000 | 03567nam a22006615i 4500 | ||
---|---|---|---|
001 | 978-3-540-45150-1 | ||
003 | DE-He213 | ||
005 | 20240423132441.0 | ||
007 | cr nn 008mamaa | ||
008 | 121227s2001 gw | s |||| 0|eng d | ||
020 |
_a9783540451501 _9978-3-540-45150-1 |
||
024 | 7 |
_a10.1007/3-540-45150-1 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
100 | 1 |
_aFischer-Hübner, Simone. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
245 | 1 | 0 |
_aIT-Security and Privacy _h[electronic resource] : _bDesign and Use of Privacy-Enhancing Security Mechanisms / _cby Simone Fischer-Hübner. |
250 | _a1st ed. 2001. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2001. |
|
300 |
_aXIV, 358 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v1958 |
|
505 | 0 | _aPrivacy in the Global Information Society -- IT-Security -- Privacy-Enhancing Technologies -- A Task-Based Privacy Model -- Specification and Implementation of the Privacy Policy Following the Generalised Framework for Access Control- Approach -- Concluding Remarks -- Appendix A: Formal Mathematical Privacy Model -- Appendix B: Implementation of a Hospital Scenario as a Demonstration Example. | |
520 | _aInvasion of privacy and misuse of personal data are among the most obvious negative effects of today's information and communication technologies. Besides technical issues from a variety of fields, privacy legislation, depending on national activities and often lacking behind technical progress, plays an important role in designing, implementing, and using privacy-enhancing systems. Taking into account technical aspects from IT security, this book presents in detail a formal task-based privacy model which can be used to technically enforce legal privacy requirements. Furthermore, the author specifies how the privacy model policy has been implemented together with other security policies in accordance with the Generalized Framework for Access Control (GFAC). This book will appeal equally to R&D professionals and practitioners active in IT security and privacy, advanced students, and IT managers. | ||
650 | 0 | _aData protection. | |
650 | 0 | _aCryptography. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aComputer networks . | |
650 | 0 |
_aElectronic data processing _xManagement. |
|
650 | 0 | _aComputers and civilization. | |
650 | 0 | _aBusiness information services. | |
650 | 1 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aCryptology. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aIT Operations. |
650 | 2 | 4 | _aComputers and Society. |
650 | 2 | 4 | _aIT in Business. |
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783540421429 |
776 | 0 | 8 |
_iPrinted edition: _z9783662172735 |
830 | 0 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v1958 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/3-540-45150-1 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
912 | _aZDB-2-BAE | ||
942 | _cSPRINGER | ||
999 |
_c187884 _d187884 |