0

My Bag

0.00

Download App

Digital Privacy: PRIME - Privacy and Identity Management for Europe 4.0%OFF

Digital Privacy: PRIME - Privacy and Identity Management for Europe

by Camenisch Jan, Leenes Ronald and Sommer Dieter

  • ISBN

    :  

    9783642190490

  • Publisher

    :  

    Springer

  • Subject

    :  

    Information Technology: General Issues, Computer Security

  • Binding

    :  

    Paperback

  • Pages

    :  

    800

  • Year

    :  

    2011

13563.0

4.0% OFF

13020.0

Buy Now

Shipping charges are applicable for books below Rs. 101.0

View Details

(Imported Edition) Estimated Shipping Time : 25-28 Business Days

View Details

Share it on

  • Description

    This book documents the R&D outcome of the PRIME Project, an R&D project partially funded by the European Union’s Sixth Framework Programme and the Swiss Federal Office for Education and Science. PRIME has focused on privacy-enhancing identity management techniques and systems to support users’ sovereignty over their personal privacy and enterprises’ privacy-compliant data processing. During the course of four years, the project has involved over a hundred researchers and professionals from 22 major European academic and industrial organizations conducting R&D work in areas relevant to digital privacy. The book presents 28 detailed chapters organized in five parts: Introductory summary Legal, social, and economic aspects Realization of privacy-enhancing user-centric identity management Exploitation of PRIME results for applications Conclusions drawn and an outlook on future work As the first coherent presentation of the topic, this book will serve as a valuable source of reference and inspiration for anybody working on digital privacy. Table of Contents Part I Privacy and Identity Management An Introduction to Privacy-Enhancing Identity Management Part II Setting the Stage The Identity Landscape The Need for Privacy-Enhancing Identity Management Regulating Identity Management User-Centric Privacy-Enhancing Identity Management Privacy-Enhancing Identity Management in Business Part III What Technology Can Do for Privacy and How Introduction: Privacy, Trust, and Identity Management Architecture Pseudonyms and Private Credentials Privacy Models and Languages: Access Control and Data Privacy Modelsand Languages: Obligation Policies Privacy Models and Languages: Assurance Checking Privacy-Aware Access Control System Privacy-Aware Identity Lifecycle Management Privacy Assurance Checking Security/Trustworthiness Assessment of Platforms Further Privacy Mechanisms Reputation Management Human-Computer Interaction Technology Assurance Multilateral Interactions Part IV PRIME Applied Collaborative E-Learning Location-Based Services e-Health Airport Security Controls Privacy and Identity Management Requirements Part V Conclusion and Outlook. Index

Related Items

-

of

  • OFFER

    BEGINNING J2ME FROM NOVICE TO PROFESSIONAL(3rd Ed.

    Sing Li And Jonathan Knudsen

    Starts At

    303.0

    399.0

    24% OFF

  • OFFER

    Mission Moon

    Pallava Bagla

    Starts At

    312.0

    395.0

    21% OFF

  • OFFER

    The Book of Potentially Catastrophic Science

    Sean Connolly

    Starts At

    342.0

    450.0

    24% OFF

  • OFFER

    Connectome

    Seung S

    Starts At

    524.0

    699.0

    25% OFF

  • OFFER

    Image Cytometry (Microscopy Handbooks)

    P. Chieco

    Starts At

    6936.0

    9127.0

    24% OFF

  • OFFER

    Engineering Design Principles(arnold V)

    Ken Hurst

    Starts At

    6349.0

    8355.0

    24% OFF

  • OFFER

    Transform and Data Compression Handbook

    K. R. Rao

    Starts At

    3640.0

    4000.0

    9% OFF

  • OFFER

    Biology of Drosophila: Facsimile Edition

    Dietrich Bodenstein

    Starts At

    2615.0

    3583.0

    27% OFF

  • Drosophila Protocols

    Sullivan

    Starts At

    7023.0

  • OFFER

    Epigenetics

    C. David Allis

    Starts At

    5899.0

    7762.0

    24% OFF

  • OFFER

    Worm: The First Digital World War

    Mark Bowden

    Starts At

    412.0

    550.0

    25% OFF

  • Securing Business Information: Strategies to Protect the Enterprise and Its Network

    Chrisitan F. Byrnes

    Starts At

    1105.0

  • OFFER

    Hacking Matter: Levitating Chairs, Quantum Mirages, and the Infinite Weirdness of Programmable Atoms

    Wil Mccarthy

    Starts At

    376.0

    495.0

    24% OFF

  • OFFER

    The Code Book : The Secret History of Codes and Code-breaking

    Simon Singh

    Starts At

    379.0

    499.0

    24% OFF

© 2016, All rights are reserved.

Subscribe to Our Newsletter

 

Are you sure you want to remove the item from your Bag?

Yes

No

Added to Your Wish List

OK

Your Shopping Bag

- 2 Items

null

Item

Delivery

Unit Price

Quantity

Sub Total

Shipping Charges : 0.0 Total Savings        : Grand Total :

Order Summary