Table of Contents
|
Privacy and Identity Management for Life Jan Camenisch, Bruno Crispo, Simone Fischer-Hübner, Ronald Leenes, Giovanni Russello (Eds.)
|
Front Matter |
Invited Talks
|
Are They Making Our Privates Public? – Emerging Risks of Governmental Open Data Initiatives Thomas Keenan |
1-13 |
Top 10 Mistakes in System Design from a Privacy Perspective and Privacy Protection Goals Marit Hansen |
14-31 |
Privacy Metrics and Comparison
|
Developing a Strategy for Automated Privacy Testing Suites Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith |
32-44 |
Assessing Formal Independence of Data Protection Authorities in a Comparative Perspective Philip Schütz |
45-58 |
|
|
Policies
|
Extracting Access Control and Conflict Resolution Policies from European Data Protection Law Kaniz Fatema, David Chadwick, Brendan Alsenoy |
59-72 |
Early Lessons Learned in the ENDORSE Project: Legal Challenges and Possibilities in Developing Data Protection Compliance Software Sandra Olislaegers |
73-87 |
Privacy and Transparency in the Age of Cloud Computing
|
The Infrastructure Level of Cloud Computing as a Basis for Privacy and Security of Software Services Ina Schiering, Jan Kretschmer |
88-101 |
(More) Side Channels in Cloud Storage Tobias Pulls |
102-115 |
Who Got All of My Personal Data? Enabling Users to Monitor the Proliferation of Shared Personally Identifiable Information Sebastian Labitzke |
116-129 |
Privacy for Mobile Applications
|
Exploring Touch-Screen Biometrics for User Identification on Smart Phones Julio Angulo, Erik Wästlund |
130-143 |
Using a Smartphone to Access Personalized Web Services on a Workstation Faysal Boukayoua, Jan Vossaert, Bart Decker, Vincent Naessens |
144-156 |
Designing Privacy-Enhancing Mobile Applications Koen Decroix, Bart Decker, Vincent Naessens |
157-170 |
Consumer Privacy
|
Extending Comparison Shopping Sites by Privacy Information on Retailers Ulrich König, Marit Hansen |
171-186 |
Do-Not-Track Techniques for Browsers and Their Implications for Consumers Martin Beck, Michael Marhöfer |
187-196 |
Privacy for Online Communities
|
P2P Social Networks with Broadcast Encryption Protected Privacy Oleksandr Bodriagov, Sonja Buchegger |
197-206 |
Privacy by Design: Does It Matter for Social Networks? Mohammad Islam, Renato Iannella |
207-220 |
Privacy for eHealth and eID Applications
|
Privacy Preserving Mechanisms for a Pervasive eHealth System Milica Milutinovic, Koen Decroix, Vincent Naessens, Bart Decker |
221-231 |
Formalising Requirements for a Biobank Case Study Using a Logic for Consent and Revocation Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith |
232-244 |
Privacy Protection Goals and Their Implications for eID Systems Harald Zwingelberg, Marit Hansen |
245-260 |
Privacy Attacks and Problems
|
Avoiding Man-in-the-Middle Attacks When Verifying Public Terminals Gergely Alpár, Jaap-Henk Hoepman |
261-273 |
Massive Data Collection by Mistake? Arnold Roosendaal |
274-282 |
Ethics
|
Addressing Governance and Ethics in European Technology Development Projects through Scenarios Aygen Kurt, Penny Duquenoy |
283-292 |