Abstract
Part III of the PRIME Book is dedicated to an in-depth discussion of the technological side of the PRIME project. Part III is structured such that the current chapter gives an introduction to this part of the book and the concept of trust which is foundational to PRIME and its choices of technology. The technical discussions start with a discussion on architectural aspects with the focus on a privacy-enhancing architecture describing how different privacy technologies can be integrated into a system for an improved protection of the privacy of users in Chapter 9. The discussions on the architectural aspects are followed with elaborations on relevant technologies that are described in detail following the chapter on the architecture aspects. The detailed structure of Part III is presented further below in Section 8.2.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Crane, S., Pearson, S., Sommer, D. (2011). Introduction: Privacy, Trust, and Identity Management. In: Camenisch, J., Leenes, R., Sommer, D. (eds) Digital Privacy. Lecture Notes in Computer Science, vol 6545. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-19050-6_8
Download citation
DOI: https://doi.org/10.1007/978-3-642-19050-6_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-19049-0
Online ISBN: 978-3-642-19050-6
eBook Packages: Computer ScienceComputer Science (R0)