The Resource Privacy and identity management for life : 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Trento, Italy, September 5-9, 2011, Revised selected papers, Jan Camenisch...[et al.] (eds.), (electronic resource)

Privacy and identity management for life : 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Trento, Italy, September 5-9, 2011, Revised selected papers, Jan Camenisch...[et al.] (eds.), (electronic resource)

Label
Privacy and identity management for life : 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Trento, Italy, September 5-9, 2011, Revised selected papers
Title
Privacy and identity management for life
Title remainder
7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Trento, Italy, September 5-9, 2011, Revised selected papers
Statement of responsibility
Jan Camenisch...[et al.] (eds.)
Creator
Contributor
Subject
Genre
Language
eng
Member of
Additional physical form
Also available in print
Cataloging source
OCoLC
Dewey number
005.8
Index
index present
LC call number
QA76.9.A25
LC item number
I35 2011
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
Series statement
IFIP advances in information and communication technology,
Series volume
375
Label
Privacy and identity management for life : 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Trento, Italy, September 5-9, 2011, Revised selected papers, Jan Camenisch...[et al.] (eds.), (electronic resource)
Publication
Antecedent source
file reproduced from original
Bibliography note
Includes bibliographical references and author index
http://library.link/vocab/branchCode
  • net
Color
mixed
Contents
  • Extracting Access Control and Conflict Resolution Policies from European Data Protection Law
  • Kaniz Fatema, David W. Chadwick and Brendan Van Alsenoy
  • Early Lessons Learned in the ENDORSE Project: Legal Challenges and Possibilities in Developing Data Protection Compliance Software
  • Sandra Olislaegers
  • The Infrastructure Level of Cloud Computing as a Basis for Privacy and Security of Software Services
  • Ina Schiering and Jan Kretschmer
  • (More) Side Channels in Cloud Storage
  • Linking Data to Users
  • Tobias Pulls
  • Who Got All of My Personal Data? Enabling Users to Monitor the Proliferation of Shared Personally Identifiable Information
  • Are They Making Our Privates Public? - Emerging Risks of Governmental Open Data Initiatives
  • Sebastian Labitzke
  • Exploring Touch-Screen Biometrics for User Identification on Smart Phones
  • Julio Angulo and Erik Wästlund
  • Using a Smartphone to Access Personalized Web Services on a Workstation
  • Faysal Boukayoua, Jan Vossaert, Bart De Decker and Vincent Naessens
  • Designing Privacy-Enhancing Mobile Applications
  • Koen Decroix, Bart De Decker and Vincent Naessens
  • Extending Comparison Shopping Sites by Privacy Information on Retailers
  • Ulrich König and Marit Hansen
  • Do-Not-Track Techniques for Browsers and Their Implications for Consumers
  • Thomas P. Keenan
  • Martin Beck and Michael Marhöfer
  • P2P Social Networks with Broadcast Encryption Protected Privacy
  • Oleksandr Bodriagov and Sonja Buchegger
  • Privacy by Design: Does It Matter for Social Networks?
  • Mohammad Badiul Islam and Renato Iannella
  • Privacy Preserving Mechanisms for a Pervasive eHealth System
  • Milica Milutinovic, Koen Decroix, Vincent Naessens and Bart De Decker
  • Formalising Requirements for a Biobank Case Study Using a Logic for Consent and Revocation
  • Ioannis Agrafiotis, Sadie Creese and Michael Goldsmith
  • Privacy Protection Goals and Their Implications for eID Systems
  • Top 10 Mistakes in System Design from a Privacy Perspective and Privacy Protection Goals
  • Harald Zwingelberg and Marit Hansen
  • Avoiding Man-in-the-Middle Attacks When Verifying Public Terminals
  • Gergely Alpár and Jaap-Henk Hoepman
  • Massive Data Collection by Mistake?
  • Arnold Roosendaal
  • Addressing Governance and Ethics in European Technology Development Projects through Scenarios
  • Aygen Kurt and Penny Duquenoy
  • Marit Hansen
  • Developing a Strategy for Automated Privacy Testing Suites
  • Ioannis Agrafiotis, Sadie Creese and Michael Goldsmith
  • Assessing Formal Independence of Data Protection Authorities in a Comparative Perspective
  • Philip Schütz
Control code
000050021968
Dimensions
unknown
Extent
1 online resource
File format
unknown
Isbn
9783642316685
Level of compression
uncompressed
Quality assurance targets
unknown
http://library.link/vocab/recordID
.b26801759
Reformatting quality
access
Sound
unknown sound
Specific material designation
remote
System control number
  • (OCoLC)798652506
  • sks3642316689
System details
  • Mode of access: World Wide Web
  • System requirements: Internet connectivity, World Wide Web browser, and Adobe Acrobat

Library Locations

    • Deakin University Library - Geelong Waurn Ponds CampusBorrow it
      75 Pigdons Road, Waurn Ponds, Victoria, 3216, AU
      -38.195656 144.304955
Processing Feedback ...