LEADER 03541nam 22006255 450 001 9910484849003321 005 20251226202252.0 010 $a3-642-54069-4 024 7 $a10.1007/978-3-642-54069-1 035 $a(DE-He213)978-3-642-54069-1 035 $a(MiAaPQ)EBC3093286 035 $a(PPN)176118519 035 $a(CKB)3710000000085825 035 $a(EXLCZ)993710000000085825 100 $a20140115d2014 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aPrivacy Technologies and Policy $eFirst Annual Privacy Forum, APF 2012, Limassol, Cyprus, October 10-11, 2012, Revised Selected Papers /$fedited by Bart Preneel, Demosthenes Ikonomou 205 $a1st ed. 2014. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2014. 215 $a1 online resource (XII, 215 p. 39 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v8319 311 08$a3-642-54068-6 327 $aA Problem-Based Approach for Computer-Aided Privacy Threat Identification -- Conceptual Framework and Architecture for Privacy Audit -- Privacy-Preserving Computation -- Designing Privacy-by-Design -- Enhancing Privacy by Design from a Developer?s Perspective -- A Solution, But Not a Panacea for Defending Privacy: The Challenges, Criticism and Limitations of Privacy by Design -- Integrating Anonymous Credentials with eIDs for Privacy-Respecting Online Authentication -- Federated Identity as Capabilities -- Privacy Preserving Course Evaluations in Greek Higher Education Institutes: An e-Participation Case Study with the Empowerment of Attribute Based Credentials -- Collection and Storage of Personal Data: A Critical View on Current Practices in the Transportation Sector -- ICT and Privacy: Barriers -- A Method for Analysing Traceability between Privacy Policies and Privacy Controls of Online Social Networks -- Electronic Footprints in the Sand: Technologies for Assisting Domestic Violence Survivors. 330 $aThis book constitutes revised selected papers from the First Annual Privacy Forum, APF 2012, held in Limassol, Cyprus, in October 2012. The 13 revised papers presented in this volume were carefully reviewed and selected from 26 submissions. They are organized in topical sections named: modelling; privacy by design; identity management and case studies. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v8319 606 $aComputers and civilization 606 $aData protection 606 $aElectronic commerce 606 $aApplication software 606 $aComputers and Society 606 $aData and Information Security 606 $ae-Commerce and e-Business 606 $aComputer and Information Systems Applications 615 0$aComputers and civilization. 615 0$aData protection. 615 0$aElectronic commerce. 615 0$aApplication software. 615 14$aComputers and Society. 615 24$aData and Information Security. 615 24$ae-Commerce and e-Business. 615 24$aComputer and Information Systems Applications. 676 $a005.8 702 $aPreneel$b Bart$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aIkonomou$b Demosthenes$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484849003321 996 $aPrivacy Technologies and Policy$91891838 997 $aUNINA