index - Privacy and Identity Management for Life Access content directly
   


Full Text Documents

Chargement de la page

Search

Chargement de la page

Table of Contents
Privacy and Identity Management for Life
Jan Camenisch, Bruno Crispo, Simone Fischer-Hübner, Ronald Leenes, Giovanni Russello (Eds.)
Front Matter

Invited Talks


Are They Making Our Privates Public? – Emerging Risks of Governmental Open Data Initiatives
Thomas Keenan
1-13
Top 10 Mistakes in System Design from a Privacy Perspective and Privacy Protection Goals
Marit Hansen
14-31

Privacy Metrics and Comparison


Developing a Strategy for Automated Privacy Testing Suites
Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith
32-44
Assessing Formal Independence of Data Protection Authorities in a Comparative Perspective
Philip Schütz
45-58
   

Policies


Extracting Access Control and Conflict Resolution Policies from European Data Protection Law
Kaniz Fatema, David Chadwick, Brendan Alsenoy
59-72
Early Lessons Learned in the ENDORSE Project: Legal Challenges and Possibilities in Developing Data Protection Compliance Software
Sandra Olislaegers
73-87

Privacy and Transparency in the Age of Cloud Computing


The Infrastructure Level of Cloud Computing as a Basis for Privacy and Security of Software Services
Ina Schiering, Jan Kretschmer
88-101
(More) Side Channels in Cloud Storage
Tobias Pulls
102-115
Who Got All of My Personal Data? Enabling Users to Monitor the Proliferation of Shared Personally Identifiable Information
Sebastian Labitzke
116-129

Privacy for Mobile Applications


Exploring Touch-Screen Biometrics for User Identification on Smart Phones
Julio Angulo, Erik Wästlund
130-143
Using a Smartphone to Access Personalized Web Services on a Workstation
Faysal Boukayoua, Jan Vossaert, Bart Decker, Vincent Naessens
144-156
Designing Privacy-Enhancing Mobile Applications
Koen Decroix, Bart Decker, Vincent Naessens
157-170

Consumer Privacy


Extending Comparison Shopping Sites by Privacy Information on Retailers
Ulrich König, Marit Hansen
171-186
Do-Not-Track Techniques for Browsers and Their Implications for Consumers
Martin Beck, Michael Marhöfer
187-196

Privacy for Online Communities


P2P Social Networks with Broadcast Encryption Protected Privacy
Oleksandr Bodriagov, Sonja Buchegger
197-206
Privacy by Design: Does It Matter for Social Networks?
Mohammad Islam, Renato Iannella
207-220

Privacy for eHealth and eID Applications


Privacy Preserving Mechanisms for a Pervasive eHealth System
Milica Milutinovic, Koen Decroix, Vincent Naessens, Bart Decker
221-231
Formalising Requirements for a Biobank Case Study Using a Logic for Consent and Revocation
Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith
232-244
Privacy Protection Goals and Their Implications for eID Systems
Harald Zwingelberg, Marit Hansen
245-260

Privacy Attacks and Problems


Avoiding Man-in-the-Middle Attacks When Verifying Public Terminals
Gergely Alpár, Jaap-Henk Hoepman
261-273
Massive Data Collection by Mistake?
Arnold Roosendaal
274-282

Ethics


Addressing Governance and Ethics in European Technology Development Projects through Scenarios
Aygen Kurt, Penny Duquenoy
283-292

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/