語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Privacy and Identity Management. Tim...
~
SpringerLink (Online service)
Privacy and Identity Management. Time for a Revolution? = 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Privacy and Identity Management. Time for a Revolution?/ edited by David Aspinall, Jan Camenisch, Marit Hansen, Simone Fischer-Hübner, Charles Raab.
其他題名:
10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers /
其他作者:
Aspinall, David.
面頁冊數:
XII, 359 p. 78 illus.online resource. :
Contained By:
Springer Nature eBook
標題:
Computer security. -
電子資源:
https://doi.org/10.1007/978-3-319-41763-9
ISBN:
9783319417639
Privacy and Identity Management. Time for a Revolution? = 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers /
Privacy and Identity Management. Time for a Revolution?
10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers /[electronic resource] :edited by David Aspinall, Jan Camenisch, Marit Hansen, Simone Fischer-Hübner, Charles Raab. - 1st ed. 2016. - XII, 359 p. 78 illus.online resource. - IFIP AICT Tutorials ;476. - IFIP AICT Tutorials ;476.
Modelling the Relationship between Privacy and Security Perceptions and the Acceptance of Surveillance Practices -- The US Privacy Strategy -- Smart Society: Collaboration between Humans and Machines, Promises and Perils -- An Experience with a De-identifying Task to Inform about Privacy Issues -- A4CloudWorkshop: Accountability in the Cloud -- Signatures for Privacy, Trust and Accountability in the Cloud: Applications and Requirements -- Report on the Workshop on Assessing the Maturity of Privacy Enhancing Technologies -- Smart Technologies: Workshop on Challenges and Trends for Privacy in a Hyper-connected World -- Privacy Pattern Catalogue: A Tool for Integrating Privacy Principles of ISO/IEC 29100 into the Software Development Process -- Developing a Structured Metric to Measure Privacy Risk in Privacy Impact Assessments -- Accountability in the EU Data Protection Reform - Moving from Theory to Practice -- Towards Authenticity and Privacy Preserving Accountable Workflows -- A Technique for Enhanced Provision of Appropriate Access to Evidence across Service Provision Chains -- Evidence-Based Security and Privacy Assurance in Cloud Ecosystems -- Enhanced Assurance about Cloud Service Provision Promises -- ALOC: Attribute Level of Confidence for a User-Centric Attribute Assurance -- Identity Theft through e-Government Services: Government to Pay the Bill? -- "All Your Data Are Belong to Us ". European Perspectives on Privacy Issues in Free Online Machine Translation Services -- Identification of Online Gamblers in the EU: A Two-Edged Sword -- Can Courts Provide Effective Remedies against Violations of Fundamental Rights by Mass Surveillance? The Case of the United Kingdom -- Automated Log Audits for Privacy Compliance Validation: A Literature Survey -- Privacy-Preserving Access Control in Publicly Readable Storage Systems -- Ontology-Based Obfuscation and Anonymisation for Privacy - A Case Study on Healthcare.
This book contains a range of keynote papers and submitted papers presented at the 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, held in Edinburgh, UK, in August 2015. The 14 revised full papers included in this volume were carefully selected from a total of 43 submissions and were subject to a two-step review process. In addition, the volume contains 4 invited keynote papers. The papers cover a wide range of topics: cloud computing, privacy-enhancing technologies, accountability, measuring privacy and understanding risks, the future of privacy and data protection regulation, the US privacy perspective, privacy and security, the PRISMS Decision System, engineering privacy, cryptography, surveillance, identity management, the European General Data Protection Regulation framework, communicating privacy issues to the general population, smart technologies, technology users' privacy preferences, sensitive applications, collaboration between humans and machines, and privacy and ethics.
ISBN: 9783319417639
Standard No.: 10.1007/978-3-319-41763-9doiSubjects--Topical Terms:
557122
Computer security.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Privacy and Identity Management. Time for a Revolution? = 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers /
LDR
:04586nam a22004215i 4500
001
972681
003
DE-He213
005
20200704170131.0
007
cr nn 008mamaa
008
201211s2016 gw | s |||| 0|eng d
020
$a
9783319417639
$9
978-3-319-41763-9
024
7
$a
10.1007/978-3-319-41763-9
$2
doi
035
$a
978-3-319-41763-9
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
245
1 0
$a
Privacy and Identity Management. Time for a Revolution?
