default search action
PrimeLife 2011: Trento, Italy
- Jan Camenisch, Bruno Crispo, Simone Fischer-Hübner, Ronald Leenes, Giovanni Russello:
Privacy and Identity Management for Life - 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Trento, Italy, September 5-9, 2011, Revised Selected Papers. IFIP Advances in Information and Communication Technology 375, Springer 2012, ISBN 978-3-642-31667-8
Invited Talks
- Thomas P. Keenan:
Are They Making Our Privates Public? - Emerging Risks of Governmental Open Data Initiatives. 1-13 - Marit Hansen:
Top 10 Mistakes in System Design from a Privacy Perspective and Privacy Protection Goals. 14-31
Privacy Metrics and Comparison
- Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith:
Developing a Strategy for Automated Privacy Testing Suites. 32-44 - Philip Schütz:
Assessing Formal Independence of Data Protection Authorities in a Comparative Perspective. 45-58
Policies
- Kaniz Fatema, David W. Chadwick, Brendan Van Alsenoy:
Extracting Access Control and Conflict Resolution Policies from European Data Protection Law. 59-72 - Sandra Olislaegers:
Early Lessons Learned in the ENDORSE Project: Legal Challenges and Possibilities in Developing Data Protection Compliance Software. 73-87
Privacy and Transparency in the Age of Cloud Computing
- Ina Schiering, Jan Kretschmer:
The Infrastructure Level of Cloud Computing as a Basis for Privacy and Security of Software Services. 88-101 - Tobias Pulls:
(More) Side Channels in Cloud Storage - Linking Data to Users. 102-115 - Sebastian Labitzke:
Who Got All of My Personal Data? Enabling Users to Monitor the Proliferation of Shared Personally Identifiable Information. 116-129
Privacy for Mobile Applications
- Julio Angulo, Erik Wästlund:
Exploring Touch-Screen Biometrics for User Identification on Smart Phones. 130-143 - Faysal Boukayoua, Jan Vossaert, Bart De Decker, Vincent Naessens:
Using a Smartphone to Access Personalized Web Services on a Workstation. 144-156 - Koen Decroix, Bart De Decker, Vincent Naessens:
Designing Privacy-Enhancing Mobile Applications. 157-170
Consumer Privacy
- Ulrich König, Marit Hansen:
Extending Comparison Shopping Sites by Privacy Information on Retailers. 171-186 - Martin Beck, Michael Marhöfer:
Do-Not-Track Techniques for Browsers and Their Implications for Consumers. 187-196
Privacy for Online Communities
- Oleksandr Bodriagov, Sonja Buchegger:
P2P Social Networks with Broadcast Encryption Protected Privacy. 197-206 - Mohammad Badiul Islam, Renato Iannella:
Privacy by Design: Does It Matter for Social Networks? 207-220
Privacy for eHealth and eID Applications
- Milica Milutinovic, Koen Decroix, Vincent Naessens, Bart De Decker:
Privacy Preserving Mechanisms for a Pervasive eHealth System. 221-231 - Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith:
Formalising Requirements for a Biobank Case Study Using a Logic for Consent and Revocation. 232-244 - Harald Zwingelberg, Marit Hansen:
Privacy Protection Goals and Their Implications for eID Systems. 245-260
Privacy Attacks and Problems
- Gergely Alpár, Jaap-Henk Hoepman:
Avoiding Man-in-the-Middle Attacks When Verifying Public Terminals. 261-273 - Arnold Roosendaal:
Massive Data Collection by Mistake? 274-282
Ethics
- Aygen Kurt, Penny Duquenoy:
Addressing Governance and Ethics in European Technology Development Projects through Scenarios. 283-292
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.