Digital Privacy (Record no. 181403)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 04755nam a22006495i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-642-19050-6 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | DE-He213 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240423125746.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 110412s2011 gw | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9783642190506 |
-- | 978-3-642-19050-6 |
024 7# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 10.1007/978-3-642-19050-6 |
Source of number or code | doi |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA76.9.C66 |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UBJ |
Source | bicssc |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM079000 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UBJ |
Source | thema |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 303.4834 |
Edition number | 23 |
245 10 - TITLE STATEMENT | |
Title | Digital Privacy |
Medium | [electronic resource] : |
Remainder of title | PRIME - Privacy and Identity Management for Europe / |
Statement of responsibility, etc | edited by Jan Camenisch, Ronald Leenes, Dieter Sommer. |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2011. |
264 #1 - | |
-- | Berlin, Heidelberg : |
-- | Springer Berlin Heidelberg : |
-- | Imprint: Springer, |
-- | 2011. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 800 p. 105 illus., 58 illus. in color. |
Other physical details | online resource. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
490 1# - SERIES STATEMENT | |
Series statement | Security and Cryptology, |
International Standard Serial Number | 2946-1863 ; |
Volume number/sequential designation | 6545 |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Part I Privacy and Identity Management -- An Introduction to Privacy-Enhancing Identity Management -- Part II Setting the Stage -- The Identity Landscape -- The Need for Privacy-Enhancing Identity Management -- Regulating Identity Management -- User-Centric Privacy-Enhancing Identity Management -- Privacy-Enhancing Identity Management in Business -- Part III What Technology Can Do for Privacy and How -- Introduction: Privacy, Trust, and Identity Management -- Architecture -- Pseudonyms and Private Credentials -- Privacy Models and Languages: Access Control and Data -- Privacy Models and Languages: Obligation Policies -- Privacy Models and Languages: Assurance Checking -- Privacy-Aware Access Control System -- Privacy-Aware Identity Lifecycle Management -- Privacy Assurance Checking -- Security/Trustworthiness Assessment of Platforms -- Further Privacy Mechanisms -- Reputation Management -- Human-Computer Interaction -- Technology Assurance -- Multilateral Interactions -- Part IV PRIME Applied -- Collaborative E-Learning -- Location-Based Services -- e-Health -- Airport Security Controls -- Privacy and Identity Management Requirements -- Part V Conclusion and Outlook. |
520 ## - SUMMARY, ETC. | |
Summary, etc | This book documents the R&D outcome of the PRIME Project, an R&D project partially funded by the European Union’s Sixth Framework Programme and the Swiss Federal Office for Education and Science. PRIME has focused on privacy-enhancing identity management techniques and systems to support users’ sovereignty over their personal privacy and enterprises’ privacy-compliant data processing. During the course of four years, the project has involved over a hundred researchers and professionals from 22 major European academic and industrial organizations conducting R&D work in areas relevant to digital privacy. The book presents 28 detailed chapters organized in five parts: - Introductory summary - Legal, social, and economic aspects - Realization of privacy-enhancing user-centric identity management - Exploitation of PRIME results for applications - Conclusions drawn and an outlook on future work As the first coherent presentation of the topic, this book will serve as a valuable source of reference and inspiration for anybody working on digital privacy. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computers and civilization. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Electronic data processing |
General subdivision | Management. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Application software. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer science. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Information technology |
General subdivision | Management. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Cryptography. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Data encryption (Computer science). |
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computers and Society. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | IT Operations. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer and Information Systems Applications. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Models of Computation. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer Application in Administrative Data Processing. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Cryptology. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Camenisch, Jan. |
Relator term | editor. |
Relator code | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Leenes, Ronald. |
Relator term | editor. |
Relator code | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Sommer, Dieter. |
Relator term | editor. |
Relator code | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
710 2# - ADDED ENTRY--CORPORATE NAME | |
Corporate name or jurisdiction name as entry element | SpringerLink (Online service) |
773 0# - HOST ITEM ENTRY | |
Title | Springer Nature eBook |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Display text | Printed edition: |
International Standard Book Number | 9783642190490 |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Display text | Printed edition: |
International Standard Book Number | 9783642190513 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
Uniform title | Security and Cryptology, |
-- | 2946-1863 ; |
Volume number/sequential designation | 6545 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://doi.org/10.1007/978-3-642-19050-6">https://doi.org/10.1007/978-3-642-19050-6</a> |
912 ## - | |
-- | ZDB-2-SCS |
912 ## - | |
-- | ZDB-2-SXCS |
912 ## - | |
-- | ZDB-2-LNC |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks-CSE-Springer |
No items available.