Digital privacy: PRIME - privacy and identity management for Europe
Gespeichert in:
Format: | Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2011
|
Schriftenreihe: | Lecture notes in computer science
6545 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | Literaturangaben |
Beschreibung: | XXIX, 773 S. graph. Darst. 24 cm |
ISBN: | 9783642190490 3642190499 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV037374072 | ||
003 | DE-604 | ||
005 | 20110803 | ||
007 | t| | ||
008 | 110502s2011 xx d||| |||| 00||| eng d | ||
015 | |a 11,N02 |2 dnb | ||
016 | 7 | |a 1009310747 |2 DE-101 | |
020 | |a 9783642190490 |c kart. : EUR 93.09 (DE) (freier Pr.), ca. sfr 125.00 (freier Pr.) |9 978-3-642-19049-0 | ||
020 | |a 3642190499 |9 3-642-19049-9 | ||
024 | 3 | |a 9783642190490 | |
028 | 5 | 2 | |a Best.-Nr.: 80034561 |
035 | |a (OCoLC)725424193 | ||
035 | |a (DE-599)DNB1009310747 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-83 |a DE-11 |a DE-91G | ||
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a 004 |2 sdnb | ||
084 | |a DAT 460f |2 stub | ||
084 | |a 610 |2 sdnb | ||
084 | |a DAT 050f |2 stub | ||
084 | |a 380 |2 sdnb | ||
245 | 1 | 0 | |a Digital privacy |b PRIME - privacy and identity management for Europe |c Jan Camenisch ... (ed.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2011 | |
300 | |a XXIX, 773 S. |b graph. Darst. |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 6545 : State-of-the-art survey | |
490 | 0 | |a State-of-the-art survey | |
500 | |a Literaturangaben | ||
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Identitätsverwaltung |0 (DE-588)7546673-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Benutzerorientierung |0 (DE-588)4391852-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Anonymisierung |0 (DE-588)4139362-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Systemplattform |0 (DE-588)4674460-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Trusted Computing |0 (DE-588)7562931-8 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Identitätsverwaltung |0 (DE-588)7546673-9 |D s |
689 | 0 | 1 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 0 | 2 | |a Benutzerorientierung |0 (DE-588)4391852-9 |D s |
689 | 0 | 3 | |a Trusted Computing |0 (DE-588)7562931-8 |D s |
689 | 0 | 4 | |a Anonymisierung |0 (DE-588)4139362-4 |D s |
689 | 0 | 5 | |a Systemplattform |0 (DE-588)4674460-5 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Camenisch, Jan |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |t Digital Privacy |
830 | 0 | |a Lecture notes in computer science |v 6545 |w (DE-604)BV000000607 |9 6545 | |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=3644415&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=022527351&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-022527351 |
Datensatz im Suchindex
_version_ | 1820875300865572864 |
---|---|
adam_text |
IMAGE 1
CONTENTS
PART I: PRIVACY AND IDENTITY MANAGEMENT 1 AN INTRODUCTION TO
PRIVACY-ENHANCING IDENTITY MANAGEMENT 3
JAN CAMENISCH, RONALD LEENES, MARIT HANSEN, AND JAN SCHALLABOECK 1.1
MOTIVATION 4
1.2 A SCENARIO - ALICE GOES SHOPPING 6
1.3 PRIME ENABLED SHOPPING 7
1.3.1 PHASE 1: BUYER BEWARE 8
1.3.2 PHASE 2: PRE-SALES - STARTING FROM MAXIMUM PRIVACY 9
1.3.3 PHASE 3: ORDERING - INFORMED CONSENT AND PURPOSE LIMITATION 10
1.3.4 PHASE 4: AFTER-SALES AND DELIVERY - RETAINING CONTROL: POLICY
ENFORCEMENT 13
1.3.5 PHASE 5: CUSTOMER RELATIONSHIP - BUILDING THE RELATIONSHIP 14
1.3.6 PHASE 6: BEYOND BEING A CONNOISSEUR - ALICE'S OTHER IDENTITIES 15
1.4 THE BIGGER PICTURE 17
1.4.1 CONCEPTS AND HUMAN-COMPUTER INTERACTION 18 1.4.2 PUBLIC AWARENESS
18
1.4.3 ECONOMICS 19
1.4.4 REACHING OUT 20
1.5 REQUIREMENTS FOR IDENTITY MANAGEMENT SYSTEMS 20
REFERENCES 23
PART II: SETTING THE STAGE
2 OVERVIEW AND INTRODUCTION PART II 27
RONALD LEENES 2.1 INTRODUCTION 27
2.2 AN APPROACH FROM THREE PERSPECTIVES 29
