![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
18th Privacy and Identity Management 2023: Oslo, Norway
- Felix Bieker, Silvia De Conca
, Nils Gruschka
, Meiko Jensen, Ina Schiering
:
Privacy and Identity Management. Sharing in a Digital World - 18th IFIP WG 9.2, 9.6/11.7, 11.6 International Summer School, Privacy and Identity 2023, Oslo, Norway, August 8-11, 2023, Revised Selected Papers. IFIP Advances in Information and Communication Technology 695, Springer 2024, ISBN 978-3-031-57977-6
Keynote Papers
- Liina Kamm
, Dan Bogdanov
, Eduardo Brito
, Andre Ostrak
:
Blueprints for Deploying Privacy Enhancing Technologies in E-Government. 3-19 - Maria Grazia Porcedda
:
The Effacement of Information Technology from EU Law: The Need for Collaborative Approaches to Redesign the EU's Regulatory Architecture. 20-28
Selected Student Papers
- August Bourgeus
, Tim Theys
, Nanouk Verhulst
, Laurens Vandercruysse
, Peter Mechant
:
Towards an Affordance-Based Typology of Personal Data Stores. 31-45 - Chinmayi Prabhu Baramashetru
, Silvia Lizeth Tapia Tarifa
, Olaf Owe
:
Assuring GDPR Conformance Through Language-Based Compliance. 46-63 - Feiyang Tang
, Bjarte M. Østvold
:
User Interaction Data in Apps: Comparing Policy Claims to Implementations. 64-80 - Bjørn Aslak Juliussen
, Jon Petter Rui
, Dag Johansen
:
Developing with Compliance in Mind: Addressing Data Protection Law, Cybersecurity Regulation, and AI Regulation During Software Development. 81-96 - Cynthia Ng
:
Digital Security Controversy Analysis: A Case Study of the Debate over GCHQ Exceptional Access Proposal. 97-113 - Ann-Kristin Lieberknecht:
Educating Parents in Managing Online Privacy Risks: Media Educators' Perspectives. 114-126 - Pawel Hajduk
:
A Walk in the Labyrinth. Evolving EU Regulatory Framework for Secondary Use of Electronic Personal Health Data for Scientific Research. 127-142 - Ramona Schmidt
, Ina Schiering
:
Who Is the Attacker - Analyzing Data Protection Violations in Health Care. 143-157 - Mehdi Akbari Gurabi
, Felix Hermsen, Avikarsha Mandal, Stefan Decker:
Towards Privacy-Preserving Machine Learning in Sovereign Data Spaces: Opportunities and Challenges. 158-174 - Malte Hansen
, Andre Büttner
:
Secure and Privacy-Preserving Authentication for Data Subject Rights Enforcement. 175-191 - Mahdi Akil, Sujash Naskar, Leonardo A. Martucci, Jaap-Henk Hoepman:
A Privacy-Preserving Approach to Vehicle Renting and Driver Accountability in VANETs. 192-210 - Daniel Richter
, Jürgen Anke
:
Entangled: A Case Study of Data Exchange and Actor Relationships in a Mobility Ecosystem. 211-226 - Janina Rochon:
Enhancing Transparency Through Personal Information Management Systems: Current State of Service Offerings and Considerations for Further Advancements. 227-243 - Piero Romare:
User-Driven Privacy Factors in Trigger-Action Apps: A Comparative Analysis with General IoT. 244-264 - Felix Hermsen, Avikarsha Mandal:
Privacy and Utility Evaluation of Synthetic Tabular Data for Machine Learning. 265-281 - Saloni Kwatra
, Vicenç Torra
:
Empirical Evaluation of Synthetic Data Created by Generative Models via Attribute Inference Attack. 282-291 - Vera Schmitt
, Paul Michel dit Ferrer, Arooj Anwar Khan, Ina Kern, Sebastian Möller:
How Much is Your Instagram Data Worth? Economic Perspective of Privacy in the Social Media Context. 292-308
Workshop and Tutorial Papers
- Jenni Reuben, Ala Sarah Alaqra:
Private Training Approaches - A Primer. 311-324 - Aida Akbarzadeh, Sabarathinam Chockalingam
, Xhesika Ramaj, Lama Amro, Mary Sánchez-Gordón, Vasileios Gkioulos, Ricardo Colomo Palacios, László Erdodi, Nathan Lau, Siv Hilde Houmb:
Workshop on Cybersecurity of Critical Infrastructures. 325-339
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.