000 03567nam a22006615i 4500
001 978-3-540-45150-1
003 DE-He213
005 20240423132441.0
007 cr nn 008mamaa
008 121227s2001 gw | s |||| 0|eng d
020 _a9783540451501
_9978-3-540-45150-1
024 7 _a10.1007/3-540-45150-1
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
100 1 _aFischer-Hübner, Simone.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 0 _aIT-Security and Privacy
_h[electronic resource] :
_bDesign and Use of Privacy-Enhancing Security Mechanisms /
_cby Simone Fischer-Hübner.
250 _a1st ed. 2001.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2001.
300 _aXIV, 358 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v1958
505 0 _aPrivacy in the Global Information Society -- IT-Security -- Privacy-Enhancing Technologies -- A Task-Based Privacy Model -- Specification and Implementation of the Privacy Policy Following the Generalised Framework for Access Control- Approach -- Concluding Remarks -- Appendix A: Formal Mathematical Privacy Model -- Appendix B: Implementation of a Hospital Scenario as a Demonstration Example.
520 _aInvasion of privacy and misuse of personal data are among the most obvious negative effects of today's information and communication technologies. Besides technical issues from a variety of fields, privacy legislation, depending on national activities and often lacking behind technical progress, plays an important role in designing, implementing, and using privacy-enhancing systems. Taking into account technical aspects from IT security, this book presents in detail a formal task-based privacy model which can be used to technically enforce legal privacy requirements. Furthermore, the author specifies how the privacy model policy has been implemented together with other security policies in accordance with the Generalized Framework for Access Control (GFAC). This book will appeal equally to R&D professionals and practitioners active in IT security and privacy, advanced students, and IT managers.
650 0 _aData protection.
650 0 _aCryptography.
650 0 _aData encryption (Computer science).
650 0 _aComputer networks .
650 0 _aElectronic data processing
_xManagement.
650 0 _aComputers and civilization.
650 0 _aBusiness information services.
650 1 4 _aData and Information Security.
650 2 4 _aCryptology.
650 2 4 _aComputer Communication Networks.
650 2 4 _aIT Operations.
650 2 4 _aComputers and Society.
650 2 4 _aIT in Business.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783540421429
776 0 8 _iPrinted edition:
_z9783662172735
830 0 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v1958
856 4 0 _uhttps://doi.org/10.1007/3-540-45150-1
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
912 _aZDB-2-BAE
942 _cSPRINGER
999 _c187884
_d187884