Architecting User-Centric Privacy-as-a-Set-of-Services: digital identity-related privacy framework
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cham [u.a.]
Springer
2014
|
Schriftenreihe: | Springer theses : Recognizing outstanding Ph.D. research
|
Schlagworte: | |
Online-Zugang: | BTU01 FHA01 FHI01 FHN01 FHR01 FKE01 FRO01 FWS01 FWS02 UBY01 Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource |
ISBN: | 9783319082318 |
DOI: | 10.1007/978-3-319-08231-8 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV042020070 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 140811s2014 |||| o||u| ||||||eng d | ||
020 | |a 9783319082318 |c Online |9 978-3-319-08231-8 | ||
024 | 7 | |a 10.1007/978-3-319-08231-8 |2 doi | |
035 | |a (OCoLC)882519948 | ||
035 | |a (DE-599)BSZ409580767 | ||
040 | |a DE-604 |b ger | ||
041 | 0 | |a eng | |
049 | |a DE-Aug4 |a DE-573 |a DE-859 |a DE-92 |a DE-898 |a DE-634 |a DE-861 |a DE-706 |a DE-863 |a DE-862 | ||
050 | 0 | |a TK1-9971 | |
084 | |a TJK |2 sdnb | ||
084 | |a TEC041000 |2 sdnb | ||
100 | 1 | |a Ben Ayed, Ghazi |e Verfasser |0 (DE-588)1020222344 |4 aut | |
245 | 1 | 0 | |a Architecting User-Centric Privacy-as-a-Set-of-Services |b digital identity-related privacy framework |c Ghazi Ben Ayed |
264 | 1 | |a Cham [u.a.] |b Springer |c 2014 | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Springer theses : Recognizing outstanding Ph.D. research | |
650 | 4 | |a Ingenieurwissenschaften | |
650 | 4 | |a Data protection | |
650 | 4 | |a Telecommunication | |
650 | 4 | |a Management information systems | |
650 | 4 | |a Engineering | |
655 | 7 | |8 1\p |0 (DE-588)4113937-9 |a Hochschulschrift |2 gnd-content | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-3-319-08230-1 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-08231-8 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027461768&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027461768&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-ENG | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-027461768 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u https://doi.org/10.1007/978-3-319-08231-8 |l BTU01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-08231-8 |l FHA01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-08231-8 |l FHI01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-08231-8 |l FHN01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-08231-8 |l FHR01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-08231-8 |l FKE01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-08231-8 |l FRO01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-08231-8 |l FWS01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-08231-8 |l FWS02 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-08231-8 |l UBY01 |p ZDB-2-ENG |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 1015349 |
---|---|
_version_ | 1806174812364603392 |
adam_text | ARCHITECTING USER-CENTRIC PRIVACY-AS-A-SET-OF-SERVICES
/ BEN AYED, GHAZI
: 2014
TABLE OF CONTENTS / INHALTSVERZEICHNIS
INTRODUCTION & MOTIVATIONS
CYBER-SECURITY
INTEROPERABILITY THROUGH SERVICE-ORIENTATION
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
ARCHITECTING USER-CENTRIC PRIVACY-AS-A-SET-OF-SERVICES
/ BEN AYED, GHAZI
: 2014
ABSTRACT / INHALTSTEXT
HOW COULD PRIVACY PLAY A KEY ROLE IN PROTECTING DIGITAL IDENTITIES? HOW
COULD WE MERGE PRIVACY LAW, POLICIES, REGULATIONS AND TECHNOLOGIES TO
PROTECT OUR DIGITAL IDENTITIES IN THE CONTEXT OF CONNECTED DEVICES AND
DISTRIBUTED SYSTEMS? IN THIS BOOK, THE AUTHOR ADDRESSES MAJOR ISSUES OF
IDENTITY PROTECTION AND PROPOSES A SERVICE-ORIENTED LAYERED FRAMEWORK TO
ACHIEVE INTEROPERABILITY OF PRIVACY AND SECURE DISTRIBUTED SYSTEMS. THE
FRAMEWORK IS INTENDED TO DISTILL PRIVACY-RELATED DIGITAL IDENTITY
REQUIREMENTS (BUSINESS INTEROPERABILITY) INTO A SET OF SERVICES, WHICH
IN TURN CAN BE IMPLEMENTED ON THE BASIS OF OPEN STANDARDS (TECHNICAL
INTEROPERABILITY). THE ADOPTION OF THE PROPOSED FRAMEWORK IN SECURITY
PROJECTS AND INITIATIVES WOULD DECREASE COMPLEXITIES AND FOSTER
UNDERSTANDING AND COLLABORATIONS BETWEEN BUSINESS AND TECHNICAL
STAKEHOLDERS. THIS WORK IS A STEP TOWARD IMPLEMENTING THE AUTHOR’S
VISION OF DELIVERING CYBER SECURITY AS A SET OF AUTONOMOUS
MULTI-PLATFORM HOSTED SERVICES THAT SHOULD BE AVAILABLE UPON USER
REQUEST AND ON A PAY-PER-USE BASIS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author | Ben Ayed, Ghazi |
author_GND | (DE-588)1020222344 |
author_facet | Ben Ayed, Ghazi |
author_role | aut |
author_sort | Ben Ayed, Ghazi |
author_variant | a g b ag agb |
building | Verbundindex |
bvnumber | BV042020070 |
callnumber-first | T - Technology |
callnumber-label | TK1-9971 |
callnumber-raw | TK1-9971 |
callnumber-search | TK1-9971 |
callnumber-sort | TK 11 49971 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-2-ENG |
ctrlnum | (OCoLC)882519948 (DE-599)BSZ409580767 |
