Atjaunināt sīkdatņu piekrišanu

Privacy and Identity Management for Life: 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Helsingborg, Sweden, August 2-6, 2010, Revised Selected Papers [Hardback]

Edited by , Edited by , Edited by , Edited by , Edited by
  • Formāts: Hardback, 356 pages, height x width: 235x155 mm, weight: 717 g, XII, 356 p., 1 Hardback
  • Sērija : IFIP Advances in Information and Communication Technology 352
  • Izdošanas datums: 21-Apr-2011
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642207685
  • ISBN-13: 9783642207686
  • Hardback
  • Cena: 46,91 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 55,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Hardback, 356 pages, height x width: 235x155 mm, weight: 717 g, XII, 356 p., 1 Hardback
  • Sērija : IFIP Advances in Information and Communication Technology 352
  • Izdošanas datums: 21-Apr-2011
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642207685
  • ISBN-13: 9783642207686
This book constitutes the thoroughly refereed post conference proceedings of the 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, held in Helsingborg, Sweden, in August 2010. The 27 revised papers were carefully selected from numerous submissions during two rounds of reviewing. They are organized in topical sections on terminology, privacy metrics, ethical, social, and legal aspects, data protection and identity management, eID cards and eID interoperability, emerging technologies, privacy for eGovernment and AAL applications, social networks and privacy, privacy policies, and usable privacy.
Terminology
Privacy: What Are We Actually Talking About? A Multidisciplinary Approach
1(14)
Philip Schutz
Michael Friedewald
Implementability of the Identity Management Part in Pfitzmann/Hansen's Terminology for a Complex Digital World
15(12)
Manuela Berg
Katrin Borcea-Pfitzmann
Privacy Metrics
Towards a Formal Language for Privacy Options
27(14)
Stefan Berthold
Using Game Theory to Analyze Risk to Privacy: An Initial Insight
41(11)
Lisa Rajbhandari
Einar Arthur Snekkenes
A Taxonomy of Privacy and Security Risks Contributing Factors
52(12)
Ebenezer Paintsil
Lothar Fritsch
Ethical, Social, and Legal Aspects
ETICA Workshop on Computer Ethics: Exploring Normative Issues
64(14)
Bernd Carsten Stahl
Catherine Flick
Contextualised Concerns: The Online Privacy Attitudes of Young Adults
78(12)
Michael Dowd
Data Protection, Privacy and Identity: Distinguishing Concepts and Articulating Rights
90(18)
Norberto Nuno Gomes de Andrade
Data Protection and Identity Management
Oops - We Didn't Mean to Do That! --- How Unintended Consequences Can Hijack Good Privacy and Security Policies
108(12)
Thomas P. Keenan
Supporting Semi-automated Compliance Control by a System Design Based on the Concept of Separation of Concerns
120(10)
Sebastian Haas
Ralph Herkenhoner
Denis Royer
Ammar Alkassar
Hermann de Meer
Gunter Muller
Security Levels for Web Authentication Using Mobile Phones
130(14)
Anna Vapen
Nahid Shahmehri
eID Cards and eID Interoperability
Challenges of eID Interoperability: The STORK Project (Keynote)
144(7)
Herbert Leitold
Necessary Processing of Personal Data: The Need-to-Know Principle and Processing Data from the New German Identity Card
151(13)
Harald Zwingelberg
A Smart Card Based Solution for User-Centric Identity Management
164(14)
Jan Vossaert
Pieter Verhaeghe
Bart De Decker
Vincent Naessens
Emerging Technologies
The Uncanny Valley Everywhere? On Privacy Perception and Expectation Management (Keynote)
178(14)
Bibi van den Berg
50 Ways to Break RFID Privacy
192(14)
Ton van Deursen
Privacy for eGovernment and AAL Applications
The Limits of Control --- (Governmental) Identity Management from a Privacy Perspective
206(13)
Stefan Strauß
Privacy Concerns in a Remote Monitoring and Social Networking Platform for Assisted Living
219(12)
Peter Rothenpieler
Claudia Becker
Stefan Fischer
Social Networks and Privacy
Privacy Settings in Social Networking Sites: Is It Fair?
231(13)
Aleksandra Kuczerawy
Fanny Coudert
Privacy Effects of Web Bugs Amplified by Web 2.0
244(14)
Jaromir Dobias
Privacy Policies
A Conceptual Model for Privacy Policies with Consent and Revocation Requirements
258(13)
Marco Casassa Mont
Siani Pearson
Sadie Creese
Michael Goldsmith
Nick Papanikolaou
Applying Formal Methods to Detect and Resolve Ambiguities in Privacy Requirements
271(12)
Ioannis Agrafiotis
Sadie Creese
Michael Goldsmith
Nick Papanikolaou
A Decision Support System for Design for Privacy
283(14)
Siani Pearson
Azzedine Benameur
A Multi-privacy Policy Enforcement System
297(14)
Kaniz Fatema
David W. Chadwick
Stijn Lievens
Usable Privacy
Designing Usable Online Privacy Mechanisms: What Can We Learn from Real World Behaviour?
311(14)
Periambal L. Coopamootoo
Debi Ashenden
PrimeLife Checkout --- A Privacy-Enabling e-Shopping User Interface
325(13)
Ulrich Konig
Towards Displaying Privacy Information with Icons
338(11)
Leif-Erik Holtz
Katharina Nocun
Marit Hansen
Obituary
Andreas Pfitzmann 1958-2010: Pioneer of Technical Privacy Protection in the Information Society
349(4)
Hannes Federrath
Marit Hansen
Michael Waidner
Author Index 353