2.3 STRUCTURE PART II 30
BIBLIOGRAFISCHE INFORMATIONEN HTTP://D-NB.INFO/1009310747
DIGITALISIERT DURCH
IMAGE 2
XVI CONTENTS
3 THE IDENTITY LANDSCAPE 33
BARI PRIEM, RONALD LEENES, ELENI KOSTA, AND ALEKSANDRA KUCZERAWY 3.1
INTRODUCTION 33
3.2 THE CONCEPT OF (ONLINE) IDENTITY 34
3.3 ASYMMETRIC PERSPECTIVES 35
3.3.1 THE ENTERPRISE-CENTRIC VIEW ON IDENTITY MANAGEMENT 35
3.3.2 A USER-CENTRIC VIEW ON IDENTITY MANAGEMENT 36 3.3.3 COMBINING THE
PERSPECTIVES 37
3.4 EVOLVING IDENTITY MANAGEMENT SYSTEMS 38
3.5 EXISTING IDENTITY MANAGEMENT APPLICATIONS 40
3.5.1 MICROSOFT PASSPORT 40
3.5.2 LIBERTY ALLIANCE 41
3.5.3 OPENID 42
3.5.4 MICROSOFT CARDSPACE 42
3.5.5 OTHER IDM SYSTEMS 43
3.6 COMPLICATING THE ONLINE IDENTITY LANDSCAPE 43
3.6.1 THE INTERNET AS A SOCIAL ENVIRONMENT 44
3.6.2 CUSTOMER EMPOWERMENT 44
3.6.3 IDENTITY-RELATED CRIME AND MISBEHAVIOUR 45
3.6.4 THE EXPANDING INTERNET: ALWAYS-ON AND EVERYWHERE 46
3.6.5 THE INTERNET OF THINGS AND THE CITIZENS OF TOMORROW 47
3.6.6 IDENTIFYING THE INDIVIDUAL IN THE ERA OF THE INTERNET OF THINGS 48
3.7 CONCLUSION 50
4 THE NEED FOR PRIVACY-ENHANCING IDENTITY MANAGEMENT 53
BART PRIEM, RONALD LEENES, ALEA FAIRCHILD, AND ELENI KOSTA 4.1
INTRODUCTION 53
4.2 INDIVIDUAL PERSPECTIVE 54
4.2.1 POWER IMBALANCE 55
4.2.2 RELATIONS 57
4.2.3 PERSONAL DEVELOPMENT 58
4.2.4 BEHAVIOUR, HEALTH, AND EMOTIONS 59
4.3 ORGANISATIONAL PERSPECTIVE 60
4.3.1 BUSINESS 60
4.3.2 GOVERNMENT SERVICES 63
4.4 SOCIETAL PERSPECTIVE 64
4.4.1 THE DETERMINATION OF PRIVACY IN SOCIAL CONTEXT 65 4.4.2 THE
CONTRIBUTION OF PRIVACY-ENHANCED IDM TO SOCIETY 66
4.5 CONCLUSION 70
IMAGE 3
CONTENTS XVII
5 REGULATING IDENTITY MANAGEMENT 73
ELENI KOSTA, ALEKSANDRA KUCZERAWY, RONALD LEENES, AND JOS DUMORTIER 5.1
INTRODUCTION 73
5.2 A BRIEF HISTORY OF EUROPEAN DATA PROTECTION REGULATION . . 74 5.2.1
THE EU DATA PROTECTION DIRECTIVE 76
5.2.2 THE EPRIVACY DIRECTIVE 78
5.2.3 OTHER RELEVANT DIRECTIVES 79
5.3 PRINCIPLES OF DATA PROCESSING 79
5.3.1 PRINCIPLES ON PROCESSING OF PERSONAL DATA 80
5.3.2 RIGHTS OF THE DATA SUBJECT 83
5.3.3 SPECIFIC REQUIREMENTS FOR ELECTRONIC COMMUNICATIONS SYSTEMS OR
APPLICATIONS 85
5.4 APPLICABILITY ISSUES OF THE CURRENT LEGAL FRAMEWORK 86 5.4.1 AN OLD
DIRECTIVE FOR NEW TECHNOLOGIES 86
5.4.2 THE ROLE OF THE EPRIVACY DIRECTIVE WITH REGARD TO THE CHALLENGES
POSED BY NEW TECHNOLOGIES 87
5.5 CONCLUSION 89
6 USER-CENTRIC PRIVACY-ENHANCING IDENTITY MANAGEMENT 91
BART PRIEM, ELENI KOSTA, ALEKSANDRA KUCZERAWY, JOS DUMORTIER, AND RONALD
LEENES 6.1 INTRODUCTION 91
6.2 SOURCES OF THE USER-PERSPECTIVE REQUIREMENTS 92
6.2.1 AUDIENCE SEGREGATION 92
6.2.2 USER CONTROL 94
6.2.3 ADOPTION OF PRIVACY-ENHANCED IDM IN SOCIETY 102 6.3 CONCLUSIONS
105
7 PRIVACY-ENHANCING IDENTITY MANAGEMENT IN BUSINESS . . . 107 ALEA
FAIRCHILD AND PIET RIBBERS 7.1 INTRODUCTION 107
7.2 BUSINESS MODEL FOR PRIVACY ENHANCEMENT 108
7.2.1 PRIVACY ADOPTION DRIVERS 108
7.2.2 PROCESS MATURITY FOR PRIVACY 113
7.2.3 RISK ANALYSIS FOR DATA PRIVACY 120
7.2.4 PRIVACY IMPACT ON BUSINESS PROCESS DESIGN 122
7.3 COST BENEFIT ANALYSIS OF PRIVACY 124
7.4 REQUIREMENTS FROM A BUSINESS PERSPECTIVE 127
7.5 CONCLUSION 129
REFERENCES 131
IMAGE 4
XVIII CONTENTS
PART III: WHAT TECHNOLOGY CAN DO FOR PRIVACY AND HOW
INTRODUCTION: PRIVACY, TRUST, AND IDENTITY MANAGEMENT 141
STEPHEN CRANE, SIANI PEARSON, AND DIETER SOMMER 8.1 TRUST 142
8.1.1 ANALYSIS OF TRUST 143
8.1.2 ESTABLISHING TRUST AND MANAGING PRIVACY 144 8.1.3 UNDERSTANDING
TRUST 144
8.2 STRUCTURE 147
ARCHITECTURE 151
DIETER SOMMER 9.1 INTRODUCTION 151
9.1.1 MOTIVATION AND GOALS 151
9.1.2 REALIZING THE GOALS: TECHNOLOGY 153
9.1.3 RELATED WORK 156
9.1.4 OUTLINE 158
9.2 ARCHITECTURE OVERVIEW 158
9.2.1 ONE PARTY IN THE SYSTEM 158
9.2.2 PARTIES AND INTERACTIONS 159
9.2.3 DATA 163
9.2.4 COMPONENTS 170
9.3 DATA MODEL 173
9.3.1 IDENTITY 174
9.3.2 CONSTANTS 176
9.3.3 FORMULAE IN FIRST-ORDER LOGIC 176
9.3.4 PREDICATES 177
9.3.5 CONNECTIVES 177
