


default search action
PrimeLife 2011: Trento, Italy
- Jan Camenisch, Bruno Crispo, Simone Fischer-Hübner, Ronald Leenes, Giovanni Russello:

Privacy and Identity Management for Life - 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Trento, Italy, September 5-9, 2011, Revised Selected Papers. IFIP Advances in Information and Communication Technology 375, Springer 2012, ISBN 978-3-642-31667-8
Invited Talks
- Thomas P. Keenan

:
Are They Making Our Privates Public? - Emerging Risks of Governmental Open Data Initiatives. 1-13 - Marit Hansen:

Top 10 Mistakes in System Design from a Privacy Perspective and Privacy Protection Goals. 14-31
Privacy Metrics and Comparison
- Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith:

Developing a Strategy for Automated Privacy Testing Suites. 32-44 - Philip Schütz:

Assessing Formal Independence of Data Protection Authorities in a Comparative Perspective. 45-58
Policies
- Kaniz Fatema

, David W. Chadwick
, Brendan Van Alsenoy:
Extracting Access Control and Conflict Resolution Policies from European Data Protection Law. 59-72 - Sandra Olislaegers:

Early Lessons Learned in the ENDORSE Project: Legal Challenges and Possibilities in Developing Data Protection Compliance Software. 73-87
Privacy and Transparency in the Age of Cloud Computing
- Ina Schiering

, Jan Kretschmer:
The Infrastructure Level of Cloud Computing as a Basis for Privacy and Security of Software Services. 88-101 - Tobias Pulls:

(More) Side Channels in Cloud Storage - Linking Data to Users. 102-115 - Sebastian Labitzke:

Who Got All of My Personal Data? Enabling Users to Monitor the Proliferation of Shared Personally Identifiable Information. 116-129
Privacy for Mobile Applications
- Julio Angulo

, Erik Wästlund
:
Exploring Touch-Screen Biometrics for User Identification on Smart Phones. 130-143 - Faysal Boukayoua, Jan Vossaert, Bart De Decker, Vincent Naessens:

Using a Smartphone to Access Personalized Web Services on a Workstation. 144-156 - Koen Decroix, Bart De Decker, Vincent Naessens:

Designing Privacy-Enhancing Mobile Applications. 157-170
Consumer Privacy
- Ulrich König, Marit Hansen:

Extending Comparison Shopping Sites by Privacy Information on Retailers. 171-186 - Martin Beck, Michael Marhöfer:

Do-Not-Track Techniques for Browsers and Their Implications for Consumers. 187-196
Privacy for Online Communities
- Oleksandr Bodriagov, Sonja Buchegger:

P2P Social Networks with Broadcast Encryption Protected Privacy. 197-206 - Mohammad Badiul Islam, Renato Iannella:

Privacy by Design: Does It Matter for Social Networks? 207-220
Privacy for eHealth and eID Applications
- Milica Milutinovic, Koen Decroix, Vincent Naessens, Bart De Decker:

Privacy Preserving Mechanisms for a Pervasive eHealth System. 221-231 - Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith:

Formalising Requirements for a Biobank Case Study Using a Logic for Consent and Revocation. 232-244 - Harald Zwingelberg, Marit Hansen:

Privacy Protection Goals and Their Implications for eID Systems. 245-260
Privacy Attacks and Problems
- Gergely Alpár, Jaap-Henk Hoepman:

Avoiding Man-in-the-Middle Attacks When Verifying Public Terminals. 261-273 - Arnold Roosendaal:

Massive Data Collection by Mistake? 274-282
Ethics
- Aygen Kurt

, Penny Duquenoy:
Addressing Governance and Ethics in European Technology Development Projects through Scenarios. 283-292

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














