|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910299736503321 |
|
|
Autore |
Ben Ayed Ghazi |
|
|
Titolo |
Architecting User-Centric Privacy-as-a-Set-of-Services : Digital Identity-Related Privacy Framework / / by Ghazi Ben Ayed |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2014.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (188 p.) |
|
|
|
|
|
|
Collana |
|
Springer Theses, Recognizing Outstanding Ph.D. Research, , 2190-5053 |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Electrical engineering |
Computer security |
Information technology |
Business—Data processing |
International law |
Communications Engineering, Networks |
Systems and Data Security |
IT in Business |
Sources and Subjects of International Law, International Organizations |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
"Doctoral Thesis accepted by University of Lausanne, Switzerland." |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references at the end of each chapters. |
|
|
|
|
|
|
Nota di contenuto |
|
Introduction & Motivations -- Cyber-security -- Interoperability through Service-Orientation. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
How could privacy play a key role in protecting digital identities? How could we merge privacy law, policies, regulations and technologies to protect our digital identities in the context of connected devices and distributed systems? In this book, the author addresses major issues of identity protection and proposes a service-oriented layered framework to achieve interoperability of privacy and secure distributed systems. The framework is intended to distill privacy-related digital identity requirements (business interoperability) into a set of services, which in turn can be implemented on the basis of open standards (technical interoperability). The adoption of the proposed framework in security projects and initiatives would decrease complexities and foster |
|
|
|
|