Table of Contents
|
Privacy and Identity Management for Life: 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School Simone Fischer-Hübner, Penny Duquenoy, Marit Hansen, Ronald Leenes, Ge Zhang (Eds.)
|
Front Matter |
Terminology
|
Privacy: What Are We Actually Talking About? Philip Schütz, Michael Friedewald |
1-14 |
Implementability of the Identity Management Part in Pfitzmann/Hansen’s Terminology for a Complex Digital World Manuela Berg, Katrin Borcea-Pfitzmann |
15-26 |
Privacy Metrics
|
Towards a Formal Language for Privacy Options Stefan Berthold |
27-40 |
Using Game Theory to Analyze Risk to Privacy: An Initial Insight Lisa Rajbhandari, Einar Snekkenes |
41-51 |
A Taxonomy of Privacy and Security Risks Contributing Factors Ebenezer Paintsil, Lothar Fritsch |
52-63 |
Ethical, Social, and Legal Aspects
|
ETICA Workshop on Computer Ethics: Exploring Normative Issues Bernd Stahl, Catherine Flick |
64-77 |
Contextualised Concerns: The Online Privacy Attitudes of Young Adults Michael Dowd |
78-89 |
Data Protection, Privacy and Identity: Distinguishing Concepts and Articulating Rights Norberto Andrade |
90-107 |
Data Protection and Identity Management
|
Oops - We Didn’t Mean to Do That! – How Unintended Consequences Can Hijack Good Privacy and Security Policies Thomas Keenan |
108-119 |
Supporting Semi-automated Compliance Control by a System Design Based on the Concept of Separation of Concerns Sebastian Haas, Ralph Herkenhöner, Denis Royer, Ammar Alkassar, Hermann Meer, Günter Müller |
120-129 |
Security Levels for Web Authentication Using Mobile Phones Anna Vapen, Nahid Shahmehri |
130-143 |
eID Cards and eID Interoperability
|
Challenges of eID Interoperability: The STORK Project Herbert Leitold |
144-150 |
Necessary Processing of Personal Data: The Need-to-Know Principle and Processing Data from the New German Identity Card Harald Zwingelberg |
151-163 |
A Smart Card Based Solution for User-Centric Identity Management Jan Vossaert, Pieter Verhaeghe, Bart Decker, Vincent Naessens |
164-177 |
Emerging Technologies
|
The Uncanny Valley Everywhere? On Privacy Perception and Expectation Management Bibi Berg |
178-191 |
50 Ways to Break RFID Privacy Ton Deursen |
192-205 |
Privacy for eGovernment and AAL Applications
|
The Limits of Control – (Governmental) Identity Management from a Privacy Perspective Stefan Strauß |
206-218 |
Privacy Concerns in a Remote Monitoring and Social Networking Platform for Assisted Living Peter Rothenpieler, Claudia Becker, Stefan Fischer |
219-230 |
Social Networks and Privacy
|
Privacy Settings in Social Networking Sites: Is It Fair? Aleksandra Kuczerawy, Fanny Coudert |
231-243 |
Privacy Effects of Web Bugs Amplified by Web 2.0 Jaromir Dobias |
244-257 |
Privacy Policies
|
A Conceptual Model for Privacy Policies with Consent and Revocation Requirements Nick Papanikolaou, Marco Casassa Mont, Siani Pearson, Sadie Creese, Michael Goldsmith |
258-270 |
Applying Formal Methods to Detect and Resolve Ambiguities in Privacy Requirements Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith, Nick Papanikolaou |
271-282 |
A Decision Support System for Design for Privacy Siani Pearson, Azzedine Benameur |
283-296 |
A Multi-privacy Policy Enforcement System Kaniz Fatema, David Chadwick, Stijn Lievens |
297-310 |
>
Usable Privacy
|
Designing Usable Online Privacy Mechanisms: What Can We Learn from Real World Behaviour? Periambal Coopamootoo, Debi Ashenden |
311-324 |
PrimeLife Checkout Ulrich König |
325-337 |
Towards Displaying Privacy Information with Icons Leif-Erik Holtz, Katharina Nocun, Marit Hansen |
338-348 |
Obituary
|
Andreas Pfitzmann 1958-2010: Pioneer of Technical Privacy Protection in the Information Society Hannes Federrath, Marit Hansen, Michael Waidner |
349-352 |