Privacy Technologies and Policy 5th Annual Privacy Forum, APF 2017, Vienna, Austria, June 7-8, 2017, Revised Selected Papers
tarafından
 
Schweighofer, Erich. editor.

Başlık
Privacy Technologies and Policy 5th Annual Privacy Forum, APF 2017, Vienna, Austria, June 7-8, 2017, Revised Selected Papers

Yazar
Schweighofer, Erich. editor.

ISBN
9783319672809

Edisyon
1st ed. 2017.

Fiziksel Niteleme
XIV, 231 p. 59 illus. online resource.

Seri
Security and Cryptology ; 10518

İçindekiler
The GDPR and Big Data: leading the way for Big Genetic Data? -- Towards a Privacy-preserving Reliable European Identity Ecosystem -- Forget Me, Forget Me Not - Redefining the Boundaries of the Right to be Forgotten to Address Current Problems and Areas of Criticism -- A Refinement Approach for the Reuse of Privacy Risk Analysis Results -- Neutralisation and Anonymization -- Gamified Approach to explore Techniques of Neutralization of Threat Actors in Cybercrime -- Design Data Exchange between CSIRTs -- Mr X vs. Mr Y: the Emergence of Externalities in Differential Privacy -- High-Utility Database Anonymization -- Privacy Policies in Practice -- Towards a Principled Approach for Engineering Privacy by Design -- PrivacyScore: Improving Privacy and Security via Crowd-Sourced Benchmarks of Websites -- Privacy Data Management  and Awareness for Public Administrations: a Case Study from the Healthcare Domain -- Better Data Protection by Design through Multicriteria Decision Making: On False Tradeoffs between Privacy and Utility.

Özet
This book constitutes the thoroughly refereed post-conference proceedings of the 5th Annual Privacy Forum, APF 2017, held in Vienna, Austria, in June 2017. The 12 revised full papers were carefully selected from 41 submissions on the basis of significance, novelty, and scientific quality. These selected papers are organized in three different chapters corresponding to the conference sessions. The first chapter, “Data Protection Regulation”, discusses topics concerning big genetic data, a privacy-preserving European identity ecosystem, the right to be forgotten und the re-use of privacy risk analysis. The second chapter, “Neutralisation and Anonymization”, discusses neutralisation of threat actors, privacy by design data exchange between CSIRTs, differential privacy and database anonymization. Finally, the third chapter, “Privacy Policies in Practice”, discusses privacy by design, privacy scores, privacy data management in healthcare and trade-offs between privacy and utility. .

Konu Başlığı
Computer science.
 
Computer security.
 
Computer software.
 
Computers and Society. http://scigraph.springernature.com/things/product-market-codes/I24040
 
Systems and Data Security. http://scigraph.springernature.com/things/product-market-codes/I28060
 
e-Commerce/e-business. http://scigraph.springernature.com/things/product-market-codes/I26000
 
Information Systems Applications (incl. Internet). http://scigraph.springernature.com/things/product-market-codes/I18040
 
Algorithm Analysis and Problem Complexity. http://scigraph.springernature.com/things/product-market-codes/I16021

Yazar Ek Girişi
Schweighofer, Erich.
 
Leitold, Herbert.
 
Mitrakas, Andreas.
 
Rannenberg, Kai.

Ek Kurum Yazar
SpringerLink (Online service)

Elektronik Erişim
https://doi.org/10.1007/978-3-319-67280-9


Materyal TürüBarkodYer NumarasıDurumu/İade Tarihi
Electronic Book226635-1001QA76.9 .C66Springer E-Book Collection