04058nam 22007455 450 991029973650332120200702162118.03-319-08231-010.1007/978-3-319-08231-8(CKB)3710000000143878(EBL)1783112(SSID)ssj0001274389(PQKBManifestationID)11749465(PQKBTitleCode)TC0001274389(PQKBWorkID)11324352(PQKB)11712748(MiAaPQ)EBC1783112(DE-He213)978-3-319-08231-8(PPN)179768247(EXLCZ)99371000000014387820140628d2014 u| 0engur|n|---|||||txtccrArchitecting User-Centric Privacy-as-a-Set-of-Services Digital Identity-Related Privacy Framework /by Ghazi Ben Ayed1st ed. 2014.Cham :Springer International Publishing :Imprint: Springer,2014.1 online resource (188 p.)Springer Theses, Recognizing Outstanding Ph.D. Research,2190-5053"Doctoral Thesis accepted by University of Lausanne, Switzerland."1-322-13736-6 3-319-08230-2 Includes bibliographical references at the end of each chapters.Introduction & Motivations -- Cyber-security -- Interoperability through Service-Orientation.How could privacy play a key role in protecting digital identities? How could we merge privacy law, policies, regulations and technologies to protect our digital identities in the context of connected devices and distributed systems? In this book, the author addresses major issues of identity protection and proposes a service-oriented layered framework to achieve interoperability of privacy and secure distributed systems. The framework is intended to distill privacy-related digital identity requirements (business interoperability) into a set of services, which in turn can be implemented on the basis of open standards (technical interoperability). The adoption of the proposed framework in security projects and initiatives would decrease complexities and foster understanding and collaborations between business and technical stakeholders. This work is a step toward implementing the author’s vision of delivering cyber security as a set of autonomous multi-platform hosted services that should be available upon user request and on a pay-per-use basis.Springer Theses, Recognizing Outstanding Ph.D. Research,2190-5053Electrical engineeringComputer securityInformation technologyBusiness—Data processingInternational lawCommunications Engineering, Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/T24035Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060IT in Businesshttps://scigraph.springernature.com/ontologies/product-market-codes/522000Sources and Subjects of International Law, International Organizationshttps://scigraph.springernature.com/ontologies/product-market-codes/R19010Electrical engineering.Computer security.Information technology.Business—Data processing.International law.Communications Engineering, Networks.Systems and Data Security.IT in Business.Sources and Subjects of International Law, International Organizations.005.8Ben Ayed Ghaziauthttp://id.loc.gov/vocabulary/relators/aut875348MiAaPQMiAaPQMiAaPQBOOK9910299736503321Architecting User-Centric Privacy-as-a-Set-of-Services1954334UNINA