Privacy and Identity Management. Sharing in a Digital World
Springer International Publishing (Verlag)
978-3-031-57977-6 (ISBN)
Keynote Papers.- Blueprints for Deploying Privacy Enhancing Technologies in E-government.- The effacement of information technology from EU law: the need for collaborative approaches to redesign the EU's regulatory architecture.- Selected Student Papers.- Towards an Affordance-Based Typology of Personal Data Stores.- Assuring GDPR Conformance through Language-Based Compliance.- User Interaction Data in Apps: Comparing Policy Claims to Implementations.- Developing with Compliance in Mind: Addressing Data Protection Law, Cybersecurity Regulation, and AI Regulation During Software Development.- Digital Security Controversy Analysis: A Case Study of the Debate over GCHQ Exceptional Access Proposal.- Educating Parents in Managing Online Privacy Risks: Media Educators' Perspectives.- A Walk in the Labyrinth. Evolving EU Regulatory Framework for Secondary Use of Electronic Personal Health Data for Scientific Research.- Who is the attacker - Analyzing data protection violations in health care.- Towards privacy-preserving machine learning in sovereign data spaces: opportunities and challenges.- Secure and Privacy-Preserving Authentication for Data Subject Rights Enforcement.- Non-Interactive Authentication Scheme for Vehicular Ad-hoc Networks: Security, Privacy, and Accountability.- Entangled: A Case Study of Data Exchange and Actor Relationships in a Mobility Ecosystem.- Enhancing transparency through Personal Information Management Systems: current state of service offerings and considerations for further advancements.- User-Driven Privacy Factors in Trigger-Action Apps: A Comparative Analysis with General IoT.- Privacy and Utility Evaluation of Synthetic Tabular Data for Machine Learning.- Empirical Evaluation of Synthetic Data Generated by GANs and Diffusion Models.-How much is your Instagram Data Worth? Economic Perspective of Privacy in the Social Media Context.- Workshop and Tutorial Papers.- Private Training Approaches - A Primer.- Workshop on Cybersecurity of Critical Infrastructures.
Erscheinungsdatum | 23.04.2024 |
---|---|
Reihe/Serie | IFIP Advances in Information and Communication Technology |
Zusatzinfo | XI, 342 p. 78 illus., 66 illus. in color. |
Verlagsort | Cham |
Sprache | englisch |
Maße | 155 x 235 mm |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Schlagworte | Access Control • authentication • Computer Networks • cryptography • Data communication systems • Data Mining • Data Security • Digital Sovereignty • gdpr • General Data Protection Regulation • Information Security • Network Protocols • Network Security • privacy • privacy awareness • Privacy-Enhancing Technologies • Security Awareness • Security Systems • Security training • Signal Processing |
ISBN-10 | 3-031-57977-1 / 3031579771 |
ISBN-13 | 978-3-031-57977-6 / 9783031579776 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich