IFIP TC6 Open Digital Library

PrimeLife 2010: Helsingborg, Sweden

Privacy and Identity Management for Life - 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Helsingborg, Sweden, August 2-6, 2010, Revised Selected Papers

Simone Fischer-Hübner, Penny Duquenoy, Marit Hansen, Ronald Leenes, Ge Zhang

Springer, IFIP Advances in Information and Communication Technology 352, ISBN: 978-3-642-20768-6



Contents

Privacy: What Are We Actually Talking About? - A Multidisciplinary Approach.

Philip Schütz, Michael Friedewald

 1-14

Implementability of the Identity Management Part in Pfitzmann/Hansen's Terminology for a Complex Digital World.

Manuela Berg, Katrin Borcea-Pfitzmann

 15-26

Towards a Formal Language for Privacy Options.

Stefan Berthold

 27-40

Using Game Theory to Analyze Risk to Privacy: An Initial Insight.

Lisa Rajbhandari, Einar Snekkenes

 41-51

A Taxonomy of Privacy and Security Risks Contributing Factors.

Ebenezer Paintsil, Lothar Fritsch

 52-63

ETICA Workshop on Computer Ethics: Exploring Normative Issues.

Bernd Carsten Stahl, Catherine Flick

 64-77

Contextualised Concerns: The Online Privacy Attitudes of Young Adults.

Michael Dowd

 78-89

Data Protection, Privacy and Identity: Distinguishing Concepts and Articulating Rights.

Norberto Nuno Gomes de Andrade

 90-107

Oops - We Didn't Mean to Do That! - How Unintended Consequences Can Hijack Good Privacy and Security Policies.

Thomas P. Keenan

 108-119

Supporting Semi-automated Compliance Control by a System Design Based on the Concept of Separation of Concerns.

Sebastian Haas, Ralph Herkenhöner, Denis Royer, Ammar Alkassar, Hermann de Meer, Günter Müller

 120-129

Security Levels for Web Authentication Using Mobile Phones.

Anna Vapen, Nahid Shahmehri

 130-143

Challenges of eID Interoperability: The STORK Project.

Herbert Leitold

 144-150

Necessary Processing of Personal Data: The Need-to-Know Principle and Processing Data from the New German Identity Card.

Harald Zwingelberg

 151-163

A Smart Card Based Solution for User-Centric Identity Management.

Jan Vossaert, Pieter Verhaeghe, Bart De Decker, Vincent Naessens

 164-177

The Uncanny Valley Everywhere? On Privacy Perception and Expectation Management.

Bibi van den Berg

 178-191

50 Ways to Break RFID Privacy.

Ton van Deursen

 192-205

The Limits of Control - (Governmental) Identity Management from a Privacy Perspective.

Stefan Strauß

 206-218

Privacy Concerns in a Remote Monitoring and Social Networking Platform for Assisted Living.

Peter Rothenpieler, Claudia Becker, Stefan Fischer

 219-230

Privacy Settings in Social Networking Sites: Is It Fair?

Aleksandra Kuczerawy, Fanny Coudert

 231-243

Privacy Effects of Web Bugs Amplified by Web 2.0.

Jaromir Dobias

 244-257

A Conceptual Model for Privacy Policies with Consent and Revocation Requirements.

Marco Casassa Mont, Siani Pearson, Sadie Creese, Michael Goldsmith, Nick Papanikolaou

 258-270

Applying Formal Methods to Detect and Resolve Ambiguities in Privacy Requirements.

Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith, Nick Papanikolaou

 271-282

A Decision Support System for Design for Privacy.

Siani Pearson, Azzedine Benameur

 283-296

A Multi-privacy Policy Enforcement System.

Kaniz Fatