000 05747nam a22006615i 4500
001 978-3-031-57978-3
003 DE-He213
005 20250516160025.0
007 cr nn 008mamaa
008 240422s2024 sz | s |||| 0|eng d
020 _a9783031579783
_9978-3-031-57978-3
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
245 1 0 _aPrivacy and Identity Management. Sharing in a Digital World
_h[electronic resource] :
_b18th IFIP WG 9.2, 9.6/11.7, 11.6 International Summer School, Privacy and Identity 2023, Oslo, Norway, August 8-11, 2023, Revised Selected Papers /
_cedited by Felix Bieker, Silvia de Conca, Nils Gruschka, Meiko Jensen, Ina Schiering.
250 _a1st ed. 2024.
264 1 _aCham :
_bSpringer Nature Switzerland :
_bImprint: Springer,
_c2024.
300 _aXI, 342 p. 78 illus., 66 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aIFIP Advances in Information and Communication Technology,
_x1868-422X ;
_v695
505 0 _aKeynote Papers -- Blueprints for Deploying Privacy Enhancing Technologies in E-government -- The effacement of information technology from EU law: the need for collaborative approaches to redesign the EU's regulatory architecture -- Selected Student Papers -- Towards an Affordance-Based Typology of Personal Data Stores -- Assuring GDPR Conformance through Language-Based Compliance -- User Interaction Data in Apps: Comparing Policy Claims to Implementations -- Developing with Compliance in Mind: Addressing Data Protection Law, Cybersecurity Regulation, and AI Regulation During Software Development -- Digital Security Controversy Analysis: A Case Study of the Debate over GCHQ Exceptional Access Proposal -- Educating Parents in Managing Online Privacy Risks: Media Educators' Perspectives -- A Walk in the Labyrinth. Evolving EU Regulatory Framework for Secondary Use of Electronic Personal Health Data for Scientific Research -- Who is the attacker - Analyzing data protection violations in health care -- Towards privacy-preserving machine learning in sovereign data spaces: opportunities and challenges -- Secure and Privacy-Preserving Authentication for Data Subject Rights Enforcement -- Non-Interactive Authentication Scheme for Vehicular Ad-hoc Networks: Security, Privacy, and Accountability -- Entangled: A Case Study of Data Exchange and Actor Relationships in a Mobility Ecosystem -- Enhancing transparency through Personal Information Management Systems: current state of service offerings and considerations for further advancements -- User-Driven Privacy Factors in Trigger-Action Apps: A Comparative Analysis with General IoT -- Privacy and Utility Evaluation of Synthetic Tabular Data for Machine Learning -- Empirical Evaluation of Synthetic Data Generated by GANs and Diffusion Models.-How much is your Instagram Data Worth? Economic Perspective of Privacy in the Social Media Context -- Workshop and Tutorial Papers -- Private Training Approaches - A Primer -- Workshop on Cybersecurity of Critical Infrastructures.
520 _aThis book contains selected papers presented at the 18th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Oslo, Norway during August 8 - 11, 2023. The 21 full papers, including 2 workshops papers, presented in this book were carefully reviewed and selected from 30 submissions. The proceedings also contain two invited talks. As in previous years, one of the goals of the IFIP Summer School was to encourage the publication of thorough research papers by students and emerging scholars. The papers combine interdisciplinary approaches to bring together a host of perspectives, such as technical, legal, regulatory, socio-economic, social or societal, political, ethical, anthropological, philosophical, or psychological perspectives.
541 _fUABC ;
_cPerpetuidad
650 0 _aData protection.
650 0 _aComputer networks .
650 0 _aComputers.
650 0 _aCryptography.
650 0 _aData encryption (Computer science).
650 1 4 _aData and Information Security.
650 2 4 _aComputer Communication Networks.
650 2 4 _aComputing Milieux.
650 2 4 _aCryptology.
700 1 _aBieker, Felix.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _ade Conca, Silvia.
_eeditor.
_0(orcid)0000-0002-9356-9815
_1https://orcid.org/0000-0002-9356-9815
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aGruschka, Nils.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aJensen, Meiko.
_eeditor.
_0(orcid)0009-0003-2397-9813
_1https://orcid.org/0009-0003-2397-9813
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aSchiering, Ina.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031579776
776 0 8 _iPrinted edition:
_z9783031579790
776 0 8 _iPrinted edition:
_z9783031579806
830 0 _aIFIP Advances in Information and Communication Technology,
_x1868-422X ;
_v695
856 4 0 _zLibro electrónico
_uhttp://libcon.rec.uabc.mx:2048/login?url=https://doi.org/10.1007/978-3-031-57978-3
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cLIBRO_ELEC
999 _c274824
_d274823