9.3.6 SUBJECT 178
9.3.7 IDENTIFIER OBJECTS 179
9.3.8 CERTIFICATION METADATA 181
9.3.9 CONDITIONAL RELEASE 182
9.3.10 ANONYMITY REVOCATION 184
9.3.11 TYPING 184
9.3.12 AUTOMATED REASONING 188
9.3.13 REQUESTS OF DATA 191
9.3.14 MATCHING DATA AGAINST REQUESTS 194
9.3.15 FURTHER DISCUSSION 196
9.4 DATA REPRESENTATION BASED ON OUR MODEL 199
9.4.1 IDENTIFIER RELATIONSHIPS 200
9.4.2 IDENTITY RELATIONSHIPS 201
9.4.3 DATA TRACK 206
9.4.4 PROFILE DATA 208
IMAGE 5
CONTENTS XIX
9.4.5 DATA STATEMENTS AND REQUESTS 209
9.5 IDENTITY MANAGEMENT CONCEPTS 210
9.5.1 PARTIAL IDENTITIES 210
9.6 DATA EXCHANGE ARCHITECTURE 212
9.6.1 ROLES IN AN ATTRIBUTE EXCHANGE SCENARIO 214
9.6.2 PRIVATE CERTIFICATE SYSTEMS 215
9.6.3 HIGH-LEVEL ARCHITECTURE 216
9.6.4 COMPONENT INTERFACE 217
9.6.5 COMPONENTS 234
9.6.6 ASPECTS OF SYSTEM ARCHITECTURE 237
9.7 AUTHORIZATION POLICIES 242
9.7.1 PARADIGMS OF AUTHORIZATION SYSTEMS 242
9.7.2 OUR APPROACH 243
9.7.3 LANGUAGE BASICS 244
9.7.4 LANGUAGE EXTENSIONS 245
9.7.5 RULE COMPOSITION 251
9.7.6 ASSOCIATING POLICIES WITH RESOURCES 252
9.7.7 ARCHITECTURAL INTEGRATION 258
9.8 DATA HANDLING POLICIES 260
9.8.1 MODEL 260
9.8.2 ASSOCIATION OF POLICIES WITH DATA 264
9.8.3 POLICY NEGOTIATION 267
9.8.4 CONCRETE REALIZATION IN THE PRIME PROTOTYPE 270 9.9 NEGOTIATION -
EXCHANGE OF DATA 271
9.9.1 OVERVIEW 272
9.9.2 NEGOTIATION MODEL 274
9.9.3 POLICY-DRIVEN NEGOTIATION 276
9.9.4 A ROUND OF NEGOTIATION 277
9.10 CONCLUSIONS 285
9.10.1 KEY CONTRIBUTIONS 285
9.10.2 EXPERIENCE 286
10 PSEUDONYMS AND PRIVATE CREDENTIALS 289
JAN CAMENISCH, MARKULF KOHLWEISS, AND DIETER SOMMER 10.1 INTRODUCTION
289
10.2 THE IDEMIX PRIVATE CREDENTIAL SYSTEM 290
10.2.1 BASIC PRINCIPLES OF STRONG AUTHENTICATION 290
10.2.2 BALANCING ANONYMITY AND ACCOUNTABILITY 291 10.3 THE IDEMIX SYSTEM
292
10.3.1 REQUIRED PROPERTIES WHEN SHOWING A CERTIFICATE . . . 292 10.3.2
CRYPTOGRAPHIC PRIMITIVES 294
10.3.3 CRYPTOGRAPHY FOR THE CONTROLLED RELEASE OF CERTIFIED DATA 297
10.4 BUILDING APPLICATIONS USING IDEMIX 300
10.4.1 AN ANONYMOUS CREDENTIAL SYSTEM 300
IMAGE 6
XX CONTENTS
10.4.2 ANONYMITY REVOCATION 302
10.4.3 BALANCING ANONYMITY AND ACCOUNTABILITY USING E-CASH TECHNIQUES
303
10.4.4 APPLICATION SCENARIOS 305
10.5 HISTORICAL NOTES 308
11 PRIVACY MODELS AND LANGUAGES: ACCESS CONTROL AND DATA HANDLING
POLICIES 309
CLAUDIO AGOSTINO ARDAGNA, SABRINA DE CAPITANI DI VIMERCATI, AND
PIERANGELA SAMARATI 11.1 INTRODUCTION 309
11.2 PRIVACY POLICY CATEGORIES 310
11.3 SCENARIO 311
11.4 ACCESS CONTROL MODEL AND LANGUAGE 313
11.4.1 BASIC CONCEPTS 313
11.4.2 FUNCTIONALITIES 315
11.4.3 DESCRIPTION OF THE ACCESS CONTROL LANGUAGE 316 11.5 DATA HANDLING
MODEL AND LANGUAGE 320
11.5.1 DESCRIPTION OF THE DATA HANDLING LANGUAGE 322 11.6 RELATED WORK
326
11.7 CONCLUSIONS 329
12 PRIVACY MODELS AND LANGUAGES: OBLIGATION POLICIES 331 MARCO CASASSA
MONT 12.1 INTRODUCTION TO PRIVACY OBLIGATION POLICIES 331
12.2 ANALYSIS OF PRIVACY OBLIGATIONS 332
12.3 REQUIREMENTS AND CONSTRAINTS 336
12.4 MODEL OF PRIVACY OBLIGATIONS 339
12.4.1 CONCEPTUAL VIEW 340
12.4.2 FORMAL VIEW 341
12.4.3 OPERATIONAL VIEW 342
12.4.4 RELATIONSHIPS WITH AC/DHP POLICIES 345
12.5 PRIVACY OBLIGATION POLICIES: LANGUAGE 346
12.6 PARAMETRIC OBLIGATION POLICIES 352
12.6.1 PARAMETRIC OBLIGATION POLICIES: MODEL 353
12.6.2 PARAMETRIC OBLIGATION POLICIES: REFERENCE SCENARIO. 355 12.6.3
PARAMETRIC OBLIGATION POLICIES: LANGUAGE 355 12.7 DISCUSSION 361
12.8 NEXT STEPS AND FUTURE R&D WORK 361
13 PRIVACY MODELS AND LANGUAGES: ASSURANCE CHECKING POLICIES 363
SIANI PEARSON 13.1 INTRODUCTION 363
13.1.1 PRINCIPLES 364
IMAGE 7
CONTENTS XXI
13.1.2 NATURAL LANGUAGE EXAMPLES 364
13.1.3 OVERVIEW OF DIFFERENT POTENTIAL APPROACHES 365 13.2 DEFINING
TRUST CONSTRAINTS: A LOWER LEVEL REPRESENTATION 365
13.3 DEFINING CLAUSES AS FIRST CLASS OBJECTS: A HIGHER-LEVEL
REPRESENTATION 368
13.3.1 CONCEPTUAL VIEW 368
13.3.2 EXAMPLES OF CLAUSES 370
13.3.3 FORMAL VIEW 371