$h
[electronic resource] :
$b
10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers /
$c
edited by David Aspinall, Jan Camenisch, Marit Hansen, Simone Fischer-Hübner, Charles Raab.
250
$a
1st ed. 2016.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2016.
300
$a
XII, 359 p. 78 illus.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
IFIP AICT Tutorials ;
$v
476
505
0
$a
Modelling the Relationship between Privacy and Security Perceptions and the Acceptance of Surveillance Practices -- The US Privacy Strategy -- Smart Society: Collaboration between Humans and Machines, Promises and Perils -- An Experience with a De-identifying Task to Inform about Privacy Issues -- A4CloudWorkshop: Accountability in the Cloud -- Signatures for Privacy, Trust and Accountability in the Cloud: Applications and Requirements -- Report on the Workshop on Assessing the Maturity of Privacy Enhancing Technologies -- Smart Technologies: Workshop on Challenges and Trends for Privacy in a Hyper-connected World -- Privacy Pattern Catalogue: A Tool for Integrating Privacy Principles of ISO/IEC 29100 into the Software Development Process -- Developing a Structured Metric to Measure Privacy Risk in Privacy Impact Assessments -- Accountability in the EU Data Protection Reform - Moving from Theory to Practice -- Towards Authenticity and Privacy Preserving Accountable Workflows -- A Technique for Enhanced Provision of Appropriate Access to Evidence across Service Provision Chains -- Evidence-Based Security and Privacy Assurance in Cloud Ecosystems -- Enhanced Assurance about Cloud Service Provision Promises -- ALOC: Attribute Level of Confidence for a User-Centric Attribute Assurance -- Identity Theft through e-Government Services: Government to Pay the Bill? -- "All Your Data Are Belong to Us ". European Perspectives on Privacy Issues in Free Online Machine Translation Services -- Identification of Online Gamblers in the EU: A Two-Edged Sword -- Can Courts Provide Effective Remedies against Violations of Fundamental Rights by Mass Surveillance? The Case of the United Kingdom -- Automated Log Audits for Privacy Compliance Validation: A Literature Survey -- Privacy-Preserving Access Control in Publicly Readable Storage Systems -- Ontology-Based Obfuscation and Anonymisation for Privacy - A Case Study on Healthcare.
520
$a
This book contains a range of keynote papers and submitted papers presented at the 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, held in Edinburgh, UK, in August 2015. The 14 revised full papers included in this volume were carefully selected from a total of 43 submissions and were subject to a two-step review process. In addition, the volume contains 4 invited keynote papers. The papers cover a wide range of topics: cloud computing, privacy-enhancing technologies, accountability, measuring privacy and understanding risks, the future of privacy and data protection regulation, the US privacy perspective, privacy and security, the PRISMS Decision System, engineering privacy, cryptography, surveillance, identity management, the European General Data Protection Regulation framework, communicating privacy issues to the general population, smart technologies, technology users' privacy preferences, sensitive applications, collaboration between humans and machines, and privacy and ethics.
650
0
$a
Computer security.
$3
557122
650
0
$a
Management information systems.
$3
561123
650
0
$a
Computer science.
$3
573171
650
0
$a
Computers and civilization.
$3
556557
650
1 4
$a
Systems and Data Security.
$3
677062
650
2 4
$a
Management of Computing and Information Systems.
$3
593928
650
2 4
$a
Computers and Society.
$3
669900
700
1
$a
Aspinall, David.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1111268
700
1
$a
Camenisch, Jan.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
784610
700
1
$a
Hansen, Marit.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1205899
700
1
$a
Fischer-Hübner, Simone.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1254530
700
1
$a
Raab, Charles.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1267780
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783319417622
776
0 8
$i
Printed edition:
$z
9783319417646
776
0 8
$i
Printed edition:
$z
9783319824239
830
0
$a
IFIP AICT Tutorials ;
$v
476
$3
1267781
856
4 0
$u
https://doi.org/10.1007/978-3-319-41763-9
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入