Advertisement

Security, Privacy, and Trust in Modern Data Management

  • Milan Petković
  • Willem Jonker

Part of the Data-Centric Systems and Applications book series (DCSA)

Table of contents

  1. Front Matter
    Pages I-XVIII
  2. Introduction

    1. Front Matter
      Pages 1-1
    2. Milan Petković, Willem Jonker
      Pages 3-10
    3. Jeroen Terstegge
      Pages 11-20
  3. Data and System Security

    1. Front Matter
      Pages 37-37
    2. Sabrina De Capitani di Vimercati, Sara Foresti, Pierangela Samarati
      Pages 39-53
    3. Sylvia L. Osborn
      Pages 55-70
    4. Claudio A. Ardagna, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati
      Pages 71-86
    5. Elisa Bertino, Ji-Won Byun, Ashish Kamra
      Pages 87-101
    6. Claudio A. Ardagna, Ernesto Damiani, Sabrina De Capitani di Vimercati, Sara Foresti, Pierangela Samarati
      Pages 103-117
    7. Klaus Kursawe
      Pages 119-131
    8. Pim Tuyls, Boris Škorić
      Pages 133-148
  4. Privacy Enhancing

    1. Front Matter
      Pages 149-149
    2. Ljiljana Brankovic, Md. Zahidul Islam, Helen Giggins
      Pages 151-165
    3. Ljiljana Brankovic, Helen Giggins
      Pages 167-181
    4. Berry Schoenmakers, Pim Tuyls
      Pages 197-211
    5. Jan Camenisch, Birgit Pfitzmann
      Pages 213-238
    6. Claudia Diaz, Bart Preneel
      Pages 239-253
  5. Digital Asset Protection

    1. Front Matter
      Pages 255-255
    2. Joop Talstra
      Pages 267-285
    3. Michiel van der Veen, Aweke Lemma, Mehmet Celik, Stefan Katzenbeisser
      Pages 287-302
    4. Frank Kamperman
      Pages 317-331
    5. Hong Li, Milan Petković
      Pages 333-346
    6. Milan Petković, Claudine Conrado, Geert-Jan Schrijen, Willem Jonker
      Pages 347-364
  6. Selected Topics on Privacy and Security in Ambient Intelligence

    1. Front Matter
      Pages 365-365
    2. Emile Aarts, Panos Markopoulos, Boris de Ruyter
      Pages 367-381
    3. Marnix Dekker, Sandro Etalle, Jerry den Hartog
      Pages 383-397
    4. Daniel Olmedilla
      Pages 399-415
    5. Pim Tuyls, Tom Kevenaar
      Pages 417-431
    6. Marc Langheinrich
      Pages 433-450
    7. Morton Swimmer
      Pages 451-466
  7. Back Matter
    Pages 467-471

About this book

Introduction

The vision of ubiquitous computing and ambient intelligence describes a world of technology which is present anywhere, anytime in the form of smart, sensible devices that communicate with each other and provide personalized services. However, associated with these benefits are concerns with respect to security issues. Open interconnected systems are much more vulnerable to attacks and unauthorized data access. Furthermore, it becomes simpler to collect, store, and search personal information and endanger people's privacy.

In the context of this menace, Petkovic and Jonker provide a comprehensive guide to data management technologies with respect to security, privacy and trust. After the introductory part that offers a perspective on privacy and security issues in the modern digital world, the contributions from leading researchers are grouped into sections on data and system security, privacy-enhancing techniques, digital asset protection, and selected topics on privacy and security in ambient intelligence. Overall, the book delivers, from information on the ethical and legislative background, to chapters on the state-of-the-art technologies such as access control, identity management and digital rights management to advice on implementing fair information practices and preventing security and privacy violations.

With this broad approach, this book appeals equally to researchers and graduate students looking for an overview of this area of ever-growing importance and to professional developers who require sound theoretical grounds for the design and implementation of secure privacy-preserving ubiquitous applications.

Keywords

Access access control ambient intelligence authentication data mining data security database identity management information information security privacy radio-frequency identification (RFID) security ubiquitous computing watermarking

Editors and affiliations

  • Milan Petković
    • 1
  • Willem Jonker
    • 2
  1. 1.Philips Research EuropeEindhovenThe Netherlands
  2. 2.Philips Research EuropePhilips Research / Twente UniversityEindhovenThe Netherlands

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-540-69861-6
  • Copyright Information Springer-Verlag Berlin Heidelberg 2007
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-69860-9
  • Online ISBN 978-3-540-69861-6
  • Buy this book on publisher's site