13.3.4 OPERATIONAL VIEW 371
13.3.5 REPRESENTATION OF ASSURANCE POLICIES IN XML FORMAT 372
13.4 ANALYSIS 373
13.5 NEXT STEPS AND FUTURE RFCD WORK 375
14 PRIVACY-AWARE ACCESS CONTROL SYSTEM: EVALUATION AND DECISION 377
CLAUDIO AGOSTINO ARDAGNA, SABRINA DE CAPITANI DI VIMERCATI, EROS
PEDRINI, AND PIERANGELA SAMARATI 14.1 INTRODUCTION 377
14.2 INTERPLAY BETWEEN PARTIES 379
14.3 A PRIVACY-AWARE ACCESS CONTROL ARCHITECTURE 381
14.3.1 ACCESS CONTROL DECISION FUNCTION 381
14.3.2 POLICY MANAGEMENT 383
14.4 POLICY EVALUATION 384
14.5 A PRIVACY-AWARE ACCESS CONTROL SYSTEM PROTOTYPE 385 14.5.1 ACDF
PROTOTYPE 386
14.5.2 PM PROTOTYPE 388
14.6 PERFORMANCE ANALYSIS 389
14.6.1 THE EVALUATION FLOW 390
14.6.2 PERFORMANCE RESULTS 391
14.7 CONCLUSIONS 394
15 PRIVACY-AWARE IDENTITY LIFECYCLE MANAGEMENT 397
MARCO CASASSA MONT 15.1 PRIVACY-AWARE IDENTITY LIFECYCLE MANAGEMENT:
PRINCIPLES AND CONCEPTS 397
15.1.1 OBLIGATION MANAGEMENT FRAMEWORK 397
15.2 OBLIGATION MANAGEMENT SYSTEM 399
15.2.1 DESIGN RATIONALE 399
15.2.2 SYSTEM ARCHITECTURE 400
15.2.3 IMPLEMENTATION DETAILS 404
15.2.4 INTERACTION FLOW 411
15.2.5 EVENT MANAGEMENT FRAMEWORK 413
IMAGE 8
XXII CONTENTS
15.2.6 DATA REPOSITORY 414
15.2.7 ADMINISTRATION GUI 417
15.2.8 DISCUSSION 421
15.3 SCALABLE OBLIGATION MANAGEMENT SYSTEM 421
15.3.1 SCALABLE OBLIGATION MANAGEMENT FRAMEWORK 421 15.3.2 SYSTEM
ARCHITECTURE 423
15.4 DISCUSSION AND CONCLUSIONS 426
16 PRIVACY ASSURANCE CHECKING 427
SIANI PEARSON AND TARIQ ELAHI 16.1 INTRODUCTION 427
16.1.1 SCENARIOS CONSIDERED 429
16.1.2 HOW ASSURANCE CHECKING FITS IN WITH THE PRIME APPROACH 430
16.1.3 ASSURANCE CONTROL FRAMEWORK: OVERVIEW 432 16.2 PRIVACY COMPLIANCE
CHECKING SYSTEM 433
16.2.1 DESIGN RATIONALE 433
16.2.2 ARCHITECTURE 433
16.2.3 KEY INTERFACES 437
16.2.4 IMPLEMENTATION DETAILS 441
16.2.5 MAPPING AND CAPABILITY VALIDATION 443
16.2.6 DESCRIPTION OF PROTOCOL 445
16.2.7 ROLE OF THIRD PARTIES WITHIN THE TRUST CHAIN 449 16.2.8 EXTENSION
TO B2B SCENARIOS 451
16.3 COMPARISON WITH RELATED WORK 452
16.4 NEXT STEPS AND FUTURE R&D WORK 455
16.5 CONCLUSIONS 455
17 SECURITY/TRUSTWORTHINESS ASSESSMENT OF PLATFORMS 457 STEPHEN CRANE
AND SIANI PEARSON 17.1 INTRODUCTION 457
17.2 ASSESSMENT OF TRUST 457
17.2.1 TRUST IN AN ORGANISATION 458
17.2.2 TRUST 459
17.2.3 DETERMINING TRUSTWORTHINESS 459
17.2.4 SUMMARY 462
17.3 ASSESSING THE IMPACT OF COMPUTER SYSTEMS IN RELATION TO ON-LINE
TRUST 462
17.3.1 ANALYSIS OF ONLINE TRUST 462
17.3.2 HOW ON-LINE TRUST IS UNDERPINNED BY SOCIAL AND TECHNOLOGICAL
MECHANISMS 463
17.3.3 SUMMARY 464
17.4 DEPLOYING TRUSTED TECHNOLOGIES 465
17.4.1 TRUSTED COMPUTING TECHNOLOGY 465
IMAGE 9
CONTENTS XXIII
17.4.2 HOW TRUSTED PLATFORMS CAN PROVIDE PERSISTENT AND DYNAMIC TRUST
466
17.4.3 SUMMARY 468
17.5 USE OF TRUSTED COMPUTING TO ENHANCE PRIVACY 469
17.5.1 INTRODUCTION 469
17.5.2 HOW TRUSTED COMPUTING PLATFORM TECHNOLOGY CAN ENHANCE PRIVACY 469
17.5.3 PRIVACY ENHANCING SAFEGUARDS OF TRUSTED COMPUTING TECHNOLOGY 470
17.5.4 HOW SUCH BUILDING BLOCKS CAN BE USED 472
17.5.5 POTENTIAL NEGATIVE PRIVACY IMPLICATIONS OF TRUSTED COMPUTING 474
17.5.6 CONCLUDING REMARKS 476
17.6 PRIME PLATFORM TRUST MANAGER (PTM) 477
17.6.1 TRUST HANDLER (TH) 480
17.6.2 TRUST REAL-TIME MONITOR (TRM) 480
17.6.3 PLATFORM TRUST STATUS (PTS) 480
17.6.4 TRUST COMMUNICATOR (TC) 481
17.6.5 REPUTATION MANAGER (RM) 482
17.6.6 TRUST WRAPPER (TW) 482
17.7 REPUTATION MANAGEMENT 482
17.7.1 OBJECTIVE REPUTATION ASSESSMENT 482
17.7.2 PRIVACY PREFERENCES AND PRIVACY OBLIGATIONS 483 17.8 CONCLUSIONS
483
18 FURTHER PRIVACY MECHANISMS 485
ANAS ABOU EL KALAM, CARLOS AGUILAR MELCHOR, STEFAN BERTHOLD, JAN
CAMENISCH, SEBASTIAN CLAUSS, YVES DESWARTE, MARKULF KOHLWEISS, ANDRIY
PANCHENKO, LEXI PIMENIDIS, AND MATTHIEU ROY 18.1 PRIVACY MEASURES 485
18.1.1 FORMAL METHODS 487
18.1.2 PERSISTENT DATA AND STATISTICAL DATABASES 490
18.1.3 DATA-FLOW IN NETWORKS 492
18.1.4 GENERALIZATIONS 494
