What constitutes an identity, how do new technologies affect identity, how do we manage identities in a globally networked information society? The increasing div- sity of information and communication technologies and their equally wide range of usage in personal, professional and official capacities raise challenging questions of identity in a variety of contexts. The aim of the IFIP/FIDIS Summer Schools has been to encourage young a- demic and industry entrants to share their own ideas about privacy and identity m- agement and to build up collegial relationships with others. As such, the…mehr
What constitutes an identity, how do new technologies affect identity, how do we manage identities in a globally networked information society? The increasing div- sity of information and communication technologies and their equally wide range of usage in personal, professional and official capacities raise challenging questions of identity in a variety of contexts. The aim of the IFIP/FIDIS Summer Schools has been to encourage young a- demic and industry entrants to share their own ideas about privacy and identity m- agement and to build up collegial relationships with others. As such, the Summer Schools have been introducing participants to the social implications of information technology through the process of informed discussion. The 4th International Summer School took place in Brno, Czech Republic, during September 1-7, 2008. It was organized by IFIP (International Federation for Infor- tion Processing) working groups 9.2 (Social Accountability), 9.6/11.7 (IT Misuse and the Law) and 11.6 (Identity Management) in cooperation with the EU FP6 Network of Excellence FIDIS and Masaryk University in Brno. The focus of the event was on security and privacy issues in the Internet environment, and aspects of identity m- agement in relation to current and future technologies in a variety of contexts.
Produktdetails
Produktdetails
IFIP Advances in Information and Communication Technology 298
Historic Perspective - Lessons Learned or Not?.- Software Security - The Dangers of Abstraction.- History of Privacy.- Information, Ethics, Identifiers.- Applied Ethics and eHealth: Principles, Identity, and RFID.- Identity Management Systems in Healthcare: The Issue of Patient Identifiers.- A Survey on Transparency Tools for Enhancing Privacy.- Privacy Issues.- When Spiders Bite: The Use, Misuse, and Unintended Consequences of "Silent Information".- Data Retention and Anonymity Services.- A Survey on Non-transferable Anonymous Credentials.- Wireless Security and Privacy.- Security of Wireless Communication.- Enhancing Multilateral Security in and by Reputation Systems.- Challenges of Emerging Technologies.- An Overview of Electronic Passport Security Features.- Location Privacy Issues in Wireless Sensor Networks.- Privacy-Enhanced and Anonymous Applications.- Design and Analysis of a Practical E-Voting Protocol.- Business and Organisational Perspectives.- Comparing Identity Management Frameworks in a Business Context.- Security Policy Satisfiability and Failure Resilience in Workflows.- Privacy Awareness and Individual Control.- User Control Problems and Taking User Empowerment Further.- Privacy Awareness: A Means to Solve the Privacy Paradox?.- Testing Privacy Awareness.- The Relationship between Data Protection Legislation and Information Security Related Standards.- Anonymity Attacks and Analysis.- Investigating Anonymity in Group Based Anonymous Authentication.
Historic Perspective - Lessons Learned or Not?.- Software Security - The Dangers of Abstraction.- History of Privacy.- Information, Ethics, Identifiers.- Applied Ethics and eHealth: Principles, Identity, and RFID.- Identity Management Systems in Healthcare: The Issue of Patient Identifiers.- A Survey on Transparency Tools for Enhancing Privacy.- Privacy Issues.- When Spiders Bite: The Use, Misuse, and Unintended Consequences of "Silent Information".- Data Retention and Anonymity Services.- A Survey on Non-transferable Anonymous Credentials.- Wireless Security and Privacy.- Security of Wireless Communication.- Enhancing Multilateral Security in and by Reputation Systems.- Challenges of Emerging Technologies.- An Overview of Electronic Passport Security Features.- Location Privacy Issues in Wireless Sensor Networks.- Privacy-Enhanced and Anonymous Applications.- Design and Analysis of a Practical E-Voting Protocol.- Business and Organisational Perspectives.- Comparing Identity Management Frameworks in a Business Context.- Security Policy Satisfiability and Failure Resilience in Workflows.- Privacy Awareness and Individual Control.- User Control Problems and Taking User Empowerment Further.- Privacy Awareness: A Means to Solve the Privacy Paradox?.- Testing Privacy Awareness.- The Relationship between Data Protection Legislation and Information Security Related Standards.- Anonymity Attacks and Analysis.- Investigating Anonymity in Group Based Anonymous Authentication.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826