05569nam 22007815 450 99646590180331620200701045612.03-642-19050-210.1007/978-3-642-19050-6(CKB)2670000000082440(SSID)ssj0000535878(PQKBManifestationID)11364483(PQKBTitleCode)TC0000535878(PQKBWorkID)10523133(PQKB)10645396(DE-He213)978-3-642-19050-6(MiAaPQ)EBC3066631(PPN)153865075(EXLCZ)99267000000008244020110412d2011 u| 0engurnn|008mamaatxtccrDigital Privacy[electronic resource] PRIME - Privacy and Identity Management for Europe /edited by Jan Camenisch, Ronald Leenes, Dieter Sommer1st ed. 2011.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2011.1 online resource (800 p. 105 illus., 58 illus. in color.) Security and Cryptology ;6545Bibliographic Level Mode of Issuance: Monograph3-642-19049-9 Includes bibliographical references.Part I Privacy and Identity Management -- An Introduction to Privacy-Enhancing Identity Management -- Part II Setting the Stage -- The Identity Landscape -- The Need for Privacy-Enhancing Identity Management -- Regulating Identity Management -- User-Centric Privacy-Enhancing Identity Management -- Privacy-Enhancing Identity Management in Business -- Part III What Technology Can Do for Privacy and How -- Introduction: Privacy, Trust, and Identity Management -- Architecture -- Pseudonyms and Private Credentials -- Privacy Models and Languages: Access Control and Data -- Privacy Models and Languages: Obligation Policies -- Privacy Models and Languages: Assurance Checking -- Privacy-Aware Access Control System -- Privacy-Aware Identity Lifecycle Management -- Privacy Assurance Checking -- Security/Trustworthiness Assessment of Platforms -- Further Privacy Mechanisms -- Reputation Management -- Human-Computer Interaction -- Technology Assurance -- Multilateral Interactions -- Part IV PRIME Applied -- Collaborative E-Learning -- Location-Based Services -- e-Health -- Airport Security Controls -- Privacy and Identity Management Requirements -- Part V Conclusion and Outlook.This book documents the R&D outcome of the PRIME Project, an R&D project partially funded by the European Union’s Sixth Framework Programme and the Swiss Federal Office for Education and Science.  PRIME has focused on privacy-enhancing identity management techniques and systems to support users’ sovereignty over their personal privacy and enterprises’ privacy-compliant data processing. During the course of four years, the project has involved over a hundred researchers and professionals from 22 major European academic and industrial organizations conducting R&D work in areas relevant to digital privacy. The book presents 28 detailed chapters organized in five parts: -       Introductory summary -       Legal, social, and economic aspects -       Realization of privacy-enhancing user-centric identity management -       Exploitation of PRIME results for applications -       Conclusions drawn and an outlook on future work As the first coherent presentation of the topic, this book will serve as a valuable source of reference and inspiration for anybody working on digital privacy.Security and Cryptology ;6545Computers and civilizationManagement information systemsComputer scienceApplication softwareComputersData encryption (Computer science)Computers and Societyhttps://scigraph.springernature.com/ontologies/product-market-codes/I24040Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Information Systems Applications (incl. Internet)https://scigraph.springernature.com/ontologies/product-market-codes/I18040Models and Principleshttps://scigraph.springernature.com/ontologies/product-market-codes/I18016Computer Appl. in Administrative Data Processinghttps://scigraph.springernature.com/ontologies/product-market-codes/I2301XCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Computers and civilization.Management information systems.Computer science.Application software.Computers.Data encryption (Computer science).Computers and Society.Management of Computing and Information Systems.Information Systems Applications (incl. Internet).Models and Principles.Computer Appl. in Administrative Data Processing.Cryptology.004Camenisch Janedthttp://id.loc.gov/vocabulary/relators/edtLeenes Ronaldedthttp://id.loc.gov/vocabulary/relators/edtSommer Dieteredthttp://id.loc.gov/vocabulary/relators/edtBOOK996465901803316Digital Privacy2831612UNISA