Architecting User-Centric Privacy-as-a-Set-of-Services Digital Identity-Related Privacy Framework /
How could privacy play a key role in protecting digital identities? How could we merge privacy law, policies, regulations and technologies to protect our digital identities in the context of connected devices and distributed systems? In this book, the author addresses major issues of identity protec...
Guardado en:
Autor principal: | |
---|---|
Formato: | Libro electrónico |
Lenguaje: | Inglés |
Publicado: |
Cham :
Springer International Publishing : Imprint: Springer,
2014.
|
Colección: | Springer Theses, Recognizing Outstanding Ph.D. Research,
|
Materias: | |
Acceso en línea: | http://dx.doi.org/10.1007/978-3-319-08231-8 |
Aporte de: | Registro referencial: Solicitar el recurso aquí |
LEADER | 02849Cam#a22004695i#4500 | ||
---|---|---|---|
001 | INGC-EBK-000593 | ||
003 | AR-LpUFI | ||
005 | 20220927105956.0 | ||
007 | cr nn 008mamaa | ||
008 | 140628s2014 gw | s |||| 0|eng d | ||
020 | |a 9783319082318 | ||
024 | 7 | |a 10.1007/978-3-319-08231-8 |2 doi | |
050 | 4 | |a TK1-9971 | |
072 | 7 | |a TJK |2 bicssc | |
072 | 7 | |a TEC041000 |2 bisacsh | |
100 | 1 | |a Ben Ayed, Ghazi. |9 261504 | |
245 | 1 | 0 | |a Architecting User-Centric Privacy-as-a-Set-of-Services |h [libro electrónico] : ; |b Digital Identity-Related Privacy Framework / |c by Ghazi Ben Ayed. |
260 | 1 | |a Cham : |b Springer International Publishing : |b Imprint: Springer, |c 2014. | |
300 | |a xix, 177 p.. : |b il. | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file |b PDF |2 rda | ||
490 | 1 | |a Springer Theses, Recognizing Outstanding Ph.D. Research, |x 2190-5053 | |
505 | 0 | |a Introduction & Motivations -- Cyber-security -- Interoperability through Service-Orientation. | |
520 | |a How could privacy play a key role in protecting digital identities? How could we merge privacy law, policies, regulations and technologies to protect our digital identities in the context of connected devices and distributed systems? In this book, the author addresses major issues of identity protection and proposes a service-oriented layered framework to achieve interoperability of privacy and secure distributed systems. The framework is intended to distill privacy-related digital identity requirements (business interoperability) into a set of services, which in turn can be implemented on the basis of open standards (technical interoperability). The adoption of the proposed framework in security projects and initiatives would decrease complexities and foster understanding and collaborations between business and technical stakeholders. This work is a step toward implementing the authorâ_Ts vision of delivering cyber security as a set of autonomous multi-platform hosted services that should be available upon user request and on a pay-per-use basis. | ||
650 | 0 | |a Engineering. |9 259622 | |
650 | 0 | |a Information technology. |9 260479 | |
650 | 0 | |a Business |x Data processing. |9 260480 | |
650 | 0 | |a Computer security. |9 260684 | |
650 | 0 | |a International law. |9 260071 | |
650 | 0 | |a Electrical engineering. |9 259797 | |
650 | 2 | 4 | |a Communications Engineering, Networks. |9 259799 |
650 | 2 | 4 | |a Systems and Data Security. |9 260687 |
650 | 2 | 4 | |a Sources and Subjects of International Law, International Organizations. |9 261505 |
776 | 0 | 8 | |i Printed edition: |z 9783319082301 |
856 | 4 | 0 | |u http://dx.doi.org/10.1007/978-3-319-08231-8 |
912 | |a ZDB-2-ENG | ||
929 | |a COM | ||
942 | |c EBK |6 _ | ||
950 | |a Engineering (Springer-11647) | ||
999 | |a SKV |c 28021 |d 28021 |