Amazon cover image
Image from Amazon.com

Policies and Research in Identity Management [electronic resource] : First IFIP WG11.6 Working Conference on Policies and Research in Identity Management (IDMAN'07), RSM Erasmus University, Rotterdam, The Netherlands, October 11-12, 2007 / edited by Elisabeth Leeuw, Simone Fischer-Hübner, Jimmy Tseng, John Borking.

By: Contributor(s): Material type: TextTextSeries: The International Federation for Information Processing ; 261Publisher: Boston, MA : Springer US, 2008Description: online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9780387779966
Subject(s): Additional physical formats: Printed edition:: No titleDDC classification:
  • 005.74 23
LOC classification:
  • QA76.9.D35
Online resources:
Contents:
Analysis of Identification Schemes -- Keynote Paper: Politics and Identity Management -- Insecure Flight: Broken Boarding Passes and Ineffective Terrorist Watch Lists -- Privacy and Identity Management -- Context Based Enforcement of Authorization for Privacy and Security in Identity Management -- Automated Privacy Audits to Complement the Notion of Control for Identity Management -- Privacy Enhancing Technologies -- Keynote Paper: Privacy and trust in the Information Society -- Biometrics -- Keynote Paper: Biometric Encryption: Technology for Strong Authentication, Security and Privacy -- Investigating and Comparing Multimodal Biometric Techniques -- BASE: a Proposed Secure Biometric Authentication System -- Identity and Privacy Protection -- Keynote Paper: Are State-Mediated Forms of Identification a Reaction to Physical Mobility? The case of England, 1500-2007 -- Privacy Risk Perceptions and Privacy Protection Strategies -- A Contextual Method for Evaluating Privacy Preferences -- Authentication -- Implementing Strong Authentication Interoperability with Legacy Systems.
In: Springer eBooksSummary: International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of refereed international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing. For more information about the 300 other books in the IFIP series, please visit www.springer.com.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode
E-Book E-Book Central Library Available E-38076

Analysis of Identification Schemes -- Keynote Paper: Politics and Identity Management -- Insecure Flight: Broken Boarding Passes and Ineffective Terrorist Watch Lists -- Privacy and Identity Management -- Context Based Enforcement of Authorization for Privacy and Security in Identity Management -- Automated Privacy Audits to Complement the Notion of Control for Identity Management -- Privacy Enhancing Technologies -- Keynote Paper: Privacy and trust in the Information Society -- Biometrics -- Keynote Paper: Biometric Encryption: Technology for Strong Authentication, Security and Privacy -- Investigating and Comparing Multimodal Biometric Techniques -- BASE: a Proposed Secure Biometric Authentication System -- Identity and Privacy Protection -- Keynote Paper: Are State-Mediated Forms of Identification a Reaction to Physical Mobility? The case of England, 1500-2007 -- Privacy Risk Perceptions and Privacy Protection Strategies -- A Contextual Method for Evaluating Privacy Preferences -- Authentication -- Implementing Strong Authentication Interoperability with Legacy Systems.

International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of refereed international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing. For more information about the 300 other books in the IFIP series, please visit www.springer.com.

There are no comments on this title.

to post a comment.

Maintained by VTU Library