Buch, Englisch, Band 261, 160 Seiten, Format (B × H): 159 mm x 243 mm, Gewicht: 428 g
Reihe: IFIP Advances in Information and Communication Technology
Policies and Research in Identity Management
2008. Auflage 2008
ISBN: 978-0-387-77995-9
Verlag: Springer Us
First IFIP WG11.6 Working Conference on Policies and Research in Identity Management (IDMAN'07), RSM Erasmus University, Rotterdam, the Netherlands, October 11-12, 2007
Buch, Englisch, Band 261, 160 Seiten, Format (B × H): 159 mm x 243 mm, Gewicht: 428 g
Reihe: IFIP Advances in Information and Communication Technology
ISBN: 978-0-387-77995-9
Verlag: Springer Us
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Informationstheorie, Kodierungstheorie
- Naturwissenschaften Biowissenschaften Biowissenschaften
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Zeichen- und Zahlendarstellungen
- Interdisziplinäres Wissenschaften Wissenschaften: Forschung und Information Informationstheorie, Kodierungstheorie
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Datensicherheit, Datenschutz
Weitere Infos & Material
Analysis of Identification Schemes.- Keynote Paper: Politics and Identity Management.- Insecure Flight: Broken Boarding Passes and Ineffective Terrorist Watch Lists.- Privacy and Identity Management.- Context Based Enforcement of Authorization for Privacy and Security in Identity Management.- Automated Privacy Audits to Complement the Notion of Control for Identity Management.- Privacy Enhancing Technologies.- Keynote Paper: Privacy and trust in the Information Society.- Biometrics.- Keynote Paper: Biometric Encryption: Technology for Strong Authentication, Security and Privacy.- Investigating and Comparing Multimodal Biometric Techniques.- BASE: a Proposed Secure Biometric Authentication System.- Identity and Privacy Protection.- Keynote Paper: Are State-Mediated Forms of Identification a Reaction to Physical Mobility? The case of England, 1500-2007.- Privacy Risk Perceptions and Privacy Protection Strategies.- A Contextual Method for Evaluating Privacy Preferences.- Authentication.- Implementing Strong Authentication Interoperability with Legacy Systems.