04042nam 22006615 450 99620359830331620200702135446.03-319-06749-410.1007/978-3-319-06749-0(CKB)3710000000119140(DE-He213)978-3-319-06749-0(SSID)ssj0001246459(PQKBManifestationID)11814284(PQKBTitleCode)TC0001246459(PQKBWorkID)11342132(PQKB)10976349(MiAaPQ)EBC3093562(PPN)17878270X(EXLCZ)99371000000011914020140515d2014 u| 0engurnn#008mamaatxtrdacontentcrdamediacrrdacarrierPrivacy Technologies and Policy[electronic resource] Second Annual Privacy Forum, APF 2014, Athens, Greece, May 20-21, 2014, Proceedings /edited by Bart Preneel, Demosthenes Ikonomou1st ed. 2014.Cham :Springer International Publishing :Imprint: Springer,2014.1 online resource (XII, 191 p. 39 illus.)Security and Cryptology ;8450Bibliographic Level Mode of Issuance: Monograph3-319-06748-6 Privacy by Design: From Technologies to Architectures -- PEARs: Privacy Enhancing Architectures -- Privacy-Preserving Statistical Data Analysis on Federated Databases -- Privacy by Encrypted Databases -- Accountable Surveillance Practices: Is the EU Moving in the Right Direction? -- TAM-VS: A Technology Acceptance Model for Video Surveillance -- Towards a Multidisciplinary Framework to Include Privacy in the Design of Video Surveillance Systems -- A Framework for Privacy Analysis of ICN Architectures -- Auctioning Privacy-Sensitive Goods: A Note on Incentive-Compatibility -- Privacy-ABCs to Leverage Identity Management as a Service -- My Data, Your Data, Our Data: Managing Privacy Preferences in Multiple Subjects Personal Data -- Towards Electronic Identification and Trusted Services for Biometric Authenticated Transactions in the Single Euro Payments Area.This book constitutes the refereed proceedings of the Second Annual Privacy Forum, APF 2014, held in Athens, Greece, in May 2014. The 12 revised papers presented in this volume were carefully reviewed and selected from 21 submissions. The topics include: the concept and implementation of "privacy by design", with applications to encrypted databases; the study of video surveillance architectures and new networking concepts and innovative solutions for identity management. The papers address the technical, legal, and economic aspects of these problems.Security and Cryptology ;8450Computers and civilizationComputer securityE-commerceApplication softwareComputers and Societyhttps://scigraph.springernature.com/ontologies/product-market-codes/I24040Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060e-Commerce/e-businesshttps://scigraph.springernature.com/ontologies/product-market-codes/I26000Information Systems Applications (incl. Internet)https://scigraph.springernature.com/ontologies/product-market-codes/I18040Computers and civilization.Computer security.E-commerce.Application software.Computers and Society.Systems and Data Security.e-Commerce/e-business.Information Systems Applications (incl. Internet).004Preneel Bartedthttp://id.loc.gov/vocabulary/relators/edtIkonomou Demosthenesedthttp://id.loc.gov/vocabulary/relators/edtBOOK996203598303316Privacy Technologies and Policy1891838UNISA