000 04872nam a22006495i 4500
001 978-3-642-19050-6
003 DE-He213
005 20240730191143.0
007 cr nn 008mamaa
008 110412s2011 gw | s |||| 0|eng d
020 _a9783642190506
_9978-3-642-19050-6
024 7 _a10.1007/978-3-642-19050-6
_2doi
050 4 _aQA76.9.C66
072 7 _aUBJ
_2bicssc
072 7 _aCOM079000
_2bisacsh
072 7 _aUBJ
_2thema
082 0 4 _a303.4834
_223
245 1 0 _aDigital Privacy
_h[electronic resource] :
_bPRIME - Privacy and Identity Management for Europe /
_cedited by Jan Camenisch, Ronald Leenes, Dieter Sommer.
250 _a1st ed. 2011.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2011.
300 _a800 p. 105 illus., 58 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v6545
505 0 _aPart I Privacy and Identity Management -- An Introduction to Privacy-Enhancing Identity Management -- Part II Setting the Stage -- The Identity Landscape -- The Need for Privacy-Enhancing Identity Management -- Regulating Identity Management -- User-Centric Privacy-Enhancing Identity Management -- Privacy-Enhancing Identity Management in Business -- Part III What Technology Can Do for Privacy and How -- Introduction: Privacy, Trust, and Identity Management -- Architecture -- Pseudonyms and Private Credentials -- Privacy Models and Languages: Access Control and Data -- Privacy Models and Languages: Obligation Policies -- Privacy Models and Languages: Assurance Checking -- Privacy-Aware Access Control System -- Privacy-Aware Identity Lifecycle Management -- Privacy Assurance Checking -- Security/Trustworthiness Assessment of Platforms -- Further Privacy Mechanisms -- Reputation Management -- Human-Computer Interaction -- Technology Assurance -- Multilateral Interactions -- Part IV PRIME Applied -- Collaborative E-Learning -- Location-Based Services -- e-Health -- Airport Security Controls -- Privacy and Identity Management Requirements -- Part V Conclusion and Outlook.
520 _aThis book documents the R&D outcome of the PRIME Project, an R&D project partially funded by the European Union's Sixth Framework Programme and the Swiss Federal Office for Education and Science.  PRIME has focused on privacy-enhancing identity management techniques and systems to support users' sovereignty over their personal privacy and enterprises' privacy-compliant data processing. During the course of four years, the project has involved over a hundred researchers and professionals from 22 major European academic and industrial organizations conducting R&D work in areas relevant to digital privacy. The book presents 28 detailed chapters organized in five parts: -       Introductory summary -       Legal, social, and economic aspects -       Realization of privacy-enhancing user-centric identity management -       Exploitation of PRIME results for applications -       Conclusions drawn and an outlook on future work As the first coherent presentation of the topic, this book will serve as a valuable source of reference and inspiration for anybody working on digital privacy.
650 0 _aComputers and civilization.
_921733
650 0 _aElectronic data processing
_xManagement.
_9145390
650 0 _aApplication software.
_9145391
650 0 _aComputer science.
_99832
650 0 _aInformation technology
_xManagement.
_95368
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 1 4 _aComputers and Society.
_931668
650 2 4 _aIT Operations.
_931703
650 2 4 _aComputer and Information Systems Applications.
_9145392
650 2 4 _aModels of Computation.
_931806
650 2 4 _aComputer Application in Administrative Data Processing.
_931588
650 2 4 _aCryptology.
_931769
700 1 _aCamenisch, Jan.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9145393
700 1 _aLeenes, Ronald.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9145394
700 1 _aSommer, Dieter.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9145395
710 2 _aSpringerLink (Online service)
_9145396
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783642190490
776 0 8 _iPrinted edition:
_z9783642190513
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v6545
_9145397
856 4 0 _uhttps://doi.org/10.1007/978-3-642-19050-6
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c93643
_d93643