Plus d’un million de livres à portée de main !
Bookbot

Simone Fischer

    Am Bauch abnehmen
    Trust, privacy, and security in digital business
    Privacy and identity management for life
    Privacy enhancing technologies
    Policies and research in identity management
    IT-security and privacy
    • IT-security and privacy

      • 351pages
      • 13 heures de lecture
      2,0(2)Évaluer

      Invasion of privacy and misuse of personal data are among the most obvious negative effects of today's information and communication technologies. Besides technical issues from a variety of fields, privacy legislation, depending on national activities and often lacking behind technical progress, plays an important role in designing, implementing, and using privacy-enhancing systems. Taking into account technical aspects from IT security, this book presents in detail a formal task-based privacy model which can be used to technically enforce legal privacy requirements. Furthermore, the author specifies how the privacy model policy has been implemented together with other security policies in accordance with the Generalized Framework for Access Control (GFAC). This book will appeal equally to R& D professionals and practitioners active in IT security and privacy, advanced students, and IT managers.

      IT-security and privacy
    • This book constitutes the refereed proceedings of the Third IFIP WG 11.6 Working Conference on Policies and Research in Identity Management, IDMAN 2013, held in London, UK, in April 2013. The 6 refereed full and 4 short papers presented together with 3 short position papers and a keynote paper were selected from 26 submissions. The papers have been organized into topical sections on privacy and identity management, anonymous credentials, authentication and access control, risk management of identity management, identity management with smart cards, and federated identity management.

      Policies and research in identity management
    • This book constitutes the refereed proceedings of the 10th International Symposium, PETS 2011, held in Waterloo, Canada, in July 2011. The 15 revised full papers were carefully reviewed and selected from 61 submissions. The papers address design and realization of privacy services for the Internet, other data systems and communication networks. Presenting novel research on all theoretical and practical aspects of privacy technologies, as well as experimental studies of fielded systems the volume also features novel technical contributions from other communities such as law, business, and data protection authorities, that present their perspectives on technological issues.

      Privacy enhancing technologies
    • This book constitutes the thoroughly refereed post conference proceedings of the 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, held in Helsingborg, Sweden, in August 2010. The 27 revised papers were carefully selected from numerous submissions during two rounds of reviewing. They are organized in topical sections on terminology, privacy metrics, ethical, social, and legal aspects, data protection and identity management, eID cards and eID interoperability, emerging technologies, privacy for eGovernment and AAL applications, social networks and privacy, privacy policies, and usable privacy.

      Privacy and identity management for life
    • This book presents the proceedings of the Third International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2006), held in Kraków, Poland, from September 5-7, 2006. Continuing from prior events in Zaragoza (2004) and Copenhagen (2005), the conference aimed to unite academic researchers and industry developers to discuss advancements in technology related to trust, privacy, and security in digital business. Attendees engaged in lively debates on emerging developments in this field. The program featured two keynote presentations, one panel session, and eight technical paper sessions. Keynote speakers included Jeremy Ward from Symantec EMEA, discussing “Building the Information Assurance Community of Purpose,” and Günter Karjoth from IBM Research - Zurich, who spoke on “Privacy Practices and Economics – From Privacy Policies to Privacy SLAs.” The panel discussion, chaired by Leszek T. Lilien from Western Michigan University, addressed the question, “Is Security Without Trust Feasible?” The reviewed paper sessions explored a variety of topics, including access control models, security and risk management, privacy and identity management, and security protocols. Out of 70 submissions, 24 papers were accepted after thorough reviews by four referees each.

      Trust, privacy, and security in digital business
    • Die Studienarbeit behandelt die theoretischen Grundlagen der Wettbewerbstheorie und analysiert natürliche Monopole sowie Marktversagen, insbesondere im Kontext der Strommärkte. Sie beleuchtet die Gründe für die Liberalisierung der Energiemärkte und stellt die europäische Elektrizitätsbinnenmarktrichtlinie vor. Ein Vergleich der Marktöffnungsgrade in verschiedenen EU-Ländern zeigt unterschiedliche Umsetzungen auf. Zudem wird die positive Auswirkung der Liberalisierung auf regenerative Energien und neue Technologien zur Stromerzeugung thematisiert. Abschließend gibt die Arbeit einen Ausblick auf zukünftige Entwicklungen.

      Die Liberalisierung der Energiemärkte in der Europäischen Union