Camenisch, Jan.

Digital Privacy PRIME - Privacy and Identity Management for Europe / [electronic resource] : edited by Jan Camenisch, Ronald Leenes, Dieter Sommer. - Approx. 800 p. online resource. - Lecture Notes in Computer Science, 6545 0302-9743 ; . - Lecture Notes in Computer Science, 6545 .

Part I Privacy and Identity Management -- An Introduction to Privacy-Enhancing Identity Management -- Part II Setting the Stage -- The Identity Landscape -- The Need for Privacy-Enhancing Identity Management -- Regulating Identity Management -- User-Centric Privacy-Enhancing Identity Management -- Privacy-Enhancing Identity Management in Business -- Part III What Technology Can Do for Privacy and How -- Introduction: Privacy, Trust, and Identity Management -- Architecture -- Pseudonyms and Private Credentials -- Privacy Models and Languages: Access Control and Data -- Privacy Models and Languages: Obligation Policies -- Privacy Models and Languages: Assurance Checking -- Privacy-Aware Access Control System -- Privacy-Aware Identity Lifecycle Management -- Privacy Assurance Checking -- Security/Trustworthiness Assessment of Platforms -- Further Privacy Mechanisms -- Reputation Management -- Human-Computer Interaction -- Technology Assurance -- Multilateral Interactions -- Part IV PRIME Applied -- Collaborative E-Learning -- Location-Based Services -- e-Health -- Airport Security Controls -- Privacy and Identity Management Requirements -- Part V Conclusion and Outlook.

This book documents the R&D outcome of the PRIME Project, an R&D project partially funded by the European Union’s Sixth Framework Programme and the Swiss Federal Office for Education and Science.  PRIME has focused on privacy-enhancing identity management techniques and systems to support users’ sovereignty over their personal privacy and enterprises’ privacy-compliant data processing. During the course of four years, the project has involved over a hundred researchers and professionals from 22 major European academic and industrial organizations conducting R&D work in areas relevant to digital privacy. The book presents 28 detailed chapters organized in five parts: -       Introductory summary -       Legal, social, and economic aspects -       Realization of privacy-enhancing user-centric identity management -       Exploitation of PRIME results for applications -       Conclusions drawn and an outlook on future work As the first coherent presentation of the topic, this book will serve as a valuable source of reference and inspiration for anybody working on digital privacy.

9783642190506

10.1007/978-3-642-19050-6 doi


Computer science.
Data encryption (Computer science).
Information systems.
Information Systems.
Computer Science.
Computers and Society.
Management of Computing and Information Systems.
Information Systems Applications (incl.Internet).
Models and Principles.
Computer Appl. in Administrative Data Processing.
Data Encryption.

QA76.9.C66

004

2017 | The Technical University of Kenya Library | +254(020) 2219929, 3341639, 3343672 | library@tukenya.ac.ke | Haile Selassie Avenue