18.2 DATA ANONYMIZATION 502
18.2.1 INTRODUCTION 502
18.2.2 ANALYSIS OF SOME ANONYMIZATION EXAMPLES IN EUROPE AND THE USA 504
18.2.3 REQUIREMENTS FOR A SUITABLE IMPLEMENTATION 510 18.2.4 A GENERIC
ANONYMIZATION ARCHITECTURE 515
18.2.5 IMPLEMENTATION 518
18.2.6 DISCUSSION 519
18.2.7 CONCLUSIONS 520
18.3 ANONYMOUS COMMUNICATION 521
18.3.1 SCENARIO 522
IMAGE 10
XXIV CONTENTS
18.3.2 TECHNIQUES AND APPROACHES 526
18.3.3 THREATS IN ANONYMOUS COMMUNICATION 540
18.3.4 LEGAL ISSUES 543
18.4 UNOBSERVABLE CONTENT ACCESS 543
18.4.1 PRIVATE INFORMATION RETRIEVAL AND OBLIVIOUS TRANSFER 545
18.4.2 ACCESS CONTROL FOR UNOBSERVABLE SERVICES 546
18.4.3 LOCATION-BASED SERVICES 547
18.4.4 CONCLUSION AND PRIME PERSPECTIVE 555
19 REPUTATION MANAGEMENT AS AN EXTENSION OF FUTURE IDENTITY MANAGEMENT
557
SANDRA STEINBRECHER, FRANZISKA PINGEL, AND ANDREAS JUSCHKA 19.1
INTRODUCTION 557
19.2 MODEL OF REPUTATION SYSTEMS 559
19.2.1 REPUTATION 559
19.2.2 REPUTATION NETWORK 560
19.3 REPUTATION WITHIN BLUES'N 563
19.3.1 CHARACTERISTICS OF A REPUTATION SYSTEM IN THE CONTEXT OF
COLLABORATIVE ELEARNING 563
19.3.2 BASIC DESIGN OF THE REPUTATION SYSTEM 563
19.4 REPUTATION AS SERVICE FOR PRIME APPLICATIONS 565
19.4.1 NECESSARY INFRASTRUCTURE 565
19.4.2 SYSTEM DESIGN 566
19.5 OUTLOOK 568
20 HUMAN-COMPUTER INTERACTION 569
SIMONE FISCHER-HUEBNER, JOHN SOEREN PETTERSSON, MIKE BERGMANN, MARIT
HANSEN, SIANI PEARSON, AND MARCO CASASSA MONT 20.1 INTRODUCTION 569
20.2 RELATED WORK 570
20.2.1 USER-FRIENDLY REPRESENTATION OF POLICY MANAGEMENT WITH THE HELP
OF DEFAULT SETTINGS 571 20.2.2 SECURE INTERFACES 571
20.2.3 MAPPING LEGAL PRIVACY REQUIREMENTS 572
20.2.4 MEDIATION OF TRUST 573
20.3 CHALLENGE I: USER-FRIENDLY REPRESENTATION OF COMPLEX PET CONCEPTS
573
20.3.1 SIMPLIFIED POLICY HANDLING 574
20.3.2 UI PARADIGMS FOR PRESENTING PRIVACY PREFERENCES . . . 577 20.4
CHALLENGE II: SECURE INTERFACES 581
20.5 CHALLENGE III: MAPPING LEGAL PRIVACY REQUIREMENTS 582 20.5.1
OBTAINING INFORMED CONSENT 582
20.5.2 ENHANCING TRANSPARENCY 587
IMAGE 11
CONTENTS XXV
20.6 CHALLENGE IV: MEDIATION OF TRUST 591
20.7 OUTLOOK 593
20.7.1 DISCLOSING DATA USING ANONYMOUS CREDENTIALS 593 20.7.2
NOTIFICATION ABOUT INCIDENTS 593
20.7.3 LINKABILITY COMPUTATION 594
20.7.4 HOW ONTOLOGIES CAN BE UTILISED FOR UI DESIGN 594
21 TECHNOLOGY ASSURANCE 597
TOBIAS SCHEMER AND LOTHAR FRITSCH 21.1 INTRODUCTION 597
21.1.1 COST OF TESTING 598
21.1.2 COMMON CRITERIA 599
21.2 EARLY SECURITY VALIDATION WITH CC 599
21.2.1 EVALUATION AND THE COMMON CRITERIA 599
21.2.2 BASIC PRECONDITIONS FOR AN EVALUATION 600
21.2.3 IMPLEMENTED SECURITY FUNCTIONS 601
21.2.4 THREAT ANALYSIS 601
21.2.5 TEST PLANS 602
21.2.6 THE DOCUMENTATION OF THE TEST RESULTS 603
21.2.7 EVALUATION PROCESS 603
21.2.8 EXPERIENCE WITH CC-BASED PROJECT EVALUATION 604 21.2.9 INTEGRATED
PROTOTYPE 604
21.2.10 LBS PROTOTYPE 605
21.2.11 ELEARNING PROTOTYPE 605
21.3 CONCLUSION 607
22 REQUIREMENTS FOR IDENTITY MANAGEMENT FROM THE PERSPECTIVE OF
MULTILATERAL INTERACTIONS 609
STEFANIE POETZSCH, KATRIN BORCEA-PFITZMANN, MARIT HANSEN, KATJA
LIESEBACH, ANDREAS PFITZMANN, AND SANDRA STEINBRECHER 22.1 INTRODUCTION
609
22.1.1 OBJECTIVE OF THE CHAPTER 609
22.1.2 USER-CONTROLLED IDENTITY MANAGEMENT: FROM CHAUM TO PRIME 610
22.2 MULTILATERAL INTERACTIONS USING THE EXAMPLE OF A COLLABORATIVE
ELEARNING SYSTEM 611
22.2.1 MULTILATERAL INTERACTIONS 611
22.2.2 STAKEHOLDERS 611
22.3 BUILDING BLOCKS OF A PRIVACY-ENHANCING IDENTITY MANAGEMENT SYSTEM
FOR MLI 613
22.3.1 PSEUDONYMS AND PARTIAL IDENTITIES 614
22.3.2 RELATIONSHIP INFORMATION 614
22.3.3 SEARCHING FOR AND FINDING OF INTERACTION PARTNERS. . 615 22.3.4
TRUST MANAGEMENT AND REPUTATION 616
22.3.5 AWARENESS INFORMATION 617
IMAGE 12
XXVI CONTENTS
22.3.6 CONTEXT AND HISTORY 617
22.3.7 ACCESS CONTROL 618
22.3.8 NEGOTIATION AND ENFORCEMENT OF PRIVACY POLICIES AND PREFERENCES
619
22.3.9 WORKFLOWS AND BEHAVIOUR PATTERNS 619
22.3.10 EXTERNAL REGULATIONS 620
