Privacy and Identity Management for Emerging Services and Technologies 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers /

This book contains a range of keynote papers and submitted papers presented at the 7th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, held in Nijmegen, The Netherlands, in June 2013. The 13 revised full papers and 6 keynote papers included in this volume were carefully selected...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Hansen, Marit (Επιμελητής έκδοσης), Hoepman, Jaap-Henk (Επιμελητής έκδοσης), Leenes, Ronald (Επιμελητής έκδοσης), Whitehouse, Diane (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2014.
Σειρά:IFIP Advances in Information and Communication Technology, 421
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Two of the Grand Changes through Computer and Network Technology
  • The Draft Data Protection Regulation and the Development of Data Processing Applications
  • Privacy Management and Accountability in Global Organisations
  • Concepts Around Privacy-Preserving Attribute-Based Credentials: Making Authentication with Anonymous Credentials Practical
  • Privacy Respecting ICT Innovations in Education: Electronic Course Evaluations in Higher Education and Beyond
  • How can Cloud Users be Supported in Deciding on, Tracking and Controlling How their Data are Used?
  • Privacy Versus Collective Security: Drivers and Barriers Behind a Trade-off
  • Privacy in the Life-Cycle of IT Services – An Investigation of Process Reference Models
  • Forgetting Bits and Pieces: An Exploration of the ”Right to Be Forgotten” as Implementation of ”Forgetting” in Online Memory Processes
  • An Advanced, Privacy-Friendly Loyalty System
  • Securus: From Confidentiality and Access Requirements to Data Outsourcing Solutions
  • Problem-Based Consideration of Privacy-Relevant Domain Knowledge
  • Extending Signatures of Reputation
  • Preserving Privacy in Production
  • User Search with Knowledge Thresholds in Decentralized Online Social Networks
  • An Explorative Mapping of the Belgian Social Media Marketing Value Network and Its Usage of Personal Identifiable Information
  • Privacy Issues in Cross-Border Identity Management Systems: Pan-European Case
  • Constructing Security: Reflections on the Margins of a Case Study of the Use of Electronic Identification in ICT Platforms in Schools
  • Mobile Devices to the Identity Rescue.