Full Text Documents

Search


Table of Contents
Privacy and Identity Management for Life: 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School
Simone Fischer-Hübner, Penny Duquenoy, Marit Hansen, Ronald Leenes, Ge Zhang (Eds.)
Front Matter

Terminology


Privacy: What Are We Actually Talking About?
Philip Schütz, Michael Friedewald
1-14
Implementability of the Identity Management Part in Pfitzmann/Hansen’s Terminology for a Complex Digital World
Manuela Berg, Katrin Borcea-Pfitzmann
15-26

Privacy Metrics


Towards a Formal Language for Privacy Options
Stefan Berthold
27-40
Using Game Theory to Analyze Risk to Privacy: An Initial Insight
Lisa Rajbhandari, Einar Snekkenes
41-51
A Taxonomy of Privacy and Security Risks Contributing Factors
Ebenezer Paintsil, Lothar Fritsch
52-63

Ethical, Social, and Legal Aspects


ETICA Workshop on Computer Ethics: Exploring Normative Issues
Bernd Stahl, Catherine Flick
64-77
Contextualised Concerns: The Online Privacy Attitudes of Young Adults
Michael Dowd
78-89
Data Protection, Privacy and Identity: Distinguishing Concepts and Articulating Rights
Norberto Andrade
90-107

Data Protection and Identity Management


Oops - We Didn’t Mean to Do That! – How Unintended Consequences Can Hijack Good Privacy and Security Policies
Thomas Keenan
108-119
Supporting Semi-automated Compliance Control by a System Design Based on the Concept of Separation of Concerns
Sebastian Haas, Ralph Herkenhöner, Denis Royer, Ammar Alkassar, Hermann Meer, Günter Müller
120-129
Security Levels for Web Authentication Using Mobile Phones
Anna Vapen, Nahid Shahmehri
130-143

eID Cards and eID Interoperability


Challenges of eID Interoperability: The STORK Project
Herbert Leitold
144-150
Necessary Processing of Personal Data: The Need-to-Know Principle and Processing Data from the New German Identity Card
Harald Zwingelberg
151-163
A Smart Card Based Solution for User-Centric Identity Management
Jan Vossaert, Pieter Verhaeghe, Bart Decker, Vincent Naessens
164-177

Emerging Technologies


The Uncanny Valley Everywhere? On Privacy Perception and Expectation Management
Bibi Berg
178-191
50 Ways to Break RFID Privacy
Ton Deursen
192-205

Privacy for eGovernment and AAL Applications


The Limits of Control – (Governmental) Identity Management from a Privacy Perspective
Stefan Strauß
206-218
Privacy Concerns in a Remote Monitoring and Social Networking Platform for Assisted Living
Peter Rothenpieler, Claudia Becker, Stefan Fischer
219-230

Social Networks and Privacy


Privacy Settings in Social Networking Sites: Is It Fair?
Aleksandra Kuczerawy, Fanny Coudert
231-243
Privacy Effects of Web Bugs Amplified by Web 2.0
Jaromir Dobias
244-257

Privacy Policies


A Conceptual Model for Privacy Policies with Consent and Revocation Requirements
Nick Papanikolaou, Marco Casassa Mont, Siani Pearson, Sadie Creese, Michael Goldsmith
258-270
Applying Formal Methods to Detect and Resolve Ambiguities in Privacy Requirements
Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith, Nick Papanikolaou
271-282
A Decision Support System for Design for Privacy
Siani Pearson, Azzedine Benameur
283-296
A Multi-privacy Policy Enforcement System
Kaniz Fatema, David Chadwick, Stijn Lievens
297-310

>

Usable Privacy


Designing Usable Online Privacy Mechanisms: What Can We Learn from Real World Behaviour?
Periambal Coopamootoo, Debi Ashenden
311-324
PrimeLife Checkout
Ulrich König
325-337
Towards Displaying Privacy Information with Icons
Leif-Erik Holtz, Katharina Nocun, Marit Hansen
338-348

Obituary


Andreas Pfitzmann 1958-2010: Pioneer of Technical Privacy Protection in the Information Society
Hannes Federrath, Marit Hansen, Michael Waidner
349-352