22.4 SUMMARY AND OUTLOOK 621
22.4.1 OVERVIEW OF BUILDING BLOCKS 621
22.4.2 BUILDING BLOCKS IN THE MODEL OF DAVID CHAUM 622 22.4.3 RESEARCH
QUESTIONS 623
REFERENCES 627
PART IV: PRIME APPLIED
23 INTRODUCTION 653
PETE BRAMHALL
24 COLLABORATIVE E-LEARNING 657
KATJA LIESEBACH, ELKE FRANZ, ANNE-KATRIN STANGE, ANDREAS JUSCHKA, KATRIN
BORCEA-F'FITZMANN, ALEXANDER BOETTCHER, AND HAGEN WAHRIG 24.1 THE
COLLABORATIVE ELEARNING SYSTEM BLUES'N 657
24.1.1 DEMOCRATISATION OF AN ELEARNING ENVIRONMENT 657 24.1.2 NEED FOR
PRIVACY AND HOW PRIME HELPS 659
24.2 INTRA-APPLICATION PARTITIONING OF PERSONAL DATA 661
24.2.1 NECESSITY AND GENERAL GOALS 661
24.2.2 CONCEPT FOR THE SUPPORT OF IAP 662
24.2.3 REALISATION WITHIN THE CEL PROTOTYPE 663
24.2.4 DISCUSSION 664
24.3 POLICY- AND CREDENTIAL-BASED ACCESS CONTROL 665
24.3.1 NECESSITY FOR PRIVACY-ENHANCING ACCESS CONTROL 665 24.3.2
REALISATION WITHIN THE CEL PROTOTYPE 665
24.3.3 DISCUSSION 666
24.4 PRIVACY-AWARE AND USABLE APPLICATION DESIGN 667
24.4.1 MANAGEMENT OF ALIASES 668
24.4.2 CHERNOFF FACES 669
24.4.3 GUI COMPONENTS: INFOCENTER AND ECHOBAR 671
24.4.4 ADAPTED "SEND PERSONAL DATA"-DIALOGUE 672
24.5 SUMMARY - THE FINAL CEL PROTOTYPE 673
24.6 BEYOND PRIME - AN OUTLOOK 676
IMAGE 13
CONTENTS XXVII
25 LOCATION-BASED SERVICES 679
JAN ZIBUSCHKA, KAI RANNENBERG, AND TOBIAS KOELSCH 25.1 INTRODUCTION 679
25.2 PRIVACY IN LOCATION-BASED SERVICES 679
25.3 REQUIREMENTS 681
25.3.1 BUSINESS MODELS 681
25.3.2 DATA PROTECTION 682
25.4 THE CONCEPT OF A LOCATION INTERMEDIARY 683
25.5 PROTOTYPE DEVELOPMENT 685
25.6 PRIME PRINCIPLES IN A RESTRICTED MOBILE ENVIRONMENT 686 25.7 FIRST
PROTOTYPE VERSION 687
25.7.1 SCENARIO 687
25.7.2 IMPLEMENTATION 687
25.8 SECOND PROTOTYPE VERSION 690
25.8.1 SCENARIO 690
25.8.2 IMPLEMENTATION 690
25.9 COMMERCIALIZATION 692
25.10 POSSIBLE DEPLOYMENT 693
25.11 OUTLOOK 694
26 E-HEALTH 697
ALBERTO SANNA, RICCARDO SERAFIN, AND NICOLA MAGANETTI 26.1 INTRODUCTION
697
26.1.1 DEFINITION OF "HEALTH" BY THE WORLD HEALTH ORGANIZATION (WHO) 698
26.1.2 CONTINUITY OF CARE AND IMPACT ON INDIVIDUAL'S LIFE 698
26.1.3 HEALTH AND LIFESTYLE MANAGEMENT 699
26.1.4 THE SELF CARE MEDICATION REGIMEN AND THE OPPORTUNITY FOR
PRIVACY-ENHANCED PROCESSES AND SERVICES 700
26.1.5 REFERENCE CONTEXT FOR PRIVACY-ENHANCED PROCESS AND SERVICE
RE-ENGINEERING BASED ON THE PRIME CONCEPTS APPLIED TO SELF CARE DRUG
THERAPY MANAGEMENT 706
26.2 A HEALTHCARE DEMONSTRATOR: OBJECTIVES AND SCENARIO 707 26.2.1
OBJECTIVES 707
26.2.2 SCENARIO 708
26.2.3 COLLABORATION WITH OTHER EUROPEAN RESEARCH INITIATIVES 710
26.3 APPLICATION REQUIREMENTS 711
26.4 APPLICATION DEMONSTRATOR ARCHITECTURE 713
26.4.1 DEMONSTRATOR COMPONENTS 713
IMAGE 14
XXVIII CONTENTS
26.4.2 PRIVACY-ENHANCED ONLINE DRUG PURCHASE: INFORMATION FLOW 713
26.4.3 DATA TRACK AND OBLIGATIONS: ENSURING USER CONTROL 717
26.5 CONCLUSION 719
27 AIRPORT SECURITY CONTROLS: PROTOTYPE SUMMARY 721 LOANNIS VAKALIS 27.1
INTRODUCTION 721
27.2 THE REASON BEHIND THE PROTOTYPE 722
27.3 THE TRUSTED TRAVELER USE CASE SCENARIO 723
27.3.1 PRIVACY ENHANCEMENTS 724
27.4 TRUSTED TRAVELER "SMART CARD" AND DATA STORED THEREIN . . 724 27.5
THE ASC PROTOTYPE STAGES 725
27.5.1 THE ENROLLMENT 725
27.5.2 CHECK-IN 727
27.5.3 ENTERING THE PASSENGER RESTRICTED AREA (PRA) 729 27.5.4 GATE 731
27.5.5 BOARDING 732
27.5.6 THE USE OF CRYPTOGRAPHY 733
28 PRIVACY AND IDENTITY MANAGEMENT REQUIREMENTS: AN APPLICATION
PROTOTYPE PERSPECTIVE 735
TOBIAS KOELSCH, JAN ZIBUSCHKA, AND KAI RANNENBERG 28.1 INTRODUCTION 735
28.2 USERS' INTERESTS AND REQUIREMENTS 736
28.2.1 DATA MINIMIZATION 736
28.2.2 CONTROL OF DATA FLOW 739
28.2.3 EASY-TO-USE TECHNOLOGY 741
28.2.4 RELIABLE SERVICE PROVISION 742
28.3 SERVICE PROVIDERS' INTERESTS AND REQUIREMENTS 742 28.3.1 FLEXIBLE
BUSINESS MODELS 743
28.3.2 CUSTOMER LOYALTY AND TRUST 743
28.3.3 USER BASE 743
28.3.4 TRUSTED PAYMENT PARTNERS 744
28.3.5 DELEGATION 745
