書目名稱 | IT-Security and Privacy |
副標(biāo)題 | Design and Use of Pr |
編輯 | Simone Fischer-Hübner |
視頻video | http://file.papertrans.cn/461/460492/460492.mp4 |
概述 | Includes supplementary material: |
叢書名稱 | Lecture Notes in Computer Science |
圖書封面 |  |
描述 | Invasion of privacy and misuse of personal data are among the most obvious negative effects of today‘s information and communication technologies. Besides technical issues from a variety of fields, privacy legislation, depending on national activities and often lacking behind technical progress, plays an important role in designing, implementing, and using privacy-enhancing systems..Taking into account technical aspects from IT security, this book presents in detail a formal task-based privacy model which can be used to technically enforce legal privacy requirements. Furthermore, the author specifies how the privacy model policy has been implemented together with other security policies in accordance with the Generalized Framework for Access Control (GFAC)..This book will appeal equally to R&D professionals and practitioners active in IT security and privacy, advanced students, and IT managers. |
出版日期 | Book 2001 |
關(guān)鍵詞 | IT security; Information security; access control; anonymity; communication; data protection; data securit |
版次 | 1 |
doi | https://doi.org/10.1007/3-540-45150-1 |
isbn_softcover | 978-3-540-42142-9 |
isbn_ebook | 978-3-540-45150-1Series ISSN 0302-9743 Series E-ISSN 1611-3349 |
issn_series | 0302-9743 |
copyright | Springer-Verlag Berlin Heidelberg 2001 |