000 | 03293nam a22005295i 4500 | ||
---|---|---|---|
001 | 978-3-319-06749-0 | ||
003 | DE-He213 | ||
005 | 20200421112231.0 | ||
007 | cr nn 008mamaa | ||
008 | 140515s2014 gw | s |||| 0|eng d | ||
020 |
_a9783319067490 _9978-3-319-06749-0 |
||
024 | 7 |
_a10.1007/978-3-319-06749-0 _2doi |
|
050 | 4 | _aQA76.9.C66 | |
072 | 7 |
_aUBJ _2bicssc |
|
072 | 7 |
_aCOM079000 _2bisacsh |
|
082 | 0 | 4 |
_a004 _223 |
245 | 1 | 0 |
_aPrivacy Technologies and Policy _h[electronic resource] : _bSecond Annual Privacy Forum, APF 2014, Athens, Greece, May 20-21, 2014. Proceedings / _cedited by Bart Preneel, Demosthenes Ikonomou. |
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2014. |
|
300 |
_aXII, 191 p. 39 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v8450 |
|
505 | 0 | _aPrivacy by Design: From Technologies to Architectures -- PEARs: Privacy Enhancing Architectures -- Privacy-Preserving Statistical Data Analysis on Federated Databases -- Privacy by Encrypted Databases -- Accountable Surveillance Practices: Is the EU Moving in the Right Direction? -- TAM-VS: A Technology Acceptance Model for Video Surveillance -- Towards a Multidisciplinary Framework to Include Privacy in the Design of Video Surveillance Systems -- A Framework for Privacy Analysis of ICN Architectures -- Auctioning Privacy-Sensitive Goods: A Note on Incentive-Compatibility -- Privacy-ABCs to Leverage Identity Management as a Service -- My Data, Your Data, Our Data: Managing Privacy Preferences in Multiple Subjects Personal Data -- Towards Electronic Identification and Trusted Services for Biometric Authenticated Transactions in the Single Euro Payments Area. | |
520 | _aThis book constitutes the refereed proceedings of the Second Annual Privacy Forum, APF 2014, held in Athens, Greece, in May 2014. The 12 revised papers presented in this volume were carefully reviewed and selected from 21 submissions. The topics include: the concept and implementation of "privacy by design", with applications to encrypted databases; the study of video surveillance architectures and new networking concepts and innovative solutions for identity management. The papers address the technical, legal, and economic aspects of these problems. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer security. | |
650 | 0 | _aComputers and civilization. | |
650 | 0 | _aE-commerce. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aComputers and Society. |
650 | 2 | 4 | _aSystems and Data Security. |
650 | 2 | 4 | _ae-Commerce/e-business. |
650 | 2 | 4 | _aInformation Systems Applications (incl. Internet). |
700 | 1 |
_aPreneel, Bart. _eeditor. |
|
700 | 1 |
_aIkonomou, Demosthenes. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783319067483 |
830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v8450 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-319-06749-0 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-LNC | ||
942 | _cEBK | ||
999 |
_c57985 _d57985 |