Part I Privacy and Identity Management
An Introduction to Privacy-Enhancing Identity Management
Part II Setting the Stage
The Identity Landscape
The Need for Privacy-Enhancing Identity Management
Regulating Identity Management
User-Centric Privacy-Enhancing Identity Management
Privacy-Enhancing Identity Management in Business
Part III What Technology Can Do for Privacy and How
Introduction: Privacy, Trust, and Identity Management
Architecture
Pseudonyms and Private Credentials
Privacy Models and Languages: Access Control and Data
Privacy Models and Languages: Obligation Policies
Privacy Models and Languages: Assurance Checking
Privacy-Aware Access Control System
Privacy-Aware Identity Lifecycle Management
Privacy Assurance Checking
Security/Trustworthiness Assessment of Platforms
Further Privacy Mechanisms
Reputation Management
Human-Computer Interaction
Technology Assurance
Multilateral Interactions
Part IV PRIME Applied
Collaborative E-Learning
Location-Based Services
e-Health
Airport Security Controls
Privacy and Identity Management Requirements
Part V Conclusion and Outlook.