LEADER 03799nam 22006255 450 001 9910484849003321 005 20200630042434.0 010 $a3-642-54069-4 024 7 $a10.1007/978-3-642-54069-1 035 $a(DE-He213)978-3-642-54069-1 035 $a(MiAaPQ)EBC3093286 035 $a(PPN)176118519 035 $a(CKB)3710000000085825 035 $a(EXLCZ)993710000000085825 100 $a20140115d2014 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aPrivacy Technologies and Policy $eFirst Annual Privacy Forum, APF 2012, Limassol, Cyprus, October 10-11, 2012, Revised Selected Papers /$fedited by Bart Preneel, Demosthenes Ikonomou 205 $a1st ed. 2014. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2014. 215 $a1 online resource (XII, 215 p. 39 illus.) 225 1 $aSecurity and Cryptology ;$v8319 311 $a3-642-54068-6 327 $aA Problem-Based Approach for Computer-Aided Privacy Threat Identification -- Conceptual Framework and Architecture for Privacy Audit -- Privacy-Preserving Computation -- Designing Privacy-by-Design -- Enhancing Privacy by Design from a Developer?s Perspective -- A Solution, But Not a Panacea for Defending Privacy: The Challenges, Criticism and Limitations of Privacy by Design -- Integrating Anonymous Credentials with eIDs for Privacy-Respecting Online Authentication -- Federated Identity as Capabilities -- Privacy Preserving Course Evaluations in Greek Higher Education Institutes: An e-Participation Case Study with the Empowerment of Attribute Based Credentials -- Collection and Storage of Personal Data: A Critical View on Current Practices in the Transportation Sector -- ICT and Privacy: Barriers -- A Method for Analysing Traceability between Privacy Policies and Privacy Controls of Online Social Networks -- Electronic Footprints in the Sand: Technologies for Assisting Domestic Violence Survivors. 330 $aThis book constitutes revised selected papers from the First Annual Privacy Forum, APF 2012, held in Limassol, Cyprus, in October 2012. The 13 revised papers presented in this volume were carefully reviewed and selected from 26 submissions. They are organized in topical sections named: modelling; privacy by design; identity management and case studies. 410 0$aSecurity and Cryptology ;$v8319 606 $aComputers and civilization 606 $aComputer security 606 $aE-commerce 606 $aApplication software 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $ae-Commerce/e-business$3https://scigraph.springernature.com/ontologies/product-market-codes/I26000 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 615 0$aComputers and civilization. 615 0$aComputer security. 615 0$aE-commerce. 615 0$aApplication software. 615 14$aComputers and Society. 615 24$aSystems and Data Security. 615 24$ae-Commerce/e-business. 615 24$aInformation Systems Applications (incl. Internet). 676 $a005.8 702 $aPreneel$b Bart$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aIkonomou$b Demosthenes$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484849003321 996 $aPrivacy Technologies and Policy$91891838 997 $aUNINA