<p><span>Between major privacy regulations like the GDPR and CCPA and expensive and notorious data breaches, there has never been so much pressure to ensure data privacy. Unfortunately, integrating privacy into data systems is still complicated. This essential guide will give you a fundamental under
IT-Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms
β Scribed by Simone Fischer-HΓΌbner (eds.)
- Publisher
- Springer-Verlag Berlin Heidelberg
- Year
- 2001
- Tongue
- English
- Leaves
- 360
- Series
- Lecture Notes in Computer Science 1958
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Invasion of privacy and misuse of personal data are among the most obvious negative effects of today's information and communication technologies. Besides technical issues from a variety of fields, privacy legislation, depending on national activities and often lacking behind technical progress, plays an important role in designing, implementing, and using privacy-enhancing systems.
Taking into account technical aspects from IT security, this book presents in detail a formal task-based privacy model which can be used to technically enforce legal privacy requirements. Furthermore, the author specifies how the privacy model policy has been implemented together with other security policies in accordance with the Generalized Framework for Access Control (GFAC).
This book will appeal equally to R&D professionals and practitioners active in IT security and privacy, advanced students, and IT managers.
β¦ Table of Contents
Introduction....Pages 1-4
Privacy in the Global Information Society....Pages 5-33
IT-Security....Pages 35-106
Privacy-Enhancing Technologies....Pages 107-165
A Task-Based Privacy Model....Pages 167-200
Specification and Implementation of the Privacy Policy Following the Generalised Framework for Access Control- Approach....Pages 201-257
Concluding Remarks....Pages 259-260
Appendix A: Formal Mathematical Privacy Model....Pages 261-323
Appendix B: Implementation of a Hospital Scenario as a Demonstration Example....Pages 325-330
β¦ Subjects
Management of Computing and Information Systems; Computers and Society; Computer Communication Networks; Data Encryption; Business Information Systems
π SIMILAR VOLUMES
<p><span>Between major privacy regulations like the GDPR and CCPA and expensive and notorious data breaches, there has never been so much pressure to ensure data privacy. Unfortunately, integrating privacy into data systems is still complicated. This essential guide will give you a fundamental under
This book discusses the evolution of security and privacy issues and brings related technological tools, techniques, and solutions into one single source.γγγγ<br /><br />The book will take readers on a journey to understanding the security issues and possible solutions involving various threats, att
During the last decade in particular the levels of critical engagement with the challenges posed for privacy by the new technologies have been on the rise. Many scholars have continued to explore the big themes in a manner which typifies the complex interplay between privacy, identity, security and
During the last decade in particular the levels of critical engagement with the challenges posed for privacy by the new technologies have been on the rise. Many scholars have continued to explore the big themes in a manner which typifies the complex interplay between privacy, identity, security and