Privacy and Identity Management for the Future Internet in the Age of Globalisation 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Patras, Greece, September 7-12, 2014, Revised Selected Papers / [electronic resource] :
edited by Jan Camenisch, Simone Fischer-H�ubner, Marit Hansen.
- X, 267 p. 44 illus. online resource.
- IFIP Advances in Information and Communication Technology, 457 1868-4238 ; .
- IFIP Advances in Information and Communication Technology, 457 .
ABC4Trust: Protecting Privacy in Identity Management by Bringing Privacy-ABCs into Real-Life -- Towards an Engineering Model of Privacy-Related Decisions -- The Value of Personal Data -- Privacy and Security Perceptions of European Citizens: A Test of the Trade-Off Model -- Privacy and Confidentiality in Service Science and Big Data Analytics -- The Court of Justice of the European Union, Data Retention and the Rights to Data Protection and Privacy - Where Are We Now? -- EUROSUR - A Sci-fi Border Zone Patrolled by Drones? -- Anonymous e Petitions - Another Step Towards e Democracy -- A Brief Evaluation of Icons in the First Reading of the European Parliament on COM (2012) 0011 -- Privacy by Design - The Case of Automated Border Control -- Patterns in Privacy - A Pattern-Based Approach for Assessments -- A Survey on Multimodal Biometrics and the Protection of Their Templates -- Event Invitations in Privacy-Preserving DOSNs: Formalization and Protocol Design -- Blank Digital Signatures: Optimization and Practical Experiences -- Tools for Cloud Accountability: A4Cloud Tutorial -- Privacy for Peer Profiling in Collective Adaptive Systems -- ABC4Trust Workshop on Core Features of Privacy-ABCs, Practical Use and Legal Issues.
This book contains a range of keynote papers and submitted papers presented at the 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, held in Patras, Greece, in September 2014. The 9 revised full papers and 3 workshop papers included in this volume were carefully selected from a total of 29 submissions and were subject to a two-step review process. In addition, the volume contains 5 invited keynote papers. The regular papers are organized in topical sections on legal privacy aspects and technical concepts, privacy by design and privacy patterns and privacy technologies and protocols.
9783319186214
10.1007/978-3-319-18621-4 doi
Computer science.
Computer security.
Computers and civilization.
Management information systems.
Computer Science.
Systems and Data Security.
Management of Computing and Information Systems.
Computers and Society.
QA76.9.A25
005.8
ABC4Trust: Protecting Privacy in Identity Management by Bringing Privacy-ABCs into Real-Life -- Towards an Engineering Model of Privacy-Related Decisions -- The Value of Personal Data -- Privacy and Security Perceptions of European Citizens: A Test of the Trade-Off Model -- Privacy and Confidentiality in Service Science and Big Data Analytics -- The Court of Justice of the European Union, Data Retention and the Rights to Data Protection and Privacy - Where Are We Now? -- EUROSUR - A Sci-fi Border Zone Patrolled by Drones? -- Anonymous e Petitions - Another Step Towards e Democracy -- A Brief Evaluation of Icons in the First Reading of the European Parliament on COM (2012) 0011 -- Privacy by Design - The Case of Automated Border Control -- Patterns in Privacy - A Pattern-Based Approach for Assessments -- A Survey on Multimodal Biometrics and the Protection of Their Templates -- Event Invitations in Privacy-Preserving DOSNs: Formalization and Protocol Design -- Blank Digital Signatures: Optimization and Practical Experiences -- Tools for Cloud Accountability: A4Cloud Tutorial -- Privacy for Peer Profiling in Collective Adaptive Systems -- ABC4Trust Workshop on Core Features of Privacy-ABCs, Practical Use and Legal Issues.
This book contains a range of keynote papers and submitted papers presented at the 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, held in Patras, Greece, in September 2014. The 9 revised full papers and 3 workshop papers included in this volume were carefully selected from a total of 29 submissions and were subject to a two-step review process. In addition, the volume contains 5 invited keynote papers. The regular papers are organized in topical sections on legal privacy aspects and technical concepts, privacy by design and privacy patterns and privacy technologies and protocols.
9783319186214
10.1007/978-3-319-18621-4 doi
Computer science.
Computer security.
Computers and civilization.
Management information systems.
Computer Science.
Systems and Data Security.
Management of Computing and Information Systems.
Computers and Society.
QA76.9.A25
005.8