Privacy and Identity Management for Emerging Services and Technologies [electronic resource] 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers / edited by Marit Hansen, Jaap-Henk Hoepman, Ronald Leenes, Diane Whitehouse.

This book contains a range of keynote papers and submitted papers presented at the 7th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, held in Nijmegen, The Netherlands, in June 2013. The 13 revised full papers and 6 keynote papers included in this volume were carefully selected...

Full description

Bibliographic Details
Uniform Title:IFIP AICT Tutorials ; 421
Corporate Author: SpringerLink (Online service)
Other Authors: Hansen, Marit (Editor)
Hoepman, Jaap-Henk (Editor)
Leenes, Ronald (Editor)
Whitehouse, Diane (Editor)
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2014.
Edition:1st ed. 2014.
Series:IFIP AICT Tutorials ; 421
Subjects:
Online Access:
Format: Electronic eBook
Contents:
  • Two of the Grand Changes through Computer and Network Technology
  • The Draft Data Protection Regulation and the Development of Data Processing Applications
  • Privacy Management and Accountability in Global Organisations
  • Concepts Around Privacy-Preserving Attribute-Based Credentials: Making Authentication with Anonymous Credentials Practical
  • Privacy Respecting ICT Innovations in Education: Electronic Course Evaluations in Higher Education and Beyond
  • How can Cloud Users be Supported in Deciding on, Tracking and Controlling How their Data are Used?
  • Privacy Versus Collective Security: Drivers and Barriers Behind a Trade-off
  • Privacy in the Life-Cycle of IT Services – An Investigation of Process Reference Models
  • Forgetting Bits and Pieces: An Exploration of the ”Right to Be Forgotten” as Implementation of ”Forgetting” in Online Memory Processes
  • An Advanced, Privacy-Friendly Loyalty System
  • Securus: From Confidentiality and Access Requirements to Data Outsourcing Solutions
  • Problem-Based Consideration of Privacy-Relevant Domain Knowledge
  • Extending Signatures of Reputation
  • Preserving Privacy in Production
  • User Search with Knowledge Thresholds in Decentralized Online Social Networks
  • An Explorative Mapping of the Belgian Social Media Marketing Value Network and Its Usage of Personal Identifiable Information
  • Privacy Issues in Cross-Border Identity Management Systems: Pan-European Case
  • Constructing Security: Reflections on the Margins of a Case Study of the Use of Electronic Identification in ICT Platforms in Schools
  • Mobile Devices to the Identity Rescue.