Privacy and Identity Management for Emerging Services and Technologies
Editat de Marit Hansen, Jaap-Henk Hoepman, Ronald Leenes, Diane Whitehouseen Limba Engleză Hardback – 7 mai 2014
| Toate formatele și edițiile | Preț | Express |
|---|---|---|
| Paperback (1) | 335.99 lei 38-44 zile | |
| Springer Berlin, Heidelberg – 3 sep 2016 | 335.99 lei 38-44 zile | |
| Hardback (1) | 349.76 lei 38-44 zile | |
| Springer – 7 mai 2014 | 349.76 lei 38-44 zile |
Preț: 349.76 lei
Preț vechi: 437.20 lei
-20% Nou
Puncte Express: 525
Preț estimativ în valută:
61.91€ • 72.16$ • 54.14£
61.91€ • 72.16$ • 54.14£
Carte tipărită la comandă
Livrare economică 16-22 ianuarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783642551369
ISBN-10: 364255136X
Pagini: 264
Ilustrații: XII, 249 p. 41 illus. in color.
Dimensiuni: 160 x 241 x 20 mm
Greutate: 0.57 kg
Ediția:2014
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 364255136X
Pagini: 264
Ilustrații: XII, 249 p. 41 illus. in color.
Dimensiuni: 160 x 241 x 20 mm
Greutate: 0.57 kg
Ediția:2014
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Two of the Grand Changes through Computer and Network Technology.- The Draft Data Protection Regulation and the Development of Data Processing Applications.- Privacy Management and Accountability in Global Organisations.- Concepts Around Privacy-Preserving Attribute-Based Credentials: Making Authentication with Anonymous Credentials Practical.- Privacy Respecting ICT Innovations in Education: Electronic Course Evaluations in Higher Education and Beyond.- How can Cloud Users be Supported in Deciding on, Tracking and Controlling How their Data are Used?.- Privacy Versus Collective Security: Drivers and Barriers Behind a Trade-off.- Privacy in the Life-Cycle of IT Services – An Investigation of Process Reference Models.- Forgetting Bits and Pieces: An Exploration of the ”Right to Be Forgotten” as Implementation of ”Forgetting” in Online Memory Processes.- An Advanced, Privacy-Friendly Loyalty System.- Securus: From Confidentiality and Access Requirements to Data Outsourcing Solutions.- Problem-Based Consideration of Privacy-Relevant Domain Knowledge.- Extending Signatures of Reputation.- Preserving Privacy in Production.- User Search with Knowledge Thresholds in Decentralized Online Social Networks.- An Explorative Mapping of the Belgian Social Media Marketing Value Network and Its Usage of Personal Identifiable Information.- Privacy Issues in Cross-Border Identity Management Systems: Pan-European Case.- Constructing Security: Reflections on the Margins of a Case Study of the Use of Electronic Identification in ICT Platforms in Schools.- Mobile Devices to the Identity Rescue.