LEADER 04674nam 22008295 450 001 9910298492003321 005 20251116140242.0 010 $a3-319-14439-1 024 7 $a10.1007/978-3-319-14439-9 035 $a(CKB)3710000000321549 035 $a(EBL)1965399 035 $a(OCoLC)898892854 035 $a(SSID)ssj0001407880 035 $a(PQKBManifestationID)11727542 035 $a(PQKBTitleCode)TC0001407880 035 $a(PQKBWorkID)11411804 035 $a(PQKB)11338211 035 $a(DE-He213)978-3-319-14439-9 035 $a(MiAaPQ)EBC1965399 035 $z(PPN)25886950X 035 $a(PPN)183150198 035 $a(EXLCZ)993710000000321549 100 $a20141220d2015 u| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aAttribute-based Credentials for Trust $eIdentity in the Information Society /$fedited by Kai Rannenberg, Jan Camenisch, Ahmad Sabouri 205 $a1st ed. 2015. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2015. 215 $a1 online resource (395 p.) 300 $aDescription based upon print version of record. 311 08$a3-319-14438-3 320 $aIncludes bibliographical references. 327 $aIntroduction -- Architecture for Application Developers -- Architecture for Crypto Developers -- Comparison -- The Soederhamn Pilot -- The Patras Pilot -- Experiences and Feedback from the Pilots -- Annexes. 330 $aThis book addresses the federation and interchangeability of Privacy-ABC technologies. It defines a common, unified architecture for Privacy-ABC systems that allows their respective features to be compared and combined Further, this book presents open reference implementations of selected Privacy-ABC systems and explains how to deploy them in actual production pilots, allowing provably accredited members of restricted communities to provide anonymous feedback on their community or its members. To date, credentials such as digitally signed pieces of personal information or other information used to authenticate or identify a user have not been designed to respect the users? privacy. They inevitably reveal the identity of the holder even though the application at hand often needs much less information, e.g. only the confirmation that the holder is a teenager or is eligible for social benefits. In contrast, Privacy-ABCs allow their holders to reveal only their minimal information required by the applications, without giving away their full identity information. Privacy-ABCs thus facilitate the implementation of a trustworthy and at the same time privacy-respecting digital society.  "The ABC4Trust project as a multidisciplinary and European project, gives a technological response to questions linked to data protection." Viviane Reding (Former Vice-president of the European Commission, Member of European Parliament). 606 $aInformation technology 606 $aBusiness?Data processing 606 $aComputer security 606 $aMass media 606 $aLaw 606 $aData encryption (Computer science) 606 $aElectronic commerce 606 $aIT in Business$3https://scigraph.springernature.com/ontologies/product-market-codes/522000 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aIT Law, Media Law, Intellectual Property$3https://scigraph.springernature.com/ontologies/product-market-codes/R15009 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $ae-Commerce/e-business$3https://scigraph.springernature.com/ontologies/product-market-codes/I26000 615 0$aInformation technology. 615 0$aBusiness?Data processing. 615 0$aComputer security. 615 0$aMass media. 615 0$aLaw. 615 0$aData encryption (Computer science) 615 0$aElectronic commerce. 615 14$aIT in Business. 615 24$aSystems and Data Security. 615 24$aIT Law, Media Law, Intellectual Property. 615 24$aCryptology. 615 24$ae-Commerce/e-business. 676 $a005.8 676 $a005.82 676 $a330 676 $a343099 702 $aRannenberg$b Kai$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aCamenisch$b Jan$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSabouri$b Ahmad$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a9910298492003321 996 $aAttribute-based Credentials for Trust$92498438 997 $aUNINA