Privacy Technologies and Policy (Record no. 57985)

000 -LEADER
fixed length control field 03293nam a22005295i 4500
001 - CONTROL NUMBER
control field 978-3-319-06749-0
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200421112231.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 140515s2014 gw | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783319067490
-- 978-3-319-06749-0
082 04 - CLASSIFICATION NUMBER
Call Number 004
245 10 - TITLE STATEMENT
Title Privacy Technologies and Policy
Sub Title Second Annual Privacy Forum, APF 2014, Athens, Greece, May 20-21, 2014. Proceedings /
300 ## - PHYSICAL DESCRIPTION
Number of Pages XII, 191 p. 39 illus.
490 1# - SERIES STATEMENT
Series statement Lecture Notes in Computer Science,
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Privacy by Design: From Technologies to Architectures -- PEARs: Privacy Enhancing Architectures -- Privacy-Preserving Statistical Data Analysis on Federated Databases -- Privacy by Encrypted Databases -- Accountable Surveillance Practices: Is the EU Moving in the Right Direction? -- TAM-VS: A Technology Acceptance Model for Video Surveillance -- Towards a Multidisciplinary Framework to Include Privacy in the Design of Video Surveillance Systems -- A Framework for Privacy Analysis of ICN Architectures -- Auctioning Privacy-Sensitive Goods: A Note on Incentive-Compatibility -- Privacy-ABCs to Leverage Identity Management as a Service -- My Data, Your Data, Our Data: Managing Privacy Preferences in Multiple Subjects Personal Data -- Towards Electronic Identification and Trusted Services for Biometric Authenticated Transactions in the Single Euro Payments Area.
520 ## - SUMMARY, ETC.
Summary, etc This book constitutes the refereed proceedings of the Second Annual Privacy Forum, APF 2014, held in Athens, Greece, in May 2014. The 12 revised papers presented in this volume were carefully reviewed and selected from 21 submissions. The topics include: the concept and implementation of "privacy by design", with applications to encrypted databases; the study of video surveillance architectures and new networking concepts and innovative solutions for identity management. The papers address the technical, legal, and economic aspects of these problems.
700 1# - AUTHOR 2
Author 2 Preneel, Bart.
700 1# - AUTHOR 2
Author 2 Ikonomou, Demosthenes.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-3-319-06749-0
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Cham :
-- Springer International Publishing :
-- Imprint: Springer,
-- 2014.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer science.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer security.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computers and civilization.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- E-commerce.
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer Science.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computers and Society.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Systems and Data Security.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- e-Commerce/e-business.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Information Systems Applications (incl. Internet).
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
-- 0302-9743 ;
912 ## -
-- ZDB-2-SCS
912 ## -
-- ZDB-2-LNC

No items available.