000 | 03646nam a22005775i 4500 | ||
---|---|---|---|
001 | 978-3-319-06749-0 | ||
003 | DE-He213 | ||
005 | 20240730184853.0 | ||
007 | cr nn 008mamaa | ||
008 | 140515s2014 sz | s |||| 0|eng d | ||
020 |
_a9783319067490 _9978-3-319-06749-0 |
||
024 | 7 |
_a10.1007/978-3-319-06749-0 _2doi |
|
050 | 4 | _aQA76.9.C66 | |
072 | 7 |
_aUBJ _2bicssc |
|
072 | 7 |
_aCOM079000 _2bisacsh |
|
072 | 7 |
_aUBJ _2thema |
|
082 | 0 | 4 |
_a303.4834 _223 |
245 | 1 | 0 |
_aPrivacy Technologies and Policy _h[electronic resource] : _bSecond Annual Privacy Forum, APF 2014, Athens, Greece, May 20-21, 2014, Proceedings / _cedited by Bart Preneel, Demosthenes Ikonomou. |
250 | _a1st ed. 2014. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2014. |
|
300 |
_aXII, 191 p. 39 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v8450 |
|
505 | 0 | _aPrivacy by Design: From Technologies to Architectures -- PEARs: Privacy Enhancing Architectures -- Privacy-Preserving Statistical Data Analysis on Federated Databases -- Privacy by Encrypted Databases -- Accountable Surveillance Practices: Is the EU Moving in the Right Direction? -- TAM-VS: A Technology Acceptance Model for Video Surveillance -- Towards a Multidisciplinary Framework to Include Privacy in the Design of Video Surveillance Systems -- A Framework for Privacy Analysis of ICN Architectures -- Auctioning Privacy-Sensitive Goods: A Note on Incentive-Compatibility -- Privacy-ABCs to Leverage Identity Management as a Service -- My Data, Your Data, Our Data: Managing Privacy Preferences in Multiple Subjects Personal Data -- Towards Electronic Identification and Trusted Services for Biometric Authenticated Transactions in the Single Euro Payments Area. | |
520 | _aThis book constitutes the refereed proceedings of the Second Annual Privacy Forum, APF 2014, held in Athens, Greece, in May 2014. The 12 revised papers presented in this volume were carefully reviewed and selected from 21 submissions. The topics include: the concept and implementation of "privacy by design", with applications to encrypted databases; the study of video surveillance architectures and new networking concepts and innovative solutions for identity management. The papers address the technical, legal, and economic aspects of these problems. | ||
650 | 0 |
_aComputers and civilization. _921733 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aElectronic commerce. _95589 |
|
650 | 0 |
_aApplication software. _9137039 |
|
650 | 1 | 4 |
_aComputers and Society. _931668 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_ae-Commerce and e-Business. _931772 |
650 | 2 | 4 |
_aComputer and Information Systems Applications. _9137040 |
700 | 1 |
_aPreneel, Bart. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9137041 |
|
700 | 1 |
_aIkonomou, Demosthenes. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9137042 |
|
710 | 2 |
_aSpringerLink (Online service) _9137043 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783319067483 |
776 | 0 | 8 |
_iPrinted edition: _z9783319067506 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v8450 _9137044 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-319-06749-0 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c92530 _d92530 |