Privacy and Identity Management for Emerging Services and Technologies 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers /
This book contains a range of keynote papers and submitted papers presented at the 7th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, held in Nijmegen, The Netherlands, in June 2013. The 13 revised full papers and 6 keynote papers included in this volume were carefully selected...
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , , , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2014.
|
Edición: | 1st ed. 2014. |
Colección: | IFIP AICT Tutorials ;
421 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Two of the Grand Changes through Computer and Network Technology
- The Draft Data Protection Regulation and the Development of Data Processing Applications
- Privacy Management and Accountability in Global Organisations
- Concepts Around Privacy-Preserving Attribute-Based Credentials: Making Authentication with Anonymous Credentials Practical
- Privacy Respecting ICT Innovations in Education: Electronic Course Evaluations in Higher Education and Beyond
- How can Cloud Users be Supported in Deciding on, Tracking and Controlling How their Data are Used?
- Privacy Versus Collective Security: Drivers and Barriers Behind a Trade-off
- Privacy in the Life-Cycle of IT Services - An Investigation of Process Reference Models
- Forgetting Bits and Pieces: An Exploration of the "Right to Be Forgotten" as Implementation of "Forgetting" in Online Memory Processes
- An Advanced, Privacy-Friendly Loyalty System
- Securus: From Confidentiality and Access Requirements to Data Outsourcing Solutions
- Problem-Based Consideration of Privacy-Relevant Domain Knowledge
- Extending Signatures of Reputation
- Preserving Privacy in Production
- User Search with Knowledge Thresholds in Decentralized Online Social Networks
- An Explorative Mapping of the Belgian Social Media Marketing Value Network and Its Usage of Personal Identifiable Information
- Privacy Issues in Cross-Border Identity Management Systems: Pan-European Case
- Constructing Security: Reflections on the Margins of a Case Study of the Use of Electronic Identification in ICT Platforms in Schools
- Mobile Devices to the Identity Rescue.