Security, Privacy, and Trust in Modern Data Management

  • Milan Petković
  • Willem Jonker

Part of the Data-Centric Systems and Applications book series (DCSA)

Table of contents

  1. Front Matter
    Pages I-XVIII
  2. Introduction

    1. Front Matter
      Pages 1-1
    2. Milan Petković, Willem Jonker
      Pages 3-10
    3. Jeroen Terstegge
      Pages 11-20
  3. Data and System Security

    1. Front Matter
      Pages 37-37
    2. Sabrina De Capitani di Vimercati, Sara Foresti, Pierangela Samarati
      Pages 39-53
    3. Sylvia L. Osborn
      Pages 55-70
    4. Claudio A. Ardagna, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati
      Pages 71-86
    5. Elisa Bertino, Ji-Won Byun, Ashish Kamra
      Pages 87-101
    6. Claudio A. Ardagna, Ernesto Damiani, Sabrina De Capitani di Vimercati, Sara Foresti, Pierangela Samarati
      Pages 103-117
    7. Klaus Kursawe
      Pages 119-131
    8. Pim Tuyls, Boris Škorić
      Pages 133-148
  4. Privacy Enhancing

    1. Front Matter
      Pages 149-149
    2. Ljiljana Brankovic, Md. Zahidul Islam, Helen Giggins
      Pages 151-165
    3. Ljiljana Brankovic, Helen Giggins
      Pages 167-181
    4. Berry Schoenmakers, Pim Tuyls
      Pages 197-211
    5. Jan Camenisch, Birgit Pfitzmann
      Pages 213-238
    6. Claudia Diaz, Bart Preneel
      Pages 239-253

About this book

Introduction

The vision of ubiquitous computing and ambient intelligence describes a world of technology which is present anywhere, anytime in the form of smart, sensible devices that communicate with each other and provide personalized services. However, associated with these benefits are concerns with respect to security issues. Open interconnected systems are much more vulnerable to attacks and unauthorized data access. Furthermore, it becomes simpler to collect, store, and search personal information and endanger people's privacy.

In the context of this menace, Petkovic and Jonker provide a comprehensive guide to data management technologies with respect to security, privacy and trust. After the introductory part that offers a perspective on privacy and security issues in the modern digital world, the contributions from leading researchers are grouped into sections on data and system security, privacy-enhancing techniques, digital asset protection, and selected topics on privacy and security in ambient intelligence. Overall, the book delivers, from information on the ethical and legislative background, to chapters on the state-of-the-art technologies such as access control, identity management and digital rights management to advice on implementing fair information practices and preventing security and privacy violations.

With this broad approach, this book appeals equally to researchers and graduate students looking for an overview of this area of ever-growing importance and to professional developers who require sound theoretical grounds for the design and implementation of secure privacy-preserving ubiquitous applications.

Keywords

Access access control ambient intelligence authentication data mining data security database identity management information information security privacy radio-frequency identification (RFID) security ubiquitous computing watermarking

Editors and affiliations

  • Milan Petković
    • 1
  • Willem Jonker
    • 2
  1. 1.Philips Research EuropeEindhovenThe Netherlands
  2. 2.Philips Research EuropePhilips Research / Twente UniversityEindhovenThe Netherlands

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-540-69861-6
  • Copyright Information Springer-Verlag Berlin Heidelberg 2007
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-69860-9
  • Online ISBN 978-3-540-69861-6
  • About this book