000 | 03459nam a22006375i 4500 | ||
---|---|---|---|
001 | 978-3-319-31456-3 | ||
003 | DE-He213 | ||
005 | 20240730192824.0 | ||
007 | cr nn 008mamaa | ||
008 | 160309s2016 sz | s |||| 0|eng d | ||
020 |
_a9783319314563 _9978-3-319-31456-3 |
||
024 | 7 |
_a10.1007/978-3-319-31456-3 _2doi |
|
050 | 4 | _aQA76.9.C66 | |
072 | 7 |
_aUBJ _2bicssc |
|
072 | 7 |
_aCOM079000 _2bisacsh |
|
072 | 7 |
_aUBJ _2thema |
|
082 | 0 | 4 |
_a303.4834 _223 |
245 | 1 | 0 |
_aPrivacy Technologies and Policy _h[electronic resource] : _bThird Annual Privacy Forum, APF 2015, Luxembourg, Luxembourg, October 7-8, 2015, Revised Selected Papers / _cedited by Bettina Berendt, Thomas Engel, Demosthenes Ikonomou, Daniel Le Métayer, Stefan Schiffner. |
250 | _a1st ed. 2016. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2016. |
|
300 |
_aXIV, 213 p. 35 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v9484 |
|
505 | 0 | _aPrivacy by design (PbD) -- Attempt to combine technical and organizational measures to ensure the basic rights of the individual -- Measuring privacy -- Rules and principles -- Legal and economic perspectives on privacy. | |
520 | _aThis book constitutes the thoroughly refereed post-conference proceedings of the Third Annual Privacy Forum, APF 2015, held in Luxembourg, Luxembourg, in October 2015. The 11 revised full papers presented in this volume were carefully reviewed and selected from 24 submissions. The topics focus on privacy by design (PbD), i.e. the attempt to combine technical and organizational measures to ensure the basic rights of the individual. The papers are organized in three sessions: measuring privacy; rules and principles; legal and economic perspectives on privacy. | ||
650 | 0 |
_aComputers and civilization. _921733 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aElectronic commerce. _95589 |
|
650 | 0 |
_aApplication software. _9151421 |
|
650 | 0 |
_aAlgorithms. _93390 |
|
650 | 1 | 4 |
_aComputers and Society. _931668 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_ae-Commerce and e-Business. _931772 |
650 | 2 | 4 |
_aComputer and Information Systems Applications. _9151422 |
650 | 2 | 4 |
_aAlgorithms. _93390 |
700 | 1 |
_aBerendt, Bettina. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9151423 |
|
700 | 1 |
_aEngel, Thomas. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9151424 |
|
700 | 1 |
_aIkonomou, Demosthenes. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9151425 |
|
700 | 1 |
_aLe Métayer, Daniel. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9151426 |
|
700 | 1 |
_aSchiffner, Stefan. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9151427 |
|
710 | 2 |
_aSpringerLink (Online service) _9151428 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783319314556 |
776 | 0 | 8 |
_iPrinted edition: _z9783319314570 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v9484 _9151429 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-319-31456-3 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c94453 _d94453 |