000 06411nam a22005775i 4500
001 u374718
003 SIRSI
005 20160812084248.0
007 cr nn 008mamaa
008 100628s2010 gw | s |||| 0|eng d
020 _a9783642142826
_9978-3-642-14282-6
040 _cMX-MeUAM
050 4 _aTK5105.5-5105.9
082 0 4 _a004.6
_223
100 1 _aBezzi, Michele.
_eeditor.
245 1 0 _aPrivacy and Identity Management for Life
_h[recurso electrónico] :
_b5th IFIP WG 9.2, 9.6/11.4, 11.6, 11.7/PrimeLife International Summer School, Nice, France, September 7-11, 2009, Revised Selected Papers /
_cedited by Michele Bezzi, Penny Duquenoy, Simone Fischer-Hübner, Marit Hansen, Ge Zhang.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c2010.
300 _aXI, 314 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aIFIP Advances in Information and Communication Technology,
_x1868-4238 ;
_v320
505 0 _aLifelong Privacy -- Lifelong Privacy: Privacy and Identity Management for Life -- Delegation for Privacy Management from Womb to Tomb – A European Perspective -- Saving On-Line Privacy -- Priavcy for Social Network Sites and Collabrative Systems -- Context Is Everything Sociality and Privacy in Online Social Network Sites -- The Freddi Staurs of Social Networking – A Legal Approach -- Facebook and Its EU Users – Applicability of the EU Data Protection Law to US Based SNS -- On the Security and Feasibility of Safebook: A Distributed Privacy-Preserving Online Social Network -- Privacy-Respecting Access Control in Collaborative Workspaces -- Privacy for eGovernment Applications -- A Three-Dimensional Framework to Analyse the Governance of Population Registers -- Use of ePassport for Identity Management in Network-Based Citizen-Life Processes -- The Use of Privacy Enhancing Technologies for Biometric Systems Analysed from a Legal Perspective -- Privacy and Identity Management for eHealth and Ambient Assisted Living Applications -- Assuring Privacy of Medical Records in an Open Collaborative Environment - A Case Study of Walloon Region’s eHealth Platform -- Goal-Oriented Access Control Model for Ambient Assisted Living -- Anonymisation and Privacy-Enhancing Technologies -- Privacy of Outsourced Data -- Sharing Data for Public Security -- An Analysis for Anonymity and Unlinkability for a VoIP Conversation -- PRIvacy LEakage Methodology (PRILE) for IDS Rules -- Identity Management and Multilateral Security -- Digital Personae and Profiles as Representations of Individuals -- Anonymous Credentials in Web Applications -- Reaching for Informed Revocation: Shutting Off the Tap on Personal Data -- Multilateral Privacy in Clouds: Requirements for Use in Industry -- Usability, Awareness and Transparency Tools -- PET-USES: Privacy-Enhancing Technology – Users’ Self-Estimation Scale -- Addressing the Privacy Paradox by Expanded Privacy Awareness – The Example of Context-Aware Services -- Secure Logging of Retained Data for an Anonymity Service -- Adding Secure Transparency Logging to the PRIME Core.
520 _aNewInternetdevelopmentsposegreaterandgreaterprivacydilemmas. Inthe- formation Society, the need for individuals to protect their autonomy and retain control over their personal information is becoming more and more important. Today,informationandcommunicationtechnologies—andthepeopleresponsible for making decisions about them, designing, and implementing them—scarcely consider those requirements, thereby potentially putting individuals’ privacy at risk. The increasingly collaborative character of the Internet enables anyone to compose services and contribute and distribute information. It may become hard for individuals to manage and control information that concerns them and particularly how to eliminate outdated or unwanted personal information, thus leavingpersonalhistoriesexposedpermanently. Theseactivitiesraisesubstantial new challenges for personal privacy at the technical, social, ethical, regulatory, and legal levels: How can privacy in emerging Internet applications such as c- laborative scenarios and virtual communities be protected? What frameworks and technical tools could be utilized to maintain life-long privacy? DuringSeptember3–10,2009,IFIP(InternationalFederationforInformation Processing)workinggroups9. 2 (Social Accountability),9. 6/11. 7(IT Misuseand theLaw),11. 4(NetworkSecurity)and11. 6(IdentityManagement)heldtheir5th InternationalSummerSchoolincooperationwiththeEUFP7integratedproject PrimeLife in Sophia Antipolis and Nice, France. The focus of the event was on privacy and identity managementfor emerging Internet applications throughout a person’s lifetime. The aim of the IFIP Summer Schools has been to encourage young a- demic and industry entrants to share their own ideas about privacy and identity management and to build up collegial relationships with others. As such, the Summer Schools havebeen introducing participants to the social implications of information technology through the process of informed discussion.
650 0 _aComputer science.
650 0 _aComputer Communication Networks.
650 0 _aData encryption (Computer science).
650 0 _aComputer software.
650 0 _aInformation systems.
650 0 _aInformation Systems.
650 1 4 _aComputer Science.
650 2 4 _aComputer Communication Networks.
650 2 4 _aManagement of Computing and Information Systems.
650 2 4 _aData Encryption.
650 2 4 _aComputers and Society.
650 2 4 _aInformation Systems Applications (incl.Internet).
650 2 4 _aAlgorithm Analysis and Problem Complexity.
700 1 _aDuquenoy, Penny.
_eeditor.
700 1 _aFischer-Hübner, Simone.
_eeditor.
700 1 _aHansen, Marit.
_eeditor.
700 1 _aZhang, Ge.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783642142819
830 0 _aIFIP Advances in Information and Communication Technology,
_x1868-4238 ;
_v320
856 4 0 _zLibro electrónico
_uhttp://148.231.10.114:2048/login?url=http://link.springer.com/book/10.1007/978-3-642-14282-6
596 _a19
942 _cLIBRO_ELEC
999 _c202598
_d202598