28.3.6 LEGAL COMPLIANCE 745
28.4 NETWORK OPERATORS' INTERESTS AND REQUIREMENTS 745 28.4.1 FLEXIBLE
BUSINESS MODELS 746
28.4.2 EASY INTEGRATION OF THIRD-PARTY SERVICES 746 28.4.3 LEGAL
COMPLIANCE 747
28.4.4 CUSTOMER LOYALTY AND TRUST 747
28.4.5 LEVERAGING EXISTING INFRASTRUCTURAL ASSETS 747
IMAGE 15
CONTENTS XXIX
28.4.6 ENABLING NEW APPLICATIONS 747
28.5 DEVELOPER REQUIREMENTS 747
28.5.1 DOCUMENTATION 747
28.5.2 LEAN INTERFACES 748
28.5.3 INTEGRATION INTO EXISTING FRAMEWORKS 748
28.6 CONCLUSION 748
REFERENCES 751
PART V: CONCLUSION AND OUTLOOK
29 CONCLUSION AND OUTLOOK 759
JAN CAMENISCH AND ANDREAS PFITZMANN 29.1 CONCLUSION 759
29.2 OUTLOOK 760
29.2.1 FURTHER RESEARCH ON IDENTITY MANAGEMENT 760 29.2.2 MAKING PRIVACY
REAL 761
29.2.3 INCLUDING THE SOCIAL VALUE OF PRIVACY 762
29.2.4 SUCCEEDING PRIME 763
REFERENCES 765
PART VI: APPENDIX
30 XML SCHEMATA 769
30.1 ACCESS CONTROL AND RELEASE LANGUAGE: XML SCHEMA 769 30.2 DATA
HANDLING LANGUAGE: XML SCHEMA 771
AUTHOR INDEX 775 |
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV037374072 |
classification_rvk | SS 4800 |
classification_tum | DAT 460f DAT 050f |
ctrlnum | (OCoLC)725424193 (DE-599)DNB1009310747 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Medizin |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV037374072</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20110803</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">110502s2011 xx d||| |||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">11,N02</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1009310747</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642190490</subfield><subfield code="c">kart. : EUR 93.09 (DE) (freier Pr.), ca. sfr 125.00 (freier Pr.)</subfield><subfield code="9">978-3-642-19049-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642190499</subfield><subfield code="9">3-642-19049-9</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642190490</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 80034561</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)725424193</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1009310747</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-91G</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">610</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">380</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Digital privacy</subfield><subfield code="b">PRIME - privacy and identity management for Europe</subfield><subfield code="c">Jan Camenisch ... (ed.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXIX, 773 S.</subfield><subfield code="b">graph. Darst.</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">6545 : State-of-the-art survey</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">State-of-the-art survey</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Identitätsverwaltung</subfield><subfield code="0">(DE-588)7546673-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Benutzerorientierung</subfield><subfield code="0">(DE-588)4391852-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Anonymisierung</subfield><subfield code="0">(DE-588)4139362-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Systemplattform</subfield><subfield code="0">(DE-588)4674460-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Identitätsverwaltung</subfield><subfield code="0">(DE-588)7546673-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Benutzerorientierung</subfield><subfield code="0">(DE-588)4391852-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Anonymisierung</subfield><subfield code="0">(DE-588)4139362-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Systemplattform</subfield><subfield code="0">(DE-588)4674460-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Camenisch, Jan</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="t">Digital Privacy</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">6545</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">6545</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=3644415&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=022527351&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-022527351</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV037374072 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:13:27Z |
