Privacy and Identity Management for Life: 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Helsingborg, Sweden, August 2-6, 2010, Revised Selected PapersSimone Fischer-Hübner, Penny Duquenoy, Marit Hansen, Ronald Leenes, Ge Zhang Springer Science & Business Media, 21 apr 2011 - 356 pagina's This book constitutes the thoroughly refereed post conference proceedings of the 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, held in Helsingborg, Sweden, in August 2010. The 27 revised papers were carefully selected from numerous submissions during two rounds of reviewing. They are organized in topical sections on terminology, privacy metrics, ethical, social, and legal aspects, data protection and identity management, eID cards and eID interoperability, emerging technologies, privacy for eGovernment and AAL applications, social networks and privacy, privacy policies, and usable privacy. |
Overige edities - Alles bekijken
Privacy and Identity Management for Life: 6th IFIP WG 9.2, 9.6/11.7, 11.4 ... Simone Fischer-Hübner,Penny Duquenoy,Marit Hansen,Ronald Leenes,Ge Zhang Geen voorbeeld beschikbaar - 2013 |
Veelvoorkomende woorden en zinsdelen
access control AICT allows analysis anonymous application approach attacker attributes authentication behaviour bugs communication concept consent and revocation context contract data controller data protection data subject defined design patterns developed digital world disclosure e-ID e-IDMS end-user enforcement entities ethical ETICA evaluation example Facebook Fischer-Hübner function function creep game theory Hoare logic icons identify identity management identity providers IDMS IFIP implementation individual interaction Internet issues mobile phone obligations online bookstore online privacy paper passwords personal data personal information players policy languages PrimeLife Privacy and Identity privacy and security privacy policy privacy settings processing of personal protocol pseudonym purpose Replay attacks requirements RFID RFID systems right to identity robots scenario security risks service provider smart card social networking sites solution specific sticky policies stored technical third parties token tracking uncanny valley user’s web bugs webshop XACML