Overview
- Includes supplementary material: sn.pub/extras
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 1958)
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
Taking into account technical aspects from IT security, this book presents in detail a formal task-based privacy model which can be used to technically enforce legal privacy requirements. Furthermore, the author specifies how the privacy model policy has been implemented together with other security policies in accordance with the Generalized Framework for Access Control (GFAC).
This book will appeal equally to R&D professionals and practitioners active in IT security and privacy, advanced students, and IT managers.
Similar content being viewed by others
Keywords
Table of contents (9 chapters)
Reviews
From the reviews:
"The book offers a comprehensive view to the relation between IT security and privacy and to the privacy enhancing technologies. It represents useful reading for all IT professionals." (Jozef Vyskoc, Zentralblatt MATH, Vol. 980, 2002)
Editors and Affiliations
Bibliographic Information
Book Title: IT-Security and Privacy
Book Subtitle: Design and Use of Privacy-Enhancing Security Mechanisms
Editors: Simone Fischer-Hübner
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/3-540-45150-1
Publisher: Springer Berlin, Heidelberg
-
eBook Packages: Springer Book Archive
Copyright Information: Springer-Verlag Berlin Heidelberg 2001
Softcover ISBN: 978-3-540-42142-9Published: 09 May 2001
eBook ISBN: 978-3-540-45150-1Published: 29 June 2003
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XIV, 358
Topics: Systems and Data Security, Cryptology, Computer Communication Networks, Management of Computing and Information Systems, Computers and Society, IT in Business