Overview
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8450)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: APF 2014.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
Similar content being viewed by others
Table of contents (12 papers)
-
Front Matter
-
Analysis of Architectures
-
Identity Management and Economics
-
Back Matter
Other volumes
-
Privacy Technologies and Policy
Editors and Affiliations
Accessibility Information
Accessibility information for this book is coming soon. We're working to make it available as quickly as possible. Thank you for your patience.
Bibliographic Information
Book Title: Privacy Technologies and Policy
Book Subtitle: Second Annual Privacy Forum, APF 2014, Athens, Greece, May 20-21, 2014, Proceedings
Editors: Bart Preneel, Demosthenes Ikonomou
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-319-06749-0
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer International Publishing Switzerland 2014
Softcover ISBN: 978-3-319-06748-3Published: 15 May 2014
eBook ISBN: 978-3-319-06749-0Published: 15 May 2014
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XII, 191
Number of Illustrations: 39 b/w illustrations
Topics: Computers and Society, Systems and Data Security, e-Commerce/e-business, Information Systems Applications (incl. Internet)
Keywords
- 1995 EU Data Protection Directive
- computer forensics
- data encryption
- database and storage security
- economics of security and privacy
- encrypted databases
- human and societal aspects of security and privacy
- identity management
- information systems
- personal data
- privacy by design
- security and privacy
- social aspects of security and privacy
- social network security and privacy
- software and application security
- surveillance mechanisms
- technology policy
- video surveillance