Privacy and Identity Management. The Smart Revolution 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers /

This book contains selected papers presented at the 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Ispra, Italy, in September 2017. The 12 revised full papers, 5 invited papers and 4 workshop papers included in this volume were...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Hansen, Marit (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Kosta, Eleni (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Nai-Fovino, Igor (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Fischer-Hübner, Simone (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Cham : Springer International Publishing : Imprint: Springer, 2018.
Έκδοση:1st ed. 2018.
Σειρά:IFIP AICT Tutorials ; 526
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • The Smart World
  • Towards Organizing the Growing Knowledge on Privacy Engineering
  • Data Protection by Design: Promises and Perils in Crossing the Rubicon Between Law and Engineering
  • Anonymity Online: Current Solutions and Challenges
  • Is It Harmful? Re-examining Privacy Concerns
  • Forget About Privacy ... or Not?
  • From Privacy to Algorithms' Fairness
  • The Consent Paradox: Accounting for the Prominent Role of Consent in Data Protection
  • Life-Long Privacy in the IoT? Measuring Privacy Attitudes Throughout the Life-Cycle of IoT Devices
  • Secure and Privacy-Friendly Storage and Data Processing in the Cloud
  • On Anonymizing Streaming Crime Data: A Solution Approach for Resource Constrained Environments
  • Towards a Broadening of Privacy Decision-Making Models: the Use of Cognitive Architectures
  • Data Protection Impact Assessment: A Hands-On Tour of the GDPR's Most Practical Tool
  • Designing a GDPR-compliant and Usable Privacy Dashboard
  • Blockchain-Based Identity Management and Data Usage Control
  • Identification Services for Online Social Networks (OSNs)
  • Cyber Security & Privacy Experiments: A Design and Reporting Toolkit
  • Privacy and Socially Assistive Robots - A Meta Study
  • From the Glass House to the Hive: The Private Sphere in the Era of Intelligent Home Assistant Robots : A Comparative Study of Android and iOS Mobile Applications' Data
  • Handling Practices versus Compliance to Privacy
  • Privacy Concerns and Behavior of Pokémon Go Players in Germany
  • mHealth Applications for Goal Management Training - Privacy Engineering in Neuropsychological Studies
  • NFC Payments: Gaps Between User Perception and Reality
  • Real-world Identification for an Extensible and Privacy-Preserving Mobile eID.