IT-Security and Privacy [electronic resource] : Design and Use of Privacy-Enhancing Security Mechanisms /

Invasion of privacy and misuse of personal data are among the most obvious negative effects of today's information and communication technologies. Besides technical issues from a variety of fields, privacy legislation, depending on national activities and often lacking behind technical progress, plays an important role in designing, implementing, and using privacy-enhancing systems. Taking into account technical aspects from IT security, this book presents in detail a formal task-based privacy model which can be used to technically enforce legal privacy requirements. Furthermore, the author specifies how the privacy model policy has been implemented together with other security policies in accordance with the Generalized Framework for Access Control (GFAC). This book will appeal equally to R&D professionals and practitioners active in IT security and privacy, advanced students, and IT managers.

Saved in:
Bibliographic Details
Main Authors: Fischer-Hübner, Simone. editor., SpringerLink (Online service)
Format: Texto biblioteca
Language:eng
Published: Berlin, Heidelberg : Springer Berlin Heidelberg, 2001
Subjects:Computer science., Information technology., Business, Computer communication systems., Computer security., Data encryption (Computer science)., Computers and civilization., Management information systems., Computer Science., Systems and Data Security., Data Encryption., Computer Communication Networks., Management of Computing and Information Systems., Computers and Society., IT in Business.,
Online Access:http://dx.doi.org/10.1007/3-540-45150-1
Tags: Add Tag
No Tags, Be the first to tag this record!
id KOHA-OAI-TEST:169983
record_format koha
spelling KOHA-OAI-TEST:1699832018-07-30T22:46:19ZIT-Security and Privacy [electronic resource] : Design and Use of Privacy-Enhancing Security Mechanisms / Fischer-Hübner, Simone. editor. SpringerLink (Online service) textBerlin, Heidelberg : Springer Berlin Heidelberg,2001.engInvasion of privacy and misuse of personal data are among the most obvious negative effects of today's information and communication technologies. Besides technical issues from a variety of fields, privacy legislation, depending on national activities and often lacking behind technical progress, plays an important role in designing, implementing, and using privacy-enhancing systems. Taking into account technical aspects from IT security, this book presents in detail a formal task-based privacy model which can be used to technically enforce legal privacy requirements. Furthermore, the author specifies how the privacy model policy has been implemented together with other security policies in accordance with the Generalized Framework for Access Control (GFAC). This book will appeal equally to R&D professionals and practitioners active in IT security and privacy, advanced students, and IT managers.Privacy in the Global Information Society -- IT-Security -- Privacy-Enhancing Technologies -- A Task-Based Privacy Model -- Specification and Implementation of the Privacy Policy Following the Generalised Framework for Access Control- Approach -- Concluding Remarks -- Appendix A: Formal Mathematical Privacy Model -- Appendix B: Implementation of a Hospital Scenario as a Demonstration Example.Invasion of privacy and misuse of personal data are among the most obvious negative effects of today's information and communication technologies. Besides technical issues from a variety of fields, privacy legislation, depending on national activities and often lacking behind technical progress, plays an important role in designing, implementing, and using privacy-enhancing systems. Taking into account technical aspects from IT security, this book presents in detail a formal task-based privacy model which can be used to technically enforce legal privacy requirements. Furthermore, the author specifies how the privacy model policy has been implemented together with other security policies in accordance with the Generalized Framework for Access Control (GFAC). This book will appeal equally to R&D professionals and practitioners active in IT security and privacy, advanced students, and IT managers.Computer science.Information technology.BusinessComputer communication systems.Computer security.Data encryption (Computer science).Computers and civilization.Management information systems.Computer Science.Systems and Data Security.Data Encryption.Computer Communication Networks.Management of Computing and Information Systems.Computers and Society.IT in Business.Springer eBookshttp://dx.doi.org/10.1007/3-540-45150-1URN:ISBN:9783540451501
institution COLPOS
collection Koha
country México
countrycode MX
component Bibliográfico
access En linea
En linea
databasecode cat-colpos
tag biblioteca
region America del Norte
libraryname Departamento de documentación y biblioteca de COLPOS
language eng
topic Computer science.
