Atjaunināt sīkdatņu piekrišanu

E-grāmata: Future of Identity in the Information Society: 4th IFIP WG 9.2, 9.6, 11.6, 11.7/FIDIS International Summer School, Brno, Czech Republic, September 1-7, 2008, Revised Selected Papers

Edited by , Edited by , Edited by , Edited by
  • Formāts - PDF+DRM
  • Cena: 106,47 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

What constitutes an identity, how do new technologies affect identity, how do we manage identities in a globally networked information society? The increasing div- sity of information and communication technologies and their equally wide range of usage in personal, professional and official capacities raise challenging questions of identity in a variety of contexts. The aim of the IFIP/FIDIS Summer Schools has been to encourage young a- demic and industry entrants to share their own ideas about privacy and identity m- agement and to build up collegial relationships with others. As such, the Summer Schools have been introducing participants to the social implications of information technology through the process of informed discussion. The 4th International Summer School took place in Brno, Czech Republic, during September 17, 2008. It was organized by IFIP (International Federation for Infor- tion Processing) working groups 9.2 (Social Accountability), 9.6/11.7 (IT Misuse and the Law) and 11.6 (Identity Management) in cooperation with the EU FP6 Network of Excellence FIDIS and Masaryk University in Brno. The focus of the event was on security and privacy issues in the Internet environment, and aspects of identity m- agement in relation to current and future technologies in a variety of contexts.
Historic Perspective - Lessons Learned or Not?
Software Security - The Dangers of Abstraction
1(12)
Dieter Gollmann
History of Privacy
13(30)
Jan Holvast
Information, Ethics, Identifiers
Applied Ethics and eHealth: Principles, Identity, and RFID
43(13)
Diane Whitehouse
Penny Duquenoy
Identity Management Systems in Healthcare: The Issue of Patient Identifiers
56(11)
Els Soenens
A Survey on Transparency Tools for Enhancing Privacy
67(16)
Hans Hedbom
Privacy Issues
When Spiders Bite: The Use, Misuse, and Unintended Consequences of ``Silent Information''
83(9)
Thomas P. Keenan
Data Retention and Anonymity Services: Introducing a New Class of Realistic Adversary Models
92(15)
Stefan Berthold
Rainer Bohme
Stefan Kopsell
A Survey on Non-transferable Anonymous Credentials
107(12)
Sebastian Pape
Wireless Security and Privacy
Security of Wireless Communication
119(16)
Dan Cvrcek
Enhancing Multilateral Security in and by Reputation Systems
135(16)
Sandra Steinbrecher
Challenges of Emerging Technologies
An Overview of Electronic Passport Security Features
151(9)
Zdenek Riha
Location Privacy Issues in Wireless Sensor Networks
160(10)
Jiri Kur
Andriy Stetsko
Privacy-Enhanced and Anonymous Applications
Design and Analysis of a Practical E-Voting Protocol
170(14)
Marian Novotny
Business and Organisational Perspectives
Comparing Identity Management Frameworks in a Business Context
184(13)
Jaap-Henk Hoepman
Rieks Joosten
Johanneke Siljee
Security Policy Satisfiability and Failure Resilience in Workflows
197(14)
Meghna Lowalekar
Ritesh Kumar Tiwari
Kamalakar Karlapalem
Privacy Awareness and Individual Control
User Control Problems and Taking User Empowerment Further
211(15)
Rowena Rodrigues
Privacy Awareness: A Means to Solve the Privacy Paradox?
226(11)
Stefanie Potzsch
Testing Privacy Awareness
237(17)
Mike Bergmann
The Relationship between Data Protection Legislation and Information Security Related Standards
254(14)
Martin Meints
Anonymity Attacks and Analysis
Investigating Anonymity in Group Based Anonymous Authentication
268(15)
Daniel Slamanig
Christian Stingl
Author Index 283