LEADER 04042nam 22006615 450 001 996203598303316 005 20200702135446.0 010 $a3-319-06749-4 024 7 $a10.1007/978-3-319-06749-0 035 $a(CKB)3710000000119140 035 $a(DE-He213)978-3-319-06749-0 035 $a(SSID)ssj0001246459 035 $a(PQKBManifestationID)11814284 035 $a(PQKBTitleCode)TC0001246459 035 $a(PQKBWorkID)11342132 035 $a(PQKB)10976349 035 $a(MiAaPQ)EBC3093562 035 $a(PPN)17878270X 035 $a(EXLCZ)993710000000119140 100 $a20140515d2014 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aPrivacy Technologies and Policy$b[electronic resource] $eSecond Annual Privacy Forum, APF 2014, Athens, Greece, May 20-21, 2014, Proceedings /$fedited by Bart Preneel, Demosthenes Ikonomou 205 $a1st ed. 2014. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2014. 215 $a1 online resource (XII, 191 p. 39 illus.) 225 1 $aSecurity and Cryptology ;$v8450 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-319-06748-6 327 $aPrivacy by Design: From Technologies to Architectures -- PEARs: Privacy Enhancing Architectures -- Privacy-Preserving Statistical Data Analysis on Federated Databases -- Privacy by Encrypted Databases -- Accountable Surveillance Practices: Is the EU Moving in the Right Direction? -- TAM-VS: A Technology Acceptance Model for Video Surveillance -- Towards a Multidisciplinary Framework to Include Privacy in the Design of Video Surveillance Systems -- A Framework for Privacy Analysis of ICN Architectures -- Auctioning Privacy-Sensitive Goods: A Note on Incentive-Compatibility -- Privacy-ABCs to Leverage Identity Management as a Service -- My Data, Your Data, Our Data: Managing Privacy Preferences in Multiple Subjects Personal Data -- Towards Electronic Identification and Trusted Services for Biometric Authenticated Transactions in the Single Euro Payments Area. 330 $aThis book constitutes the refereed proceedings of the Second Annual Privacy Forum, APF 2014, held in Athens, Greece, in May 2014. The 12 revised papers presented in this volume were carefully reviewed and selected from 21 submissions. The topics include: the concept and implementation of "privacy by design", with applications to encrypted databases; the study of video surveillance architectures and new networking concepts and innovative solutions for identity management. The papers address the technical, legal, and economic aspects of these problems. 410 0$aSecurity and Cryptology ;$v8450 606 $aComputers and civilization 606 $aComputer security 606 $aE-commerce 606 $aApplication software 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $ae-Commerce/e-business$3https://scigraph.springernature.com/ontologies/product-market-codes/I26000 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 615 0$aComputers and civilization. 615 0$aComputer security. 615 0$aE-commerce. 615 0$aApplication software. 615 14$aComputers and Society. 615 24$aSystems and Data Security. 615 24$ae-Commerce/e-business. 615 24$aInformation Systems Applications (incl. Internet). 676 $a004 702 $aPreneel$b Bart$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aIkonomou$b Demosthenes$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a996203598303316 996 $aPrivacy Technologies and Policy$91891838 997 $aUNISA