Buch, Englisch, Band 6545, 775 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 1631 g
Buch, Englisch, Band 6545, 775 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 1631 g
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-642-19049-0
Verlag: Springer
As the first coherent presentation of the topic, this book will serve as a valuable source of reference and inspiration for anybody working on digital privacy.
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik EDV & Informatik Allgemein Rechtliche Aspekte der EDV
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Netzwerksicherheit
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Kryptologie, Informationssicherheit
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Datensicherheit, Datenschutz
- Rechtswissenschaften Wirtschaftsrecht Medienrecht Telekommunikationsrecht, IT-Recht, Internetrecht
Weitere Infos & Material
Part I Privacy and Identity Management.- An Introduction to Privacy-Enhancing Identity Management.- Part II Setting the Stage.- The Identity Landscape.- The Need for Privacy-Enhancing Identity Management.- Regulating Identity Management.- User-Centric Privacy-Enhancing Identity Management.- Privacy-Enhancing Identity Management in Business.- Part III What Technology Can Do for Privacy and How.- Introduction: Privacy, Trust, and Identity Management.- Architecture.- Pseudonyms and Private Credentials.- Privacy Models and Languages: Access Control and Data.- Privacy Models and Languages: Obligation Policies.- Privacy Models and Languages: Assurance Checking.- Privacy-Aware Access Control System.- Privacy-Aware Identity Lifecycle Management.- Privacy Assurance Checking.- Security/Trustworthiness Assessment of Platforms.- Further Privacy Mechanisms.- Reputation Management.- Human-Computer Interaction.- Technology Assurance.- Multilateral Interactions.- Part IV PRIME Applied.- Collaborative E-Learning.- Location-Based Services.- e-Health.- Airport Security Controls.- Privacy and Identity Management Requirements.- Part V Conclusion and Outlook.