did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780387779959

Policies and Research in Identity Management

by ; ; ;
  • ISBN13:

    9780387779959

  • ISBN10:

    0387779957

  • Format: Hardcover
  • Copyright: 2008-06-20
  • Publisher: Springer-Verlag New York Inc
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $119.99 Save up to $101.43
  • Digital
    $40.22
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

This book constitutes the refereed proceedings of the First IFIP WG 11.6 Working Conference on Policies and Research in Identity Management (IDMAN'07) held in Rotterdam, the Netherlands on October 11-12, 2007.The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of refereed international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.

Table of Contents

Analysis of Identification Schemes
Keynote Paper: Politics and Identity Managementp. 3
Insecure Flight: Broken Boarding Passes and Ineffective Terrorist Watch Listsp. 5
Privacy and Identity Management
Context Based Enforcement of Authorization for Privacy and Security in Identity Managementp. 25
Automated Privacy Audits to Complement the Notion of Control for Identity Managementp. 39
Privacy Enhancing Technologies
Keynote Paper: Privacy and trust in the Information Societyp. 51
Biometrics
Keynote Paper: Biometric Encryption: Technology for Strong Authentication, Security and Privacyp. 57
Investigating and Comparing Multimodal Biometric Techniquesp. 79
BASE: a Proposed Secure Biometric Authentication Systemp. 91
Identity and Privacy Protection
Keynote Paper: Are State-Mediated Forms of Identification a Reaction to Physical Mobility? The case of England, 1500-2007p. 105
Privacy Risk Perceptions and Privacy Protection Strategiesp. 121
A Contextual Method for Evaluating Privacy Preferencesp. 139
Authentication
Implementing Strong Authentication Interoperability with Legacy Systemsp. 149
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program