
|
|a 10.1007/978-3-319-31456-3
|2 doi
|
050 |
|
4 |
|a QA76.9.C66
|
072 |
|
7 |
|a UBJ
|2 bicssc
|
072 |
|
7 |
|a COM079000
|2 bisacsh
|
072 |
|
7 |
|a UBJ
|2 thema
|
082 |
0 |
4 |
|a 303.4834
|2 23
|
245 |
1 |
0 |
|a Privacy Technologies and Policy
|h [electronic resource] :
|b Third Annual Privacy Forum, APF 2015, Luxembourg, Luxembourg, October 7-8, 2015, Revised Selected Papers /
|c edited by Bettina Berendt, Thomas Engel, Demosthenes Ikonomou, Daniel Le Métayer, Stefan Schiffner.
|
250 |
|
|
|a 1st ed. 2016.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2016.
|
300 |
|
|
|a XIV, 213 p. 35 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 9484
|
505 |
0 |
|
|a Privacy by design (PbD) -- Attempt to combine technical and organizational measures to ensure the basic rights of the individual -- Measuring privacy -- Rules and principles -- Legal and economic perspectives on privacy.
|
520 |
|
|
|a This book constitutes the thoroughly refereed post-conference proceedings of the Third Annual Privacy Forum, APF 2015, held in Luxembourg, Luxembourg, in October 2015. The 11 revised full papers presented in this volume were carefully reviewed and selected from 24 submissions. The topics focus on privacy by design (PbD), i.e. the attempt to combine technical and organizational measures to ensure the basic rights of the individual. The papers are organized in three sessions: measuring privacy; rules and principles; legal and economic perspectives on privacy.
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Electronic commerce.
|
650 |
|
0 |
|a Application software.
|
650 |
|
0 |
|a Algorithms.
|
650 |
1 |
4 |
|a Computers and Society.
|
650 |
2 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a e-Commerce and e-Business.
|
650 |
2 |
4 |
|a Computer and Information Systems Applications.
|
650 |
2 |
4 |
|a Algorithms.
|
700 |
1 |
|
|a Berendt, Bettina.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Engel, Thomas.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Ikonomou, Demosthenes.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Le Métayer, Daniel.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Schiffner, Stefan.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319314556
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319314570
|
830 |
|
0 |
|a Security and Cryptology ;
|v 9484
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-319-31456-3
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|