Skip to main content
Top

2014 | OriginalPaper | Chapter

7. Conclusion and Outlook

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Privacy is becoming an important issue and its importance will continue to grow over time. In the header of CNIL web site, it is mentioned that “information technology must respect the human identity, the human rights, privacy and liberties”. We believe that technology is far to be our enemy and can play a key role as a tool to protect human identity, the human rights, privacy and liberties if it is well implemented and used.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
4.
go back to reference ITU Focus Group on Identity Management (FG IdM), Report on identity management use cases and gap analysis (2007) ITU Focus Group on Identity Management (FG IdM), Report on identity management use cases and gap analysis (2007)
5.
go back to reference D.S. Allison et al., in ICITST ‘09 Privacy and trust policies within SOA in International Conference for Internet Technology and Secured Transactions (2009) D.S. Allison et al., in ICITST ‘09 Privacy and trust policies within SOA in International Conference for Internet Technology and Secured Transactions (2009)
6.
go back to reference D.S. Allison et al., in IWSESS ‘09 Metamodel for privacy policies within SOA, in The 2009 ICSE Workshop on Software Engineering for Secure Systems (2009) D.S. Allison et al., in IWSESS ‘09 Metamodel for privacy policies within SOA, in The 2009 ICSE Workshop on Software Engineering for Secure Systems (2009)
7.
go back to reference D. Garcia et al., in ICDIM ‘10 An Electronic Contract Model for Privacy Protection in Service-Oriented Architecture in 5th International Conference on Digital Information Management, (Thunder Bay, Canada, 2010) D. Garcia et al., in ICDIM ‘10 An Electronic Contract Model for Privacy Protection in Service-Oriented Architecture in 5th International Conference on Digital Information Management, (Thunder Bay, Canada, 2010)
8.
go back to reference D.S. Herrmann, Complete Guide to Security and Privacy Metrics (Auerbach Publications, Florida, 2007) D.S. Herrmann, Complete Guide to Security and Privacy Metrics (Auerbach Publications, Florida, 2007)
10.
go back to reference T. Erl, SOA Design Patterns (Prentice Hall, New Jersey, 2009) T. Erl, SOA Design Patterns (Prentice Hall, New Jersey, 2009)
13.
go back to reference R. Galloway and E. Thacker, The Exploit: A Theory of Networks (University of Minnesota Press, Minneapolis, 2008) R. Galloway and E. Thacker, The Exploit: A Theory of Networks (University of Minnesota Press, Minneapolis, 2008)
14.
go back to reference N. Shadbolt, T. Berners-Lee, Web science emerges. Sci. Am. Mag. 299, 76–81 (2008)CrossRef N. Shadbolt, T. Berners-Lee, Web science emerges. Sci. Am. Mag. 299, 76–81 (2008)CrossRef
15.
go back to reference V. Mayer-Schönberger, Delete: The Virtue of Forgetting in the Digital Age (Princeton University Press, New Jersey, 2009) V. Mayer-Schönberger, Delete: The Virtue of Forgetting in the Digital Age (Princeton University Press, New Jersey, 2009)
17.
go back to reference OASIS, An Introduction to XRIs (Working Draft), ed, (2005) OASIS, An Introduction to XRIs (Working Draft), ed, (2005)
18.
go back to reference T.P. Clancy, in Forward of the Book, in Information Storage and Management: Storing, Managing, and Protecting Digital Information, ed. by G. Somasundaram, A. Shrivastava (Wiley Publishing, New Jersey, 2009) T.P. Clancy, in Forward of the Book, in Information Storage and Management: Storing, Managing, and Protecting Digital Information, ed. by G. Somasundaram, A. Shrivastava (Wiley Publishing, New Jersey, 2009)
Metadata
Title
Conclusion and Outlook
Author
Ghazi Ben Ayed
Copyright Year
2014
DOI
https://doi.org/10.1007/978-3-319-08231-8_7