𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

IT-Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms

✍ Scribed by Simone Fischer-Hübner (eds.)


Publisher
Springer-Verlag Berlin Heidelberg
Year
2001
Tongue
English
Leaves
360
Series
Lecture Notes in Computer Science 1958
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Invasion of privacy and misuse of personal data are among the most obvious negative effects of today's information and communication technologies. Besides technical issues from a variety of fields, privacy legislation, depending on national activities and often lacking behind technical progress, plays an important role in designing, implementing, and using privacy-enhancing systems.
Taking into account technical aspects from IT security, this book presents in detail a formal task-based privacy model which can be used to technically enforce legal privacy requirements. Furthermore, the author specifies how the privacy model policy has been implemented together with other security policies in accordance with the Generalized Framework for Access Control (GFAC).
This book will appeal equally to R&D professionals and practitioners active in IT security and privacy, advanced students, and IT managers.

✦ Table of Contents


Introduction....Pages 1-4
Privacy in the Global Information Society....Pages 5-33
IT-Security....Pages 35-106
Privacy-Enhancing Technologies....Pages 107-165
A Task-Based Privacy Model....Pages 167-200
Specification and Implementation of the Privacy Policy Following the Generalised Framework for Access Control- Approach....Pages 201-257
Concluding Remarks....Pages 259-260
Appendix A: Formal Mathematical Privacy Model....Pages 261-323
Appendix B: Implementation of a Hospital Scenario as a Demonstration Example....Pages 325-330

✦ Subjects


Management of Computing and Information Systems; Computers and Society; Computer Communication Networks; Data Encryption; Business Information Systems


πŸ“œ SIMILAR VOLUMES


Practical Data Privacy: Enhancing Privac
✍ Katharine Jarmul πŸ“‚ Library πŸ“… 2023 πŸ› O'Reilly Media 🌐 English

<p><span>Between major privacy regulations like the GDPR and CCPA and expensive and notorious data breaches, there has never been so much pressure to ensure data privacy. Unfortunately, integrating privacy into data systems is still complicated. This essential guide will give you a fundamental under

Practical Data Privacy: Enhancing Privac
✍ Katharine Jarmul πŸ“‚ Library πŸ› O'Reilly Media 🌐 English

<p><span>Between major privacy regulations like the GDPR and CCPA and expensive and notorious data breaches, there has never been so much pressure to ensure data privacy. Unfortunately, integrating privacy into data systems is still complicated. This essential guide will give you a fundamental under

Cyber defense mechanisms security, priva
✍ Kumar, Gautam(Editor);Saini, Dinesh Kumar(Editor);Cuong, Nguyen Ha Huy(Editor) πŸ“‚ Library πŸ“… 2020;2021 πŸ› CRC Press 🌐 English

This book discusses the evolution of security and privacy issues and brings related technological tools, techniques, and solutions into one single source.γ€€γ€€γ€€γ€€<br /><br />The book will take readers on a journey to understanding the security issues and possible solutions involving various threats, att

Security and Privacy
✍ Joseph Savirimuthu πŸ“‚ Library πŸ“… 2016 πŸ› Routledge 🌐 English

During the last decade in particular the levels of critical engagement with the challenges posed for privacy by the new technologies have been on the rise. Many scholars have continued to explore the big themes in a manner which typifies the complex interplay between privacy, identity, security and

Security And Privacy
✍ Joseph Savirimuthu πŸ“‚ Library πŸ“… 2016 πŸ› Routledge/Taylor & Francis Group 🌐 English

During the last decade in particular the levels of critical engagement with the challenges posed for privacy by the new technologies have been on the rise. Many scholars have continued to explore the big themes in a manner which typifies the complex interplay between privacy, identity, security and