default search action
PrimeLife 2010: Helsingborg, Sweden
- Simone Fischer-Hübner, Penny Duquenoy, Marit Hansen, Ronald Leenes, Ge Zhang:
Privacy and Identity Management for Life - 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Helsingborg, Sweden, August 2-6, 2010, Revised Selected Papers. IFIP Advances in Information and Communication Technology 352, Springer 2011, ISBN 978-3-642-20768-6 - Philip Schütz, Michael Friedewald:
Privacy: What Are We Actually Talking About? - A Multidisciplinary Approach. 1-14 - Manuela Berg, Katrin Borcea-Pfitzmann:
Implementability of the Identity Management Part in Pfitzmann/Hansen's Terminology for a Complex Digital World. 15-26 - Stefan Berthold:
Towards a Formal Language for Privacy Options. 27-40 - Lisa Rajbhandari, Einar Snekkenes:
Using Game Theory to Analyze Risk to Privacy: An Initial Insight. 41-51 - Ebenezer Paintsil, Lothar Fritsch:
A Taxonomy of Privacy and Security Risks Contributing Factors. 52-63 - Bernd Carsten Stahl, Catherine Flick:
ETICA Workshop on Computer Ethics: Exploring Normative Issues. 64-77 - Michael Dowd:
Contextualised Concerns: The Online Privacy Attitudes of Young Adults. 78-89 - Norberto Nuno Gomes de Andrade:
Data Protection, Privacy and Identity: Distinguishing Concepts and Articulating Rights. 90-107 - Thomas P. Keenan:
Oops - We Didn't Mean to Do That! - How Unintended Consequences Can Hijack Good Privacy and Security Policies. 108-119 - Sebastian Haas, Ralph Herkenhöner, Denis Royer, Ammar Alkassar, Hermann de Meer, Günter Müller:
Supporting Semi-automated Compliance Control by a System Design Based on the Concept of Separation of Concerns. 120-129 - Anna Vapen, Nahid Shahmehri:
Security Levels for Web Authentication Using Mobile Phones. 130-143 - Herbert Leitold:
Challenges of eID Interoperability: The STORK Project. 144-150 - Harald Zwingelberg:
Necessary Processing of Personal Data: The Need-to-Know Principle and Processing Data from the New German Identity Card. 151-163 - Jan Vossaert, Pieter Verhaeghe, Bart De Decker, Vincent Naessens:
A Smart Card Based Solution for User-Centric Identity Management. 164-177 - Bibi van den Berg:
The Uncanny Valley Everywhere? On Privacy Perception and Expectation Management. 178-191 - Ton van Deursen:
50 Ways to Break RFID Privacy. 192-205 - Stefan Strauß:
The Limits of Control - (Governmental) Identity Management from a Privacy Perspective. 206-218 - Peter Rothenpieler, Claudia Becker, Stefan Fischer:
Privacy Concerns in a Remote Monitoring and Social Networking Platform for Assisted Living. 219-230 - Aleksandra Kuczerawy, Fanny Coudert:
Privacy Settings in Social Networking Sites: Is It Fair? 231-243 - Jaromir Dobias:
Privacy Effects of Web Bugs Amplified by Web 2.0. 244-257 - Marco Casassa Mont, Siani Pearson, Sadie Creese, Michael Goldsmith, Nick Papanikolaou:
A Conceptual Model for Privacy Policies with Consent and Revocation Requirements. 258-270 - Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith, Nick Papanikolaou:
Applying Formal Methods to Detect and Resolve Ambiguities in Privacy Requirements. 271-282 - Siani Pearson, Azzedine Benameur:
A Decision Support System for Design for Privacy. 283-296 - Kaniz Fatema, David W. Chadwick, Stijn F. Lievens:
A Multi-privacy Policy Enforcement System. 297-310 - Periambal L. Coopamootoo, Debi Ashenden:
Designing Usable Online Privacy Mechanisms: What Can We Learn from Real World Behaviour? 311-324 - Ulrich König:
PrimeLife Checkout - - A Privacy-Enabling e-Shopping User Interface. 325-337 - Leif-Erik Holtz, Katharina Nocun, Marit Hansen:
Towards Displaying Privacy Information with Icons. 338-348 - Hannes Federrath, Marit Hansen, Michael Waidner:
Andreas Pfitzmann 1958-2010: Pioneer of Technical Privacy Protection in the Information Society. 349-352
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.