A Model-based Analysis of Tunability in Privacy Services (Englisch)
Freier Zugriff
- Neue Suche nach: Lundin, Reine
- Neue Suche nach: Lindskog, Stefan
- Neue Suche nach: Brunstrom, Anna
- Neue Suche nach: Lundin, Reine
- Neue Suche nach: Lindskog, Stefan
- Neue Suche nach: Brunstrom, Anna
In:
The Future of Identity in the Information Society
11
;
343-356
;
2008
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:A Model-based Analysis of Tunability in Privacy Services
-
Beteiligte:
-
Erschienen in:The Future of Identity in the Information Society , 11 ; 343-356IFIP — The International Federation for Information Processing ; 262, 11 ; 343-356
-
Verlag:
- Neue Suche nach: Springer US
-
Erscheinungsort:Boston, MA
-
Erscheinungsdatum:01.01.2008
-
Format / Umfang:14 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 3
-
Social and Political Dimensions of IdentityRaab, Charles D. et al. | 2008
- 23
-
A Forensic Framework for Tracing PhishersGajek, Sebastian / Sadeghi, Ahmad-Reza et al. | 2008
- 37
-
On the Internet, Things Never Go Away CompletelyKeenan, Thomas P. et al. | 2008
- 51
-
Privacy in Danger: Let’s Google Your PrivacyTatli, Emin Islam et al. | 2008
- 63
-
Self, Script, and Situation: Identity in a world of ICTsBerg, Bibi et al. | 2008
- 77
-
Moral identification in Identity Management SystemsManders-Huits, Noëmi / Hoven, Jeroen et al. | 2008
- 95
-
Privacy in the MetaverseLeenes, Ronald et al. | 2008
- 113
-
Young People’s Gender and Identity Work in a Swedish Internet CommunitySveningsson Elm, Malin et al. | 2008
- 129
-
Privacy implications of RFID: An assessment of threats and opportunitesLieshout, Marc / Kool, Linda et al. | 2008
- 143
-
Identification and Tracking of Individuals and Social Networks using the Electronic Product Code on RFID TagsHansen, Markus / Meissner, Sebastian et al. | 2008
- 151
-
Implantable RFID ChipsKumar, Vikas et al. | 2008
- 161
-
The Need for a Paradigm Shift in Addressing Privacy Risks in Social Networking ApplicationsWeiss, Stefan et al. | 2008
- 175
-
Authentication and Transaction Security in E-businessMüller, Lorenz et al. | 2008
- 199
-
Marrying Transparency Tools with User-Controlled Identity ManagementHansen, Marit et al. | 2008
- 223
-
Identity Deployment and Management in Wireless Mesh NetworksMartucci, Leonardo A. / Zuccato, Albin / Fischer-Hübner, Simone et al. | 2008
- 235
-
Automating Identity Management and Access ControlJoosten, Rieks / Joosten, Stef et al. | 2008
- 245
-
Privacy-friendly Identity Management in eGovernmentHuysmans, Xavier et al. | 2008
- 259
-
Generic Predefined Privacy Preferences for Online ApplicationsBergmann, Mike et al. | 2008
- 277
-
Data Protection and the use of Biometric Data in the EUSprokkereef, Annemarie et al. | 2008
- 287
-
ICT ImplantsGasson, Mark N. et al. | 2008
- 299
-
Using Identity-Based Public-Key Cryptography with Images to Preserve PrivacyPape, Sebastian / Benamar, Nabil et al. | 2008
- 311
-
Traffic Flow Confidentiality in IPsec: Protocol and ImplementationKiraly, Csaba / Teofili, Simone / Bianchi, Giuseppe / Lo Cigno, Renato / Nardelli, Matteo / Delzeri, Emanuele et al. | 2008
- 325
-
On the Fundamentals of Anonymity MetricsAndersson, Christer / Lundin, Reine et al. | 2008
- 343
-
A Model-based Analysis of Tunability in Privacy ServicesLundin, Reine / Lindskog, Stefan / Brunstrom, Anna et al. | 2008
- 359
-
Digital Identity and AnonymityRodrigues, Rowena et al. | 2008
- 375
-
ICT and Social Work: A Question of Identities?Laurent, Véronique et al. | 2008
- 389
-
Putting Identifiers in the Context of eHealthJoosten, Rieks / Whitehouse, Diane / Duquenoy, Penny et al. | 2008
- 407
-
Knowledge Based OrganizationNeagu, Cristina Denisa et al. | 2008
- 423
-
Collaborative Knowledge NetworksTaifi, Nouha et al. | 2008
- 433
-
Enterprise Identity ManagementRoyer, Denis et al. | 2008
- 447
-
Privacy and Data Protection in a User-Centric Business Model for Telecommunications ServicesYelmo, Juan C. / Álamo, José M. / Trapero, Rubén et al. | 2008
- E1
-
ErratumYelmo, Juan C. / Álamo, José M. / Trapero, Rubén et al. | 2008