IFIP TC6 Open Digital Library

PrimeLife 2011: Trento, Italy

Privacy and Identity Management for Life - 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Trento, Italy, September 5-9, 2011, Revised Selected Papers

Jan Camenisch, Bruno Crispo, Simone Fischer-Hübner, Ronald Leenes, Giovanni Russello

Springer, IFIP Advances in Information and Communication Technology 375, ISBN: 978-3-642-31667-8


Invited Talks

Are They Making Our Privates Public? - Emerging Risks of Governmental Open Data Initiatives.

Thomas P. Keenan


Top 10 Mistakes in System Design from a Privacy Perspective and Privacy Protection Goals.

Marit Hansen


Privacy Metrics and Comparison

Developing a Strategy for Automated Privacy Testing Suites.

Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith


Assessing Formal Independence of Data Protection Authorities in a Comparative Perspective.

Philip Schütz



Extracting Access Control and Conflict Resolution Policies from European Data Protection Law.

Kaniz Fatema, David W. Chadwick, Brendan Van Alsenoy


Early Lessons Learned in the ENDORSE Project: Legal Challenges and Possibilities in Developing Data Protection Compliance Software.

Sandra Olislaegers


Privacy and Transparency in the Age of Cloud Computing

The Infrastructure Level of Cloud Computing as a Basis for Privacy and Security of Software Services.

Ina Schiering, Jan Kretschmer


(More) Side Channels in Cloud Storage - Linking Data to Users.

Tobias Pulls


Who Got All of My Personal Data? Enabling Users to Monitor the Proliferation of Shared Personally Identifiable Information.

Sebastian Labitzke


Privacy for Mobile Applications

Exploring Touch-Screen Biometrics for User Identification on Smart Phones.

Julio Angulo, Erik Wästlund


Using a Smartphone to Access Personalized Web Services on a Workstation.

Faysal Boukayoua, Jan Vossaert, Bart De Decker, Vincent Naessens


Designing Privacy-Enhancing Mobile Applications.

Koen Decroix, Bart De Decker, Vincent Naessens


Consumer Privacy

Extending Comparison Shopping Sites by Privacy Information on Retailers.

Ulrich König, Marit Hansen


Do-Not-Track Techniques for Browsers and Their Implications for Consumers.

Martin Beck, Michael Marhöfer


Privacy for Online Communities

P2P Social Networks with Broadcast Encryption Protected Privacy.

Oleksandr Bodriagov, Sonja Buchegger


Privacy by Design: Does It Matter for Social Networks?

Mohammad Badiul Islam, Renato Iannella


Privacy for eHealth and eID Applications

Privacy Preserving Mechanisms for a Pervasive eHealth System.

Milica Milutinovic, Koen Decroix, Vincent Naessens, Bart De Decker


Formalising Requirements for a Biobank Case Study Using a Logic for Consent and Revocation.

Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith


Privacy Protection Goals and Their Implications for eID Systems.

Harald Zwingelberg, Marit Hansen


Privacy Attacks and Problems

Avoiding Man-in-the-Middle Attacks When Verifying Public Terminals.

Gergely Alpár, Jaap-Henk Hoepman


Massive Data Collection by Mistake?

Arnold Roosendaal



Addressing Governance and Ethics in European Technology Development Projects through Scenarios.

Aygen Kurt, Penny Duquenoy