LEADER 05970nam 22007095 450 001 9910254991203321 005 20240502122746.0 010 $a3-319-41763-0 010 $a9783319417622 024 7 $a10.1007/978-3-319-41763-9 035 $a(CKB)3710000000765351 035 $a(DE-He213)978-3-319-41763-9 035 $a(MiAaPQ)EBC6312045 035 $a(MiAaPQ)EBC5594440 035 $a(Au-PeEL)EBL5594440 035 $a(OCoLC)953990640 035 $a(PPN)194515419 035 $a(EXLCZ)993710000000765351 100 $a20160706d2016 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aPrivacy and Identity Management. Time for a Revolution? $e10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers /$fedited by David Aspinall, Jan Camenisch, Marit Hansen, Simone Fischer-Hübner, Charles Raab 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2016. 215 $a1 recurso en línea (XII, 359 p. 78 ilus.) 225 0 $aFIP Advances in Information and Communication Technology,$x1868-4238 ;$v476 225 1 $aIFIP AICT Tutorials ;$v476 300 $aRecurso en línea y en papel 311 0 $a3-319-41762-2 327 $aModelling the Relationship between Privacy and Security Perceptions and the Acceptance of Surveillance Practices -- The US Privacy Strategy -- Smart Society: Collaboration between Humans and Machines, Promises and Perils -- An Experience with a De-identifying Task to Inform about Privacy Issues -- A4CloudWorkshop: Accountability in the Cloud -- Signatures for Privacy, Trust and Accountability in the Cloud: Applications and Requirements -- Report on the Workshop on Assessing the Maturity of Privacy Enhancing Technologies -- Smart Technologies: Workshop on Challenges and Trends for Privacy in a Hyper-connected World -- Privacy Pattern Catalogue: A Tool for Integrating Privacy Principles of ISO/IEC 29100 into the Software Development Process -- Developing a Structured Metric to Measure Privacy Risk in Privacy Impact Assessments -- Accountability in the EU Data Protection Reform - Moving from Theory to Practice -- Towards Authenticity and Privacy Preserving Accountable Workflows -- A Technique for Enhanced Provision of Appropriate Access to Evidence across Service Provision Chains -- Evidence-Based Security and Privacy Assurance in Cloud Ecosystems -- Enhanced Assurance about Cloud Service Provision Promises -- ALOC: Attribute Level of Confidence for a User-Centric Attribute Assurance -- Identity Theft through e-Government Services: Government to Pay the Bill? -- "All Your Data Are Belong to Us ". European Perspectives on Privacy Issues in Free Online Machine Translation Services -- Identification of Online Gamblers in the EU: A Two-Edged Sword -- Can Courts Provide Effective Remedies against Violations of Fundamental Rights by Mass Surveillance? The Case of the United Kingdom -- Automated Log Audits for Privacy Compliance Validation: A Literature Survey -- Privacy-Preserving Access Control in Publicly Readable Storage Systems -- Ontology-Based Obfuscation and Anonymisation for Privacy - A Case Study on Healthcare. 330 $aThis book contains a range of keynote papers and submitted papers presented at the 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, held in Edinburgh, UK, in August 2015. The 14 revised full papers included in this volume were carefully selected from a total of 43 submissions and were subject to a two-step review process. In addition, the volume contains 4 invited keynote papers. The papers cover a wide range of topics: cloud computing, privacy-enhancing technologies, accountability, measuring privacy and understanding risks, the future of privacy and data protection regulation, the US privacy perspective, privacy and security, the PRISMS Decision System, engineering privacy, cryptography, surveillance, identity management, the European General Data Protection Regulation framework, communicating privacy issues to the general population, smart technologies, technology users' privacy preferences, sensitive applications, collaboration between humans and machines, and privacy and ethics. 410 0$aIFIP AICT Tutorials (Springer International Publishing) 606 $aComputer security 606 $aManagement information systems 606 $aComputer science 606 $aComputers and civilization 606 $aSeguridad informática 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 615 0$aComputer security. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aComputers and civilization. 615 04$aSeguridad informática 615 14$aSystems and Data Security. 615 24$aManagement of Computing and Information Systems. 615 24$aComputers and Society. 702 $aAspinall$b David$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aCamenisch$b Jan$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aHansen$b Marit$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aFischer-Hübner$b Simone$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aRaab$b Charles$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 801 2$bUMA.EIN 912 $a9910254991203321 996 $aPrivacy and Identity Management. Time for a Revolution$91961629 997 $aUNINA