Fr. 70.00

IT-Security and Privacy - Design and Use of Privacy-Enhancing Security Mechanisms

Englisch · Taschenbuch

Versand in der Regel in 6 bis 7 Wochen

Beschreibung

Mehr lesen

Invasion of privacy and misuse of personal data are among the most obvious negative effects of today's information and communication technologies. Besides technical issues from a variety of fields, privacy legislation, depending on national activities and often lacking behind technical progress, plays an important role in designing, implementing, and using privacy-enhancing systems.
Taking into account technical aspects from IT security, this book presents in detail a formal task-based privacy model which can be used to technically enforce legal privacy requirements. Furthermore, the author specifies how the privacy model policy has been implemented together with other security policies in accordance with the Generalized Framework for Access Control (GFAC).
This book will appeal equally to R&D professionals and practitioners active in IT security and privacy, advanced students, and IT managers.

Inhaltsverzeichnis

Privacy in the Global Information Society.- IT-Security.- Privacy-Enhancing Technologies.- A Task-Based Privacy Model.- Specification and Implementation of the Privacy Policy Following the Generalised Framework for Access Control- Approach.- Concluding Remarks.- Appendix A: Formal Mathematical Privacy Model.- Appendix B: Implementation of a Hospital Scenario as a Demonstration Example.

Zusammenfassung

Invasion of privacy and misuse of personal data are among the most obvious negative effects of today's information and communication technologies. Besides technical issues from a variety of fields, privacy legislation, depending on national activities and often lacking behind technical progress, plays an important role in designing, implementing, and using privacy-enhancing systems.
Taking into account technical aspects from IT security, this book presents in detail a formal task-based privacy model which can be used to technically enforce legal privacy requirements. Furthermore, the author specifies how the privacy model policy has been implemented together with other security policies in accordance with the Generalized Framework for Access Control (GFAC).
This book will appeal equally to R&D professionals and practitioners active in IT security and privacy, advanced students, and IT managers.

Zusatztext

From the reviews:
"The book offers a comprehensive view to the relation between IT security and privacy and to the privacy enhancing technologies. It represents useful reading for all IT professionals." (Jozef Vyskoc, Zentralblatt MATH, Vol. 980, 2002)

Bericht

From the reviews:
"The book offers a comprehensive view to the relation between IT security and privacy and to the privacy enhancing technologies. It represents useful reading for all IT professionals." (Jozef Vyskoc, Zentralblatt MATH, Vol. 980, 2002)

Kundenrezensionen

Zu diesem Artikel wurden noch keine Rezensionen verfasst. Schreibe die erste Bewertung und sei anderen Benutzern bei der Kaufentscheidung behilflich.

Schreibe eine Rezension

Top oder Flop? Schreibe deine eigene Rezension.

Für Mitteilungen an CeDe.ch kannst du das Kontaktformular benutzen.

Die mit * markierten Eingabefelder müssen zwingend ausgefüllt werden.

Mit dem Absenden dieses Formulars erklärst du dich mit unseren Datenschutzbestimmungen einverstanden.