Information technology.
Business
Computer communication systems.
Computer security.
Data encryption (Computer science).
Computers and civilization.
Management information systems.
Computer Science.
Systems and Data Security.
Data Encryption.
Computer Communication Networks.
Management of Computing and Information Systems.
Computers and Society.
IT in Business.
Computer science.
Information technology.
Business
Computer communication systems.
Computer security.
Data encryption (Computer science).
Computers and civilization.
Management information systems.
Computer Science.
Systems and Data Security.
Data Encryption.
Computer Communication Networks.
Management of Computing and Information Systems.
Computers and Society.
IT in Business.
spellingShingle Computer science.
Information technology.
Business
Computer communication systems.
Computer security.
Data encryption (Computer science).
Computers and civilization.
Management information systems.
Computer Science.
Systems and Data Security.
Data Encryption.
Computer Communication Networks.
Management of Computing and Information Systems.
Computers and Society.
IT in Business.
Computer science.
Information technology.
Business
Computer communication systems.
Computer security.
Data encryption (Computer science).
Computers and civilization.
Management information systems.
Computer Science.
Systems and Data Security.
Data Encryption.
Computer Communication Networks.
Management of Computing and Information Systems.
Computers and Society.
IT in Business.
Fischer-Hübner, Simone. editor.
SpringerLink (Online service)
IT-Security and Privacy [electronic resource] : Design and Use of Privacy-Enhancing Security Mechanisms /
description Invasion of privacy and misuse of personal data are among the most obvious negative effects of today's information and communication technologies. Besides technical issues from a variety of fields, privacy legislation, depending on national activities and often lacking behind technical progress, plays an important role in designing, implementing, and using privacy-enhancing systems. Taking into account technical aspects from IT security, this book presents in detail a formal task-based privacy model which can be used to technically enforce legal privacy requirements. Furthermore, the author specifies how the privacy model policy has been implemented together with other security policies in accordance with the Generalized Framework for Access Control (GFAC). This book will appeal equally to R&D professionals and practitioners active in IT security and privacy, advanced students, and IT managers.
format Texto
topic_facet Computer science.
Information technology.
Business
Computer communication systems.
Computer security.
Data encryption (Computer science).
Computers and civilization.
Management information systems.
Computer Science.
Systems and Data Security.
Data Encryption.
Computer Communication Networks.
Management of Computing and Information Systems.
Computers and Society.
IT in Business.
author Fischer-Hübner, Simone. editor.
SpringerLink (Online service)
author_facet Fischer-Hübner, Simone. editor.
SpringerLink (Online service)
author_sort Fischer-Hübner, Simone. editor.
title IT-Security and Privacy [electronic resource] : Design and Use of Privacy-Enhancing Security Mechanisms /
title_short IT-Security and Privacy [electronic resource] : Design and Use of Privacy-Enhancing Security Mechanisms /
title_full IT-Security and Privacy [electronic resource] : Design and Use of Privacy-Enhancing Security Mechanisms /
title_fullStr IT-Security and Privacy [electronic resource] : Design and Use of Privacy-Enhancing Security Mechanisms /
title_full_unstemmed IT-Security and Privacy [electronic resource] : Design and Use of Privacy-Enhancing Security Mechanisms /
title_sort it-security and privacy [electronic resource] : design and use of privacy-enhancing security mechanisms /
publisher Berlin, Heidelberg : Springer Berlin Heidelberg,
publishDate 2001
url http://dx.doi.org/10.1007/3-540-45150-1
work_keys_str_mv AT fischerhubnersimoneeditor itsecurityandprivacyelectronicresourcedesignanduseofprivacyenhancingsecuritymechanisms
AT springerlinkonlineservice itsecurityandprivacyelectronicresourcedesignanduseofprivacyenhancingsecuritymechanisms
_version_ 1756263253466415104