institution | BVB |
isbn | 9783642190490 3642190499 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-022527351 |
oclc_num | 725424193 |
open_access_boolean | |
owner | DE-706 DE-83 DE-11 DE-91G DE-BY-TUM |
owner_facet | DE-706 DE-83 DE-11 DE-91G DE-BY-TUM |
physical | XXIX, 773 S. graph. Darst. 24 cm |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science State-of-the-art survey |
spelling | Digital privacy PRIME - privacy and identity management for Europe Jan Camenisch ... (ed.) Berlin [u.a.] Springer 2011 XXIX, 773 S. graph. Darst. 24 cm txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 6545 : State-of-the-art survey State-of-the-art survey Literaturangaben Privatsphäre (DE-588)4123980-5 gnd rswk-swf Identitätsverwaltung (DE-588)7546673-9 gnd rswk-swf Benutzerorientierung (DE-588)4391852-9 gnd rswk-swf Anonymisierung (DE-588)4139362-4 gnd rswk-swf Systemplattform (DE-588)4674460-5 gnd rswk-swf Trusted Computing (DE-588)7562931-8 gnd rswk-swf (DE-588)4143413-4 Aufsatzsammlung gnd-content Identitätsverwaltung (DE-588)7546673-9 s Privatsphäre (DE-588)4123980-5 s Benutzerorientierung (DE-588)4391852-9 s Trusted Computing (DE-588)7562931-8 s Anonymisierung (DE-588)4139362-4 s Systemplattform (DE-588)4674460-5 s DE-604 Camenisch, Jan Sonstige oth Erscheint auch als Online-Ausgabe Digital Privacy Lecture notes in computer science 6545 (DE-604)BV000000607 6545 X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=3644415&prov=M&dok_var=1&dok_ext=htm Inhaltstext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=022527351&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Digital privacy PRIME - privacy and identity management for Europe Lecture notes in computer science Privatsphäre (DE-588)4123980-5 gnd Identitätsverwaltung (DE-588)7546673-9 gnd Benutzerorientierung (DE-588)4391852-9 gnd Anonymisierung (DE-588)4139362-4 gnd Systemplattform (DE-588)4674460-5 gnd Trusted Computing (DE-588)7562931-8 gnd |
subject_GND | (DE-588)4123980-5 (DE-588)7546673-9 (DE-588)4391852-9 (DE-588)4139362-4 (DE-588)4674460-5 (DE-588)7562931-8 (DE-588)4143413-4 |
title | Digital privacy PRIME - privacy and identity management for Europe |
title_auth | Digital privacy PRIME - privacy and identity management for Europe |
title_exact_search | Digital privacy PRIME - privacy and identity management for Europe |
title_full | Digital privacy PRIME - privacy and identity management for Europe Jan Camenisch ... (ed.) |
title_fullStr | Digital privacy PRIME - privacy and identity management for Europe Jan Camenisch ... (ed.) |
title_full_unstemmed | Digital privacy PRIME - privacy and identity management for Europe Jan Camenisch ... (ed.) |
title_short | Digital privacy |
title_sort | digital privacy prime privacy and identity management for europe |
title_sub | PRIME - privacy and identity management for Europe |
topic | Privatsphäre (DE-588)4123980-5 gnd Identitätsverwaltung (DE-588)7546673-9 gnd Benutzerorientierung (DE-588)4391852-9 gnd Anonymisierung (DE-588)4139362-4 gnd Systemplattform (DE-588)4674460-5 gnd Trusted Computing (DE-588)7562931-8 gnd |
topic_facet | Privatsphäre Identitätsverwaltung Benutzerorientierung Anonymisierung Systemplattform Trusted Computing Aufsatzsammlung |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=3644415&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=022527351&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT camenischjan digitalprivacyprimeprivacyandidentitymanagementforeurope |