Cargando…

Privacy and Identity Management for Emerging Services and Technologies 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers /

This book contains a range of keynote papers and submitted papers presented at the 7th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, held in Nijmegen, The Netherlands, in June 2013. The 13 revised full papers and 6 keynote papers included in this volume were carefully selected...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Hansen, Marit (Editor ), Hoepman, Jaap-Henk (Editor ), Leenes, Ronald (Editor ), Whitehouse, Diane (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2014.
Edición:1st ed. 2014.
Colección:IFIP AICT Tutorials ; 421
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-3-642-55137-6
003 DE-He213
005 20230603014658.0
007 cr nn 008mamaa
008 140502s2014 gw | s |||| 0|eng d
020 |a 9783642551376  |9 978-3-642-55137-6 
024 7 |a 10.1007/978-3-642-55137-6  |2 doi 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a UTN  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a UR  |2 thema 
072 7 |a UTN  |2 thema 
082 0 4 |a 005.8  |2 23 
245 1 0 |a Privacy and Identity Management for Emerging Services and Technologies  |h [electronic resource] :  |b 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers /  |c edited by Marit Hansen, Jaap-Henk Hoepman, Ronald Leenes, Diane Whitehouse. 
250 |a 1st ed. 2014. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2014. 
300 |a XII, 249 p. 41 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a IFIP AICT Tutorials ;  |v 421 
505 0 |a Two of the Grand Changes through Computer and Network Technology -- The Draft Data Protection Regulation and the Development of Data Processing Applications -- Privacy Management and Accountability in Global Organisations -- Concepts Around Privacy-Preserving Attribute-Based Credentials: Making Authentication with Anonymous Credentials Practical -- Privacy Respecting ICT Innovations in Education: Electronic Course Evaluations in Higher Education and Beyond -- How can Cloud Users be Supported in Deciding on, Tracking and Controlling How their Data are Used? -- Privacy Versus Collective Security: Drivers and Barriers Behind a Trade-off -- Privacy in the Life-Cycle of IT Services - An Investigation of Process Reference Models -- Forgetting Bits and Pieces: An Exploration of the "Right to Be Forgotten" as Implementation of "Forgetting" in Online Memory Processes -- An Advanced, Privacy-Friendly Loyalty System -- Securus: From Confidentiality and Access Requirements to Data Outsourcing Solutions -- Problem-Based Consideration of Privacy-Relevant Domain Knowledge -- Extending Signatures of Reputation -- Preserving Privacy in Production -- User Search with Knowledge Thresholds in Decentralized Online Social Networks -- An Explorative Mapping of the Belgian Social Media Marketing Value Network and Its Usage of Personal Identifiable Information -- Privacy Issues in Cross-Border Identity Management Systems: Pan-European Case -- Constructing Security: Reflections on the Margins of a Case Study of the Use of Electronic Identification in ICT Platforms in Schools -- Mobile Devices to the Identity Rescue. 
520 |a This book contains a range of keynote papers and submitted papers presented at the 7th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, held in Nijmegen, The Netherlands, in June 2013. The 13 revised full papers and 6 keynote papers included in this volume were carefully selected from a total of 30 presentations and 11 keynote talks and were subject to a two-step review process. The keynote papers cover the dramatic global changes, including legislative developments that society is facing today. Privacy and identity management are explored in specific settings, such as the corporate context, civic society, and education and using particular technologies such as cloud computing. The regular papers examine the challenges to privacy, security and identity; ways of preserving privacy; identity and identity management and the particular challenges presented by social media. 
650 0 |a Data protection. 
650 0 |a Electronic data processing-Management. 
650 0 |a Computers and civilization. 
650 1 4 |a Data and Information Security. 
650 2 4 |a IT Operations. 
650 2 4 |a Computers and Society. 
700 1 |a Hansen, Marit.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Hoepman, Jaap-Henk.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Leenes, Ronald.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Whitehouse, Diane.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783642551369 
776 0 8 |i Printed edition:  |z 9783642551383 
776 0 8 |i Printed edition:  |z 9783662525722 
830 0 |a IFIP AICT Tutorials ;  |v 421 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-3-642-55137-6  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)