LEADER 04058nam 22007455 450 001 9910299736503321 005 20200702162118.0 010 $a3-319-08231-0 024 7 $a10.1007/978-3-319-08231-8 035 $a(CKB)3710000000143878 035 $a(EBL)1783112 035 $a(SSID)ssj0001274389 035 $a(PQKBManifestationID)11749465 035 $a(PQKBTitleCode)TC0001274389 035 $a(PQKBWorkID)11324352 035 $a(PQKB)11712748 035 $a(MiAaPQ)EBC1783112 035 $a(DE-He213)978-3-319-08231-8 035 $a(PPN)179768247 035 $a(EXLCZ)993710000000143878 100 $a20140628d2014 u| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aArchitecting User-Centric Privacy-as-a-Set-of-Services $eDigital Identity-Related Privacy Framework /$fby Ghazi Ben Ayed 205 $a1st ed. 2014. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2014. 215 $a1 online resource (188 p.) 225 1 $aSpringer Theses, Recognizing Outstanding Ph.D. Research,$x2190-5053 300 $a"Doctoral Thesis accepted by University of Lausanne, Switzerland." 311 $a1-322-13736-6 311 $a3-319-08230-2 320 $aIncludes bibliographical references at the end of each chapters. 327 $aIntroduction & Motivations -- Cyber-security -- Interoperability through Service-Orientation. 330 $aHow could privacy play a key role in protecting digital identities? How could we merge privacy law, policies, regulations and technologies to protect our digital identities in the context of connected devices and distributed systems? In this book, the author addresses major issues of identity protection and proposes a service-oriented layered framework to achieve interoperability of privacy and secure distributed systems. The framework is intended to distill privacy-related digital identity requirements (business interoperability) into a set of services, which in turn can be implemented on the basis of open standards (technical interoperability). The adoption of the proposed framework in security projects and initiatives would decrease complexities and foster understanding and collaborations between business and technical stakeholders. This work is a step toward implementing the author?s vision of delivering cyber security as a set of autonomous multi-platform hosted services that should be available upon user request and on a pay-per-use basis. 410 0$aSpringer Theses, Recognizing Outstanding Ph.D. Research,$x2190-5053 606 $aElectrical engineering 606 $aComputer security 606 $aInformation technology 606 $aBusiness?Data processing 606 $aInternational law 606 $aCommunications Engineering, Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/T24035 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aIT in Business$3https://scigraph.springernature.com/ontologies/product-market-codes/522000 606 $aSources and Subjects of International Law, International Organizations$3https://scigraph.springernature.com/ontologies/product-market-codes/R19010 615 0$aElectrical engineering. 615 0$aComputer security. 615 0$aInformation technology. 615 0$aBusiness?Data processing. 615 0$aInternational law. 615 14$aCommunications Engineering, Networks. 615 24$aSystems and Data Security. 615 24$aIT in Business. 615 24$aSources and Subjects of International Law, International Organizations. 676 $a005.8 700 $aBen Ayed$b Ghazi$4aut$4http://id.loc.gov/vocabulary/relators/aut$0875348 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910299736503321 996 $aArchitecting User-Centric Privacy-as-a-Set-of-Services$91954334 997 $aUNINA