000756566 000__ 05233cam\a2200517Ii\4500 000756566 001__ 756566 000756566 005__ 20230306142022.0 000756566 006__ m\\\\\o\\d\\\\\\\\ 000756566 007__ cr\cn\nnnunnun 000756566 008__ 160726s2016\\\\sz\a\\\\o\\\\\101\0\eng\d 000756566 020__ $$a9783319417639$$q(electronic book) 000756566 020__ $$a3319417630$$q(electronic book) 000756566 020__ $$z9783319417622 000756566 0247_ $$a10.1007/978-3-319-41763-9$$2doi 000756566 035__ $$aSP(OCoLC)ocn953990640 000756566 035__ $$aSP(OCoLC)953990640 000756566 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dOCLCO$$dYDXCP$$dNJR 000756566 049__ $$aISEA 000756566 050_4 $$aQA76.9.A25 000756566 08204 $$a005.8$$223 000756566 1112_ $$aIFIP WG 9.2, 9.6/11.4, 11.6, 11.7/SIG 9.2.2 International Summer School on Privacy and Identity Management$$n(10th :$$d2015 :$$cEdinburgh, Scotland) 000756566 24510 $$aPrivacy and identity management$$h[electronic resource] :$$btime for a revolution? : 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers /$$cDavid Aspinall, Jan Camenisch, Marit Hansen, Simone Fischer-Hübner, Charles Raab (eds.). 000756566 264_1 $$aSwitzerland :$$bSpringer,$$c2016. 000756566 300__ $$a1 online resource (xii, 359 pages) :$$billustrations 000756566 336__ $$atext$$btxt$$2rdacontent 000756566 337__ $$acomputer$$bc$$2rdamedia 000756566 338__ $$aonline resource$$bcr$$2rdacarrier 000756566 4901_ $$aIFIP advances in information and communication technology,$$x1868-4238 ;$$v476 000756566 500__ $$aIncludes author index. 000756566 5050_ $$aModelling the Relationship between Privacy and Security Perceptions and the Acceptance of Surveillance Practices -- The US Privacy Strategy -- Smart Society: Collaboration between Humans and Machines, Promises and Perils -- An Experience with a De-identifying Task to Inform about Privacy Issues -- A4CloudWorkshop: Accountability in the Cloud -- Signatures for Privacy, Trust and Accountability in the Cloud: Applications and Requirements -- Report on the Workshop on Assessing the Maturity of Privacy Enhancing Technologies -- Smart Technologies: Workshop on Challenges and Trends for Privacy in a Hyper-connected World -- Privacy Pattern Catalogue: A Tool for Integrating Privacy Principles of ISO/IEC 29100 into the Software Development Process -- Developing a Structured Metric to Measure Privacy Risk in Privacy Impact Assessments -- Accountability in the EU Data Protection Reform -- Moving from Theory to Practice -- Towards Authenticity and Privacy Preserving Accountable Workflows -- A Technique for Enhanced Provision of Appropriate Access to Evidence across Service Provision Chains -- Evidence-Based Security and Privacy Assurance in Cloud Ecosystems -- Enhanced Assurance about Cloud Service Provision Promises -- ALOC: Attribute Level of Confidence for a User-Centric Attribute Assurance -- Identity Theft through e-Government Services: Government to Pay the Bill? -- "All Your Data Are Belong to Us ". European Perspectives on Privacy Issues in Free Online Machine Translation Services -- Identification of Online Gamblers in the EU: A Two-Edged Sword -- Can Courts Provide Effective Remedies against Violations of Fundamental Rights by Mass Surveillance? The Case of the United Kingdom -- Automated Log Audits for Privacy Compliance Validation: A Literature Survey -- Privacy-Preserving Access Control in Publicly Readable Storage Systems -- Ontology-Based Obfuscation and Anonymisation for Privacy -- A Case Study on Healthcare. 000756566 506__ $$aAccess limited to authorized users. 000756566 520__ $$aThis book contains a range of keynote papers and submitted papers presented at the 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, held in Edinburgh, UK, in August 2015. The 14 revised full papers included in this volume were carefully selected from a total of 43 submissions and were subject to a two-step review process. In addition, the volume contains 4 invited keynote papers. The papers cover a wide range of topics: cloud computing, privacy-enhancing technologies, accountability, measuring privacy and understanding risks, the future of privacy and data protection regulation, the US privacy perspective, privacy and security, the PRISMS Decision System, engineering privacy, cryptography, surveillance, identity management, the European General Data Protection Regulation framework, communicating privacy issues to the general population, smart technologies, technology users' privacy preferences, sensitive applications, collaboration between humans and machines, and privacy and ethics. 000756566 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed July 26, 2016). 000756566 650_0 $$aComputer security$$vCongresses. 000756566 650_0 $$aOnline identities$$vCongresses. 000756566 650_0 $$aPrivacy, Right of$$vCongresses. 000756566 7001_ $$aAspinall, D.,$$eeditor. 000756566 7001_ $$aCamenisch, Jan,$$eeditor. 000756566 7001_ $$aHansen, Marit,$$eeditor. 000756566 7001_ $$aFischer-Hübner, Simone,$$eeditor. 000756566 7001_ $$aRaab, Charles,$$eeditor. 000756566 830_0 $$aIFIP advances in information and communication technology ;$$v476. 000756566 852__ $$bebk 000756566 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-41763-9$$zOnline Access$$91397441.1 000756566 909CO $$ooai:library.usi.edu:756566$$pGLOBAL_SET 000756566 980__ $$aEBOOK 000756566 980__ $$aBIB 000756566 982__ $$aEbook 000756566 983__ $$aOnline 000756566 994__ $$a92$$bISE