Abstract
Privacy protection tools can be characterised by the number of parties that have to cooperate so that the tools work and achieve the desired effect [Pfi01]: Some privacy protection tools can be used stand-alone, without the need for the cooperation of other parties. Others require that the communication partners use the same tools. Some tools only function when being supported by an appropriate infrastructure that quite often is currently not in place.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Camenisch, J. et al. (2011). Open Source Contributions. In: Camenisch, J., Fischer-Hübner, S., Rannenberg, K. (eds) Privacy and Identity Management for Life. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-20317-6_24
Download citation
DOI: https://doi.org/10.1007/978-3-642-20317-6_24
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-20316-9
Online ISBN: 978-3-642-20317-6
eBook Packages: Business and EconomicsBusiness and Management (R0)