doi_str_mv | 10.1007/978-3-319-08231-8 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03022nmm a2200577 c 4500</leader><controlfield tag="001">BV042020070</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">140811s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319082318</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-08231-8</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-08231-8</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)882519948</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BSZ409580767</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-862</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK1-9971</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">TJK</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">TEC041000</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ben Ayed, Ghazi</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1020222344</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Architecting User-Centric Privacy-as-a-Set-of-Services</subfield><subfield code="b">digital identity-related privacy framework</subfield><subfield code="c">Ghazi Ben Ayed</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Springer theses : Recognizing outstanding Ph.D. research</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ingenieurwissenschaften</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Telecommunication</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Engineering</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="8">1\p</subfield><subfield code="0">(DE-588)4113937-9</subfield><subfield code="a">Hochschulschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-3-319-08230-1</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-08231-8</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027461768&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027461768&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-ENG</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027461768</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-08231-8</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-08231-8</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-08231-8</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-08231-8</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-08231-8</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-08231-8</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-08231-8</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-08231-8</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-08231-8</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-08231-8</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | 1\p (DE-588)4113937-9 Hochschulschrift gnd-content |
genre_facet | Hochschulschrift |
id | DE-604.BV042020070 |
illustrated | Not Illustrated |
indexdate | 2024-08-01T10:55:28Z |
institution | BVB |
isbn | 9783319082318 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027461768 |
oclc_num | 882519948 |
open_access_boolean | |
owner | DE-Aug4 DE-573 DE-859 DE-92 DE-898 DE-BY-UBR DE-634 DE-861 DE-706 DE-863 DE-BY-FWS DE-862 DE-BY-FWS |
owner_facet | DE-Aug4 DE-573 DE-859 DE-92 DE-898 DE-BY-UBR DE-634 DE-861 DE-706 DE-863 DE-BY-FWS DE-862 DE-BY-FWS |
physical | 1 Online-Ressource |
psigel | ZDB-2-ENG |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Springer |
record_format | marc |
series2 | Springer theses : Recognizing outstanding Ph.D. research |
spellingShingle | Ben Ayed, Ghazi Architecting User-Centric Privacy-as-a-Set-of-Services digital identity-related privacy framework Ingenieurwissenschaften Data protection Telecommunication Management information systems Engineering |
subject_GND | (DE-588)4113937-9 |
title | Architecting User-Centric Privacy-as-a-Set-of-Services digital identity-related privacy framework |
title_auth | Architecting User-Centric Privacy-as-a-Set-of-Services digital identity-related privacy framework |
title_exact_search | Architecting User-Centric Privacy-as-a-Set-of-Services digital identity-related privacy framework |
title_full | Architecting User-Centric Privacy-as-a-Set-of-Services digital identity-related privacy framework Ghazi Ben Ayed |
title_fullStr | Architecting User-Centric Privacy-as-a-Set-of-Services digital identity-related privacy framework Ghazi Ben Ayed |
title_full_unstemmed | Architecting User-Centric Privacy-as-a-Set-of-Services digital identity-related privacy framework Ghazi Ben Ayed |
title_short | Architecting User-Centric Privacy-as-a-Set-of-Services |
title_sort | architecting user centric privacy as a set of services digital identity related privacy framework |
title_sub | digital identity-related privacy framework |
topic | Ingenieurwissenschaften Data protection Telecommunication Management information systems Engineering |
topic_facet | Ingenieurwissenschaften Data protection Telecommunication Management information systems Engineering Hochschulschrift |
url | https://doi.org/10.1007/978-3-319-08231-8 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027461768&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027461768&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT benayedghazi architectingusercentricprivacyasasetofservicesdigitalidentityrelatedprivacyframework |