T. Edgar-smartsociety and .. , Collaboration Between Humans and Machines, Promises and Perils, p.30

L. Esquivel-quirós, E. Gabriela, and .. , Barrantes A4Cloud Workshop: Accountability in the Cloud, p.61

C. Fernandez-gago, S. Pearson, D. Michela, R. Errico, and .. Alnemr, Tobias Pulls, and Anderson Santana de Oliveira Signatures for Privacy, Trust and Accountability in the Cloud: Applications and Requirements, p.79

M. Hansen, J. Hoepman, M. Jensen, and S. , Schiffner Smart Technologies ? Workshop on Challenges and Trends for Privacy in a Hyper-connected World, p.111

A. Baur-ahrens, F. Bieker, M. Friedewald, C. Geminn, M. Hansen et al., Murat Karaboga, and Hannah Obersteller Privacy Pattern Catalogue: A Tool for Integrating Privacy Principles of ISO 129 Olha Drozd Developing a Structured Metric to Measure Privacy Risk in Privacy Impact Assessments 141 Sushant Agarwal Accountability in the EU Data Protection Reform: Balancing Citizens' and Business' Rights, IEC 29100 into the Software Development Process . . . . . . . . . . . 156 Lina Jasmontaite and Valerie Verdoodt Towards Authenticity and Privacy Preserving Accountable Workflows . . . . . 170

D. Derler, C. Hanser, and C. Henrich, Pöhls, and Daniel Slamanig A Technique for Enhanced Provision of Appropriate Access to Evidence Across Service Provision Chains, p.187

.. User-centric-attribute-assurance, 239 Salameh Abu Rmeileh, Esther Palomar, and Hanifa Shah Identity-Theft Through e-Government Services ? Government to Pay the Bill?, ALOC: Attribute Level of Confidence for a, p.253

J. Schroers and P. , Tsormpatzoudi «All Your Data Are Belong to us» European Perspectives on Privacy Issues in 'Free' Online Machine Translation Services, p.265

P. Kamocki, J. O. Regan, and M. , Stauch Identification of Online Gamblers in the EU: A Two-Edged Sword 281 Dusan Pavlovic Can Courts Provide Effective Remedies Against Violations of Fundamental Rights by Mass Surveillance? The Case of the United Kingdom 296 Felix Bieker Automated Log Audits for Privacy Compliance Validation: A Literature Survey, p.312

J. Reuben and L. A. , Martucci, and Simone Fischer-Hübner Privacy-Preserving Access Control in Publicly Readable Storage Systems, p.327

D. Bosk, S. Buchegger-ontology-healthcare, and .. , Based Obfuscation and Anonymisation for Privacy: A Case Study on, p.343