Full Text Documents

Search


Table of Contents
Privacy and Identity Management for Life
Jan Camenisch, Bruno Crispo, Simone Fischer-Hübner, Ronald Leenes, Giovanni Russello (Eds.)
Front Matter

Invited Talks


Are They Making Our Privates Public? – Emerging Risks of Governmental Open Data Initiatives
Thomas Keenan
1-13
Top 10 Mistakes in System Design from a Privacy Perspective and Privacy Protection Goals
Marit Hansen
14-31

Privacy Metrics and Comparison


Developing a Strategy for Automated Privacy Testing Suites
Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith
32-44
Assessing Formal Independence of Data Protection Authorities in a Comparative Perspective
Philip Schütz
45-58
   

Policies


Extracting Access Control and Conflict Resolution Policies from European Data Protection Law
Kaniz Fatema, David Chadwick, Brendan Alsenoy
59-72
Early Lessons Learned in the ENDORSE Project: Legal Challenges and Possibilities in Developing Data Protection Compliance Software
Sandra Olislaegers
73-87

Privacy and Transparency in the Age of Cloud Computing


The Infrastructure Level of Cloud Computing as a Basis for Privacy and Security of Software Services
Ina Schiering, Jan Kretschmer
88-101
(More) Side Channels in Cloud Storage
Tobias Pulls
102-115
Who Got All of My Personal Data? Enabling Users to Monitor the Proliferation of Shared Personally Identifiable Information
Sebastian Labitzke
116-129

Privacy for Mobile Applications


Exploring Touch-Screen Biometrics for User Identification on Smart Phones
Julio Angulo, Erik Wästlund
130-143
Using a Smartphone to Access Personalized Web Services on a Workstation
Faysal Boukayoua, Jan Vossaert, Bart Decker, Vincent Naessens
144-156
Designing Privacy-Enhancing Mobile Applications
Koen Decroix, Bart Decker, Vincent Naessens
157-170

Consumer Privacy


Extending Comparison Shopping Sites by Privacy Information on Retailers
Ulrich König, Marit Hansen
171-186
Do-Not-Track Techniques for Browsers and Their Implications for Consumers
Martin Beck, Michael Marhöfer
187-196

Privacy for Online Communities


P2P Social Networks with Broadcast Encryption Protected Privacy
Oleksandr Bodriagov, Sonja Buchegger
197-206
Privacy by Design: Does It Matter for Social Networks?
Mohammad Islam, Renato Iannella
207-220

Privacy for eHealth and eID Applications


Privacy Preserving Mechanisms for a Pervasive eHealth System
Milica Milutinovic, Koen Decroix, Vincent Naessens, Bart Decker
221-231
Formalising Requirements for a Biobank Case Study Using a Logic for Consent and Revocation
Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith
232-244
Privacy Protection Goals and Their Implications for eID Systems
Harald Zwingelberg, Marit Hansen
245-260

Privacy Attacks and Problems


Avoiding Man-in-the-Middle Attacks When Verifying Public Terminals
Gergely Alpár, Jaap-Henk Hoepman
261-273
Massive Data Collection by Mistake?
Arnold Roosendaal
274-282

Ethics


Addressing Governance and Ethics in European Technology Development Projects through Scenarios
Aygen Kurt, Penny Duquenoy
283-292

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/