Atnaujinkite slapukų nuostatas

El. knyga: Privacy and Identity Management for Emerging Services and Technologies: 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers

Edited by , Edited by , Edited by , Edited by

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

This book contains a range of keynote papers and submitted papers presented at the 7th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, held in Nijmegen, The Netherlands, in June 2013. The 13 revised full papers and 6 keynote papers included in this volume were carefully selected from a total of 30 presentations and 11 keynote talks and were subject to a two-step review process. The keynote papers cover the dramatic global changes, including legislative developments that society is facing today. Privacy and identity management are explored in specific settings, such as the corporate context, civic society, and education and using particular technologies such as cloud computing. The regular papers examine the challenges to privacy, security and identity; ways of preserving privacy; identity and identity management and the particular challenges presented by social media.
Invited Papers
Two of the Grand Changes through Computer and Network Technology
1(11)
Bart Jacobs
The Draft Data Protection Regulation and the Development of Data Processing Applications
12(21)
Eleni Kosta
Colette Cuijpers
Privacy Management and Accountability in Global Organisations
33(20)
Siani Pearson
Concepts Around Privacy-Preserving Attribute-Based Credentials: Making Authentication with Anonymous Credentials Practical
53(11)
Jan Camenisch
Privacy Respecting ICT Innovations in Education: Electronic Course Evaluations in Higher Education and Beyond
64(13)
Yannis C. Stamatiou
How can Cloud Users be Supported in Deciding on, Tracking and Controlling How their Data are Used?
77(16)
Simone Fischer-Hubner
Julio Angulo
Tobias Pulls
Challenges to Privacy, Security, and Identity
Privacy Versus Collective Security: Drivers and Barriers Behind a Trade-off
93(9)
Bas van Schoonhoven
Arnold Roosendaal
Noor Huijboom
Privacy in the Life-Cycle of IT Services -- An Investigation of Process Reference Models
102(12)
Saskia Viktoria Bother
Ina Schiering
Forgetting Bits and Pieces: An Exploration of the "Right to Be Forgotten" as Implementation of "Forgetting" in Online Memory Processes
114(14)
Paulan Korenhof
An Advanced, Privacy-Friendly Loyalty System
128(11)
Milica Milutinovic
Italo Dacosta
Andreas Put
Bart De Decker
Securus: Prom Confidentiality and Access Requirements to Data Outsourcing Solutions
139(11)
Jens Kohler
Konrad Junemann
Preserving Privacy
Problem-Based Consideration of Privacy-Relevant Domain Knowledge
150(15)
Rene Meis
Extending Signatures of Reputation
165(12)
Emmanuelle Anceaume
Gilles Guette
Paul Lajoie-Mazenc
Thomas Sirvent
Valerie Viet Triem Tong
Preserving Privacy in Production
177(11)
Moritz Christian Muller
Social Networks
User Search with Knowledge Thresholds in Decentralized Online Social Networks
188(15)
Benjamin Greschbach
Gunnar Kreitz
Sonja Buchegger
An Explorative Mapping of the Belgian Social Media Marketing Value Network and Its Usage of Personal Identifiable Information
203(11)
Bob Heyman
Jo Pierson
Identity and Identity Management
Privacy Issues in Cross-Border Identity Management Systems: Pan-European Case
214(10)
Svetlana Sapelova
Borka Jerman-Blazic
Constructing Security: Reflections on the Margins of a Case Study of the Use of Electronic Identification in ICT Platforms in Schools
224(13)
Mariana S. Gustafsson
Mobile Devices to the Identity Rescue
237(12)
Gergely Alpar
Maarten H. Everts
Author Index 249