Cargando…

Digital Privacy PRIME - Privacy and Identity Management for Europe /

This book documents the R&D outcome of the PRIME Project, an R&D project partially funded by the European Union's Sixth Framework Programme and the Swiss Federal Office for Education and Science.  PRIME has focused on privacy-enhancing identity management techniques and systems to suppo...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Camenisch, Jan (Editor ), Leenes, Ronald (Editor ), Sommer, Dieter (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2011.
Edición:1st ed. 2011.
Colección:Security and Cryptology ; 6545
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-3-642-19050-6
003 DE-He213
005 20220114183316.0
007 cr nn 008mamaa
008 110412s2011 gw | s |||| 0|eng d
020 |a 9783642190506  |9 978-3-642-19050-6 
024 7 |a 10.1007/978-3-642-19050-6  |2 doi 
050 4 |a QA76.9.C66 
072 7 |a UBJ  |2 bicssc 
072 7 |a COM079000  |2 bisacsh 
072 7 |a UBJ  |2 thema 
082 0 4 |a 303.4834  |2 23 
245 1 0 |a Digital Privacy  |h [electronic resource] :  |b PRIME - Privacy and Identity Management for Europe /  |c edited by Jan Camenisch, Ronald Leenes, Dieter Sommer. 
250 |a 1st ed. 2011. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2011. 
300 |a 800 p. 105 illus., 58 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Security and Cryptology ;  |v 6545 
505 0 |a Part I Privacy and Identity Management -- An Introduction to Privacy-Enhancing Identity Management -- Part II Setting the Stage -- The Identity Landscape -- The Need for Privacy-Enhancing Identity Management -- Regulating Identity Management -- User-Centric Privacy-Enhancing Identity Management -- Privacy-Enhancing Identity Management in Business -- Part III What Technology Can Do for Privacy and How -- Introduction: Privacy, Trust, and Identity Management -- Architecture -- Pseudonyms and Private Credentials -- Privacy Models and Languages: Access Control and Data -- Privacy Models and Languages: Obligation Policies -- Privacy Models and Languages: Assurance Checking -- Privacy-Aware Access Control System -- Privacy-Aware Identity Lifecycle Management -- Privacy Assurance Checking -- Security/Trustworthiness Assessment of Platforms -- Further Privacy Mechanisms -- Reputation Management -- Human-Computer Interaction -- Technology Assurance -- Multilateral Interactions -- Part IV PRIME Applied -- Collaborative E-Learning -- Location-Based Services -- e-Health -- Airport Security Controls -- Privacy and Identity Management Requirements -- Part V Conclusion and Outlook. 
520 |a This book documents the R&D outcome of the PRIME Project, an R&D project partially funded by the European Union's Sixth Framework Programme and the Swiss Federal Office for Education and Science.  PRIME has focused on privacy-enhancing identity management techniques and systems to support users' sovereignty over their personal privacy and enterprises' privacy-compliant data processing. During the course of four years, the project has involved over a hundred researchers and professionals from 22 major European academic and industrial organizations conducting R&D work in areas relevant to digital privacy. The book presents 28 detailed chapters organized in five parts: -       Introductory summary -       Legal, social, and economic aspects -       Realization of privacy-enhancing user-centric identity management -       Exploitation of PRIME results for applications -       Conclusions drawn and an outlook on future work As the first coherent presentation of the topic, this book will serve as a valuable source of reference and inspiration for anybody working on digital privacy. 
650 0 |a Computers and civilization. 
650 0 |a Electronic data processing-Management. 
650 0 |a Application software. 
650 0 |a Computer science. 
650 0 |a Information technology-Management. 
650 0 |a Cryptography. 
650 0 |a Data encryption (Computer science). 
650 1 4 |a Computers and Society. 
650 2 4 |a IT Operations. 
650 2 4 |a Computer and Information Systems Applications. 
650 2 4 |a Models of Computation. 
650 2 4 |a Computer Application in Administrative Data Processing. 
650 2 4 |a Cryptology. 
700 1 |a Camenisch, Jan.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Leenes, Ronald.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Sommer, Dieter.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783642190490 
776 0 8 |i Printed edition:  |z 9783642190513 
830 0 |a Security and Cryptology ;  |v 6545 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-3-642-19050-6  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)