Atjaunināt sīkdatņu piekrišanu

Privacy and Identity Management. Time for a Revolution?: 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers Softcover reprint of the original 1st ed. 2016 [Mīkstie vāki]

Edited by , Edited by , Edited by , Edited by , Edited by
  • Formāts: Paperback / softback, 359 pages, height x width: 235x155 mm, weight: 5621 g, 78 Illustrations, black and white; XII, 359 p. 78 illus., 1 Paperback / softback
  • Sērija : IFIP AICT Tutorials 476
  • Izdošanas datums: 30-May-2018
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3319824236
  • ISBN-13: 9783319824239
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 46,91 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 55,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 359 pages, height x width: 235x155 mm, weight: 5621 g, 78 Illustrations, black and white; XII, 359 p. 78 illus., 1 Paperback / softback
  • Sērija : IFIP AICT Tutorials 476
  • Izdošanas datums: 30-May-2018
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3319824236
  • ISBN-13: 9783319824239
Citas grāmatas par šo tēmu:

This book contains a range of keynote papers and submitted papers presented at the 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, held in Edinburgh, UK, in August 2015. The 14 revised full papers included in this volume were carefully selected from a total of 43 submissions and were subject to a two-step review process. In addition, the volume contains 4 invited keynote papers. The papers cover a wide range of topics: cloud computing, privacy-enhancing technologies, accountability, measuring privacy and understanding risks, the future of privacy and data protection regulation, the US privacy perspective, privacy and security, the PRISMS Decision System, engineering privacy, cryptography, surveillance, identity management, the European General Data Protection Regulation framework, communicating privacy issues to the general population, smart technologies, technology users' privacy preferences, sensitive applications, collaboration between humans and machines, and privacy and ethics.

Modelling the Relationship between Privacy and Security Perceptionsand
the Acceptance of Surveillance Practices.- The US Privacy Strategy.- Smart
Society: Collaboration between Humans and Machines, Promises and Perils.- An
Experience with a De-identifying Task to Inform about Privacy
Issues.- A4CloudWorkshop: Accountability in the Cloud.- Signatures for
Privacy, Trust and Accountability in the Cloud: Applications and
Requirements.- Report on the Workshop on Assessing the Maturity of
Privacy Enhancing Technologies.- Smart Technologies: Workshop on Challenges
and Trends for Privacy in a Hyper-connected World.- Privacy Pattern
Catalogue: A Tool for Integrating Privacy Principlesof ISO/IEC 29100 into the
Software Development Process.- Developing a Structured Metric to Measure
Privacy Risk in Privacy Impact Assessments.- Accountability in the EU Data
Protection Reform - Moving from Theory to Practice.- Towards Authenticity and
Privacy Preserving Accountable Workflows.- A Technique for Enhanced Provision
of Appropriate Access to Evidence across Service Provision
Chains.- Evidence-Based Security and Privacy Assurance in Cloud
Ecosystems.- Enhanced Assurance about Cloud Service Provision
Promises.- ALOC: Attribute Level of Confidence for a User-Centric
Attribute Assurance.- Identity Theft through e-Government Services:
Government to Pay the Bill?.- "All Your Data Are Belong to Us". European
Perspectives on Privacy Issues in Free Online Machine Translation
Services.- Identification of Online Gamblers in the EU: A Two-Edged
Sword.- Can Courts Provide Effective Remedies against Violations of
Fundamental Rights by Mass Surveillance? The Case of the United
Kingdom.- Automated Log Audits for Privacy Compliance Validation: A
Literature Survey.- Privacy-Preserving Access Control in Publicly Readable
Storage Systems.- Ontology-Based Obfuscation and Anonymisation for Privacy -
A Case Study on Healthcare.
Editors: David Aspinall, University of Edinburgh, UK; Jan Camenisch, IBM Research Zurich, Switzerland; Marit Hansen, Unabhängiges Landeszentrum für Datenschutz Schleswig-Holstein, Kiel, Germany; Simone Fischer-Hübner, Karlstad University, Sweden; Charles Raab, University of Edinburgh, UK