Policies and Research in Identity Management : Third IFIP WG 11.6 Working Conference, IDMAN 2013, London, UK, April 8-9, 2013, Proceedings / / edited by Simone Fischer-Hübner, Elisabeth de Leeuw, Chris J. Mitchell |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (X, 161 p. 34 illus.) |
Disciplina | 005.8 |
Collana | IFIP Advances in Information and Communication Technology |
Soggetto topico |
Data protection
Cryptography Data encryption (Computer science) Biometric identification Computers, Special purpose Electronic data processing - Management Data and Information Security Cryptology Biometrics Special Purpose and Application-Based Systems IT Operations |
ISBN | 3-642-37282-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Towards Practical Attribute-Based Identity Management: The IRMA -- Data Protection by Default in Identity-Related Applications -- Privacy-Friendly Checking of Remote Token Blacklists -- Concepts and Languages for Privacy-Preserving Attribute-Based Authentication -- Efficient Selective Disclosure on Smart Cards Using Idemix -- Identity Management and Integrity Protection in Publish-Subscribe Systems.-Extended HTTP Digest Access Authentication -- Executable Model-Based Risk Assessment Method for Identity Management Systems -- Privacy Risk Analysis is about Understanding Conflicting Incentives -- Risk Analysis of Identity Management Approaches Employing Privacy Protection Goals -- The Radboud Reader: A Minimal Trusted Smartcard Reader for Securing Online Transactions -- Extending EMV Payment Smart Cards with Biometric On-Card Verification -- Dynamic Identity Federation Using Security Assertion Markup Language (SAML) -- Logout in Single Sign-on Systems. |
Record Nr. | UNINA-9910741142403321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Privacy and Identity Management for the Future Internet in the Age of Globalisation : 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Patras, Greece, September 7-12, 2014, Revised Selected Papers / / edited by Jan Camenisch, Simone Fischer-Hübner, Marit Hansen |
Pubbl/distr/stampa | Heidelberg : , : Srpinger, , 2015 |
Descrizione fisica | 1 recurso en línea (X, 267 p. 44 illus.) |
Collana | IFIP Advances in Information and Communication Technology |
Soggetto topico |
Data protection
Electronic data processing - Management Computers and civilization Protección de la información (Informática) Sistemas de información Internet (Red informática) - Derecho y legislación Data and Information Security IT Operations Computers and Society |
ISBN |
3-319-18621-3
9783319186207 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | ABC4Trust: Protecting Privacy in Identity Management by Bringing Privacy-ABCs into Real-Life -- Towards an Engineering Model of Privacy-Related Decisions -- The Value of Personal Data -- Privacy and Security Perceptions of European Citizens: A Test of the Trade-Off Model -- Privacy and Confidentiality in Service Science and Big Data Analytics -- The Court of Justice of the European Union, Data Retention and the Rights to Data Protection and Privacy – Where Are We Now? -- EUROSUR – A Sci-fi Border Zone Patrolled by Drones? -- Anonymous e Petitions – Another Step Towards e Democracy -- A Brief Evaluation of Icons in the First Reading of the European Parliament on COM (2012) 0011 -- Privacy by Design – The Case of Automated Border Control -- Patterns in Privacy - A Pattern-Based Approach for Assessments -- A Survey on Multimodal Biometrics and the Protection of Their Templates -- Event Invitations in Privacy-Preserving DOSNs: Formalization and Protocol Design -- Blank Digital Signatures: Optimization and Practical Experiences -- Tools for Cloud Accountability: A4Cloud Tutorial -- Privacy for Peer Profiling in Collective Adaptive Systems -- ABC4Trust Workshop on Core Features of Privacy-ABCs, Practical Use and Legal Issues. |
Record Nr. | UNINA-9910299228903321 |
Heidelberg : , : Srpinger, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Privacy and Identity Management. Facing up to Next Steps : 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Karlstad, Sweden, August 21-26, 2016, Revised Selected Papers / / edited by Anja Lehmann, Diane Whitehouse, Simone Fischer-Hübner, Lothar Fritsch, Charles Raab |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XII, 279 p. 31 illus.) |
Disciplina | 005.8 |
Collana | IFIP AICT Tutorials |
Soggetto topico |
Computer security
Data protection Management information systems Computer science Application software Computers and civilization Systems and Data Security Security Management of Computing and Information Systems Information Systems Applications (incl. Internet) Computers and Society |
ISBN | 3-319-55783-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Big Data -- Big Data Privacy and Anonymization -- Data Protection by Design and by Default à la European General Data Protection Regulation -- Evaluating Websites and Their Adherence to Data Protection Principles: Tools and Experiences -- Privacy in the Human Brain Project: The Perspective of Ethics Management -- Smart Cars Cruising on the Road Paved with Good Intentions? Workshop on Big Data Applications and Individual Rights under the New European General Data Protection Regulation.-Opportunities and Challenges of CREDENTIAL -- Co-development of RRI Framework to Emphasize Privacy and Data Protection -- Evidence-Based Methods for Privacy and Identity Management -- Enforcing Data Protection Law: the Role of the Supervisory Authorities in Theory and Practice -- Not Just User Control in the General Data Protection Regulation. On the Problems with Choice and Paternalism, and on the Point of Data Protection -- Visualizing Exports of Personal Data by Exercising the Right of Data Portability in the Data Track - Are People Ready for This? -- Cloud Computing Contracts Regulatory Issues and Cloud Service Providers' Offers: An Analysis -- Using Differential Privacy for the Internet of Things -- Implicit Bias in Predictive Data Profiling within Recruitments -- A Survey of Security Analysis in Federated Identity Management -- The Impact of Users' Affect States on Privacy Concern -- Privacy Salience: Taxonomies and Research Opportunities. |
Record Nr. | UNINA-9910254998803321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data : 13th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Vienna, Austria, August 20-24, 2018, Revised Selected Papers / / edited by Eleni Kosta, Jo Pierson, Daniel Slamanig, Simone Fischer-Hübner, Stephan Krenn |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (X, 291 p. 175 illus., 29 illus. in color.) |
Disciplina | 005.8 |
Collana | IFIP AICT Tutorials |
Soggetto topico |
Computer security
Computers Application software User interfaces (Computer systems) Artificial intelligence Systems and Data Security Computing Milieux Information Systems Applications (incl. Internet) User Interfaces and Human Computer Interaction Computer Appl. in Social and Behavioral Sciences Artificial Intelligence |
ISBN | 3-030-16744-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A Causal Bayesian Networks Viewpoint on Fairness -- Sharing is caring, a boundary object approach to mapping and discussing personal data processing -- Who You Gonna Call When There's Something Wrong in Your Processing? Risk Assessment and Data Breach Notications in Practice -- Design and Security Assessment of Usable Multi-Factor Authentication and Single Sign-On Solutions for Mobile Applications: A Workshop Experience Report -- Towards Empowering the Human for Privacy Online -- Trust and Distrust: On Sense and Nonsense in Big Data -- GDPR transparency requirements and data privacy vocabularies -- Glycos: the basis for a peer-to-peer, private online social network -- GDPR and the Concept of Risk: The Role of risk, the Scope of risk and the technology involved -- Privacy Patterns for Pseudonymity -- Implementing GDPR in the Charity Sector: A Case Study -- Me and My Robot! Sharing Information with a New Friend -- chownIoT: Enhancing IoT Privacy by Automated Handling of Ownership Change -- Is Privacy Controllable? -- Assessing Theories for Research on Personal Data Transparency -- Data Protection by Design for cross-border electronic identication: does the eIDAS Interoperability Framework need to be modernised? -- Risk proling by law enforcement agencies in the Big Data era: Is there a need for transparency? |
Record Nr. | UNINA-9910337860503321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Privacy and Identity Management. The Smart Revolution : 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers / / edited by Marit Hansen, Eleni Kosta, Igor Nai-Fovino, Simone Fischer-Hübner |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XI, 371 p. 54 illus.) |
Disciplina | 005.8 |
Collana | IFIP AICT Tutorials |
Soggetto topico |
Computer security
Data protection Computers and civilization User interfaces (Computer systems) Artificial intelligence Computer organization Systems and Data Security Security Computers and Society User Interfaces and Human Computer Interaction Artificial Intelligence Computer Systems Organization and Communication Networks |
ISBN | 3-319-92925-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | The Smart World -- Towards Organizing the Growing Knowledge on Privacy Engineering -- Data Protection by Design: Promises and Perils in Crossing the Rubicon Between Law and Engineering -- Anonymity Online: Current Solutions and Challenges -- Is It Harmful? Re-examining Privacy Concerns -- Forget About Privacy ... or Not? -- From Privacy to Algorithms' Fairness -- The Consent Paradox: Accounting for the Prominent Role of Consent in Data Protection -- Life-Long Privacy in the IoT? Measuring Privacy Attitudes Throughout the Life-Cycle of IoT Devices -- Secure and Privacy-Friendly Storage and Data Processing in the Cloud -- On Anonymizing Streaming Crime Data: A Solution Approach for Resource Constrained Environments -- Towards a Broadening of Privacy Decision-Making Models: the Use of Cognitive Architectures -- Data Protection Impact Assessment: A Hands-On Tour of the GDPR's Most Practical Tool -- Designing a GDPR-compliant and Usable Privacy Dashboard -- Blockchain-Based Identity Management and Data Usage Control -- Identification Services for Online Social Networks (OSNs) -- Cyber Security & Privacy Experiments: A Design and Reporting Toolkit -- Privacy and Socially Assistive Robots - A Meta Study -- From the Glass House to the Hive: The Private Sphere in the Era of Intelligent Home Assistant Robots : A Comparative Study of Android and iOS Mobile Applications' Data -- Handling Practices versus Compliance to Privacy -- Privacy Concerns and Behavior of Pokémon Go Players in Germany -- mHealth Applications for Goal Management Training – Privacy Engineering in Neuropsychological Studies -- NFC Payments: Gaps Between User Perception and Reality -- Real-world Identification for an Extensible and Privacy-Preserving Mobile eID. |
Record Nr. | UNINA-9910299282603321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Privacy and Identity Management. Time for a Revolution? : 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers / / edited by David Aspinall, Jan Camenisch, Marit Hansen, Simone Fischer-Hübner, Charles Raab |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 recurso en línea (XII, 359 p. 78 ilus.) |
Collana |
FIP Advances in Information and Communication Technology
IFIP AICT Tutorials |
Soggetto topico |
Computer security
Management information systems Computer science Computers and civilization Seguridad informática Systems and Data Security Management of Computing and Information Systems Computers and Society |
ISBN |
3-319-41763-0
9783319417622 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Modelling the Relationship between Privacy and Security Perceptions and the Acceptance of Surveillance Practices -- The US Privacy Strategy -- Smart Society: Collaboration between Humans and Machines, Promises and Perils -- An Experience with a De-identifying Task to Inform about Privacy Issues -- A4CloudWorkshop: Accountability in the Cloud -- Signatures for Privacy, Trust and Accountability in the Cloud: Applications and Requirements -- Report on the Workshop on Assessing the Maturity of Privacy Enhancing Technologies -- Smart Technologies: Workshop on Challenges and Trends for Privacy in a Hyper-connected World -- Privacy Pattern Catalogue: A Tool for Integrating Privacy Principles of ISO/IEC 29100 into the Software Development Process -- Developing a Structured Metric to Measure Privacy Risk in Privacy Impact Assessments -- Accountability in the EU Data Protection Reform - Moving from Theory to Practice -- Towards Authenticity and Privacy Preserving Accountable Workflows -- A Technique for Enhanced Provision of Appropriate Access to Evidence across Service Provision Chains -- Evidence-Based Security and Privacy Assurance in Cloud Ecosystems -- Enhanced Assurance about Cloud Service Provision Promises -- ALOC: Attribute Level of Confidence for a User-Centric Attribute Assurance -- Identity Theft through e-Government Services: Government to Pay the Bill? -- "All Your Data Are Belong to Us ". European Perspectives on Privacy Issues in Free Online Machine Translation Services -- Identification of Online Gamblers in the EU: A Two-Edged Sword -- Can Courts Provide Effective Remedies against Violations of Fundamental Rights by Mass Surveillance? The Case of the United Kingdom -- Automated Log Audits for Privacy Compliance Validation: A Literature Survey -- Privacy-Preserving Access Control in Publicly Readable Storage Systems -- Ontology-Based Obfuscation and Anonymisation for Privacy - A Case Study on Healthcare. |
Record Nr. | UNINA-9910254991203321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Privacy Enhancing Technologies [[electronic resource] ] : 12th International Symposium, PETS 2012, Vigo, Spain, July 11-13, 2012, Proceedings / / edited by Simone Fischer-Hübner, Matthew Wright |
Edizione | [1st ed. 2012.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 |
Descrizione fisica | 1 online resource (X, 319 p. 89 illus.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer communication systems Computer security Management information systems Computer science Computers and civilization Algorithms Cryptology Computer Communication Networks Systems and Data Security Management of Computing and Information Systems Computers and Society Algorithm Analysis and Problem Complexity |
ISBN | 3-642-31680-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996465394503316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Privacy Enhancing Technologies [[electronic resource] ] : 11th International Symposium, PETS 2011, Waterloo, ON, Canada, July 27-29, 2011, Proceedings / / edited by Simone Fischer-Hübner, Nicholas Hopper |
Edizione | [1st ed. 2011.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 |
Descrizione fisica | 1 online resource (X, 285 p.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer communication systems Computer security Management information systems Computer science Computers and civilization Algorithms Cryptology Computer Communication Networks Systems and Data Security Management of Computing and Information Systems Computers and Society Algorithm Analysis and Problem Complexity |
ISBN | 3-642-22263-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996465770003316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Secure IT Systems [[electronic resource] ] : 19th Nordic Conference, NordSec 2014, Tromsø, Norway, October 15-17, 2014, Proceedings / / edited by Karin Bernsmed, Simone Fischer-Hübner |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XII, 296 p. 81 illus.) |
Disciplina | 004 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Biometrics (Biology) Systems and Data Security Cryptology Biometrics |
ISBN | 3-319-11599-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Accountability in Cloud Service Provision Ecosystems -- Information Management and Data Privacy -- Information Classification Issues -- DEICS: Data Erasure in Concurrent Software -- A Practical Analysis of Oblivious Sorting Algorithms for Secure Multi-party Computation -- Cloud, Big Data and Virtualization Security -- Security of OS-Level Virtualization Technologies -- Processing Private Queries over an Obfuscated Database Using Hidden Vector Encryption -- π-Cipher: Authenticated Encryption for Big Data -- What Would it Take for You to Tell Your Secrets to a Cloud? - Studying Decision Factors When Disclosing Information to Cloud Services -- Network Security and Logging -- Efficient Record-Level Keyless Signatures for Audit Logs -- Static Semantics of Secret Channel Abstractions -- Browser Randomisation against Fingerprinting: A Quantitative Information Flow Approach -- Attacks and Defenses -- Attacker Profiling in Quantitative Security Assessment Based on Attack Trees -- Denial-of-Service Mitigation for Internet Services -- Spook in Your Network: Attacking an SDN with a Compromised OpenFlow Switch -- Security in Healthcare and Biometrics -- Patients’ Privacy Protection against Insurance Companies in eHealth Systems -- Segmentation and Normalization of Human Ears Using Cascaded Pose Regression -- Poster Papers -- Dynamic Enforcement of Dynamic Policies -- Availability by Design -- Pareto Efficient Solutions of Attack Trees -- Verification of Stateful Protocols: Set-Based Abstractions in the Applied π–Calculus -- Improvement Proposal for the CryptoCloak Application -- Process Tracking for Forensic Readiness -- Computationally Analyzing the ISO 9798–2.4 Authentication Protocol -- Differential Privacy and Private Bayesian Inference -- Event Invitations in Privacy-Preserving DOSNs: Formalization and Protocol Design -- Attacks on Privacy-Preserving Biometric Authentication. |
Record Nr. | UNISA-996213651103316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Secure IT Systems : 19th Nordic Conference, NordSec 2014, Tromsø, Norway, October 15-17, 2014, Proceedings / / edited by Karin Bernsmed, Simone Fischer-Hübner |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XII, 296 p. 81 illus.) |
Disciplina | 004 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Biometrics (Biology) Systems and Data Security Cryptology Biometrics |
ISBN | 3-319-11599-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Accountability in Cloud Service Provision Ecosystems -- Information Management and Data Privacy -- Information Classification Issues -- DEICS: Data Erasure in Concurrent Software -- A Practical Analysis of Oblivious Sorting Algorithms for Secure Multi-party Computation -- Cloud, Big Data and Virtualization Security -- Security of OS-Level Virtualization Technologies -- Processing Private Queries over an Obfuscated Database Using Hidden Vector Encryption -- π-Cipher: Authenticated Encryption for Big Data -- What Would it Take for You to Tell Your Secrets to a Cloud? - Studying Decision Factors When Disclosing Information to Cloud Services -- Network Security and Logging -- Efficient Record-Level Keyless Signatures for Audit Logs -- Static Semantics of Secret Channel Abstractions -- Browser Randomisation against Fingerprinting: A Quantitative Information Flow Approach -- Attacks and Defenses -- Attacker Profiling in Quantitative Security Assessment Based on Attack Trees -- Denial-of-Service Mitigation for Internet Services -- Spook in Your Network: Attacking an SDN with a Compromised OpenFlow Switch -- Security in Healthcare and Biometrics -- Patients’ Privacy Protection against Insurance Companies in eHealth Systems -- Segmentation and Normalization of Human Ears Using Cascaded Pose Regression -- Poster Papers -- Dynamic Enforcement of Dynamic Policies -- Availability by Design -- Pareto Efficient Solutions of Attack Trees -- Verification of Stateful Protocols: Set-Based Abstractions in the Applied π–Calculus -- Improvement Proposal for the CryptoCloak Application -- Process Tracking for Forensic Readiness -- Computationally Analyzing the ISO 9798–2.4 Authentication Protocol -- Differential Privacy and Private Bayesian Inference -- Event Invitations in Privacy-Preserving DOSNs: Formalization and Protocol Design -- Attacks on Privacy-Preserving Biometric Authentication. |
Record Nr. | UNINA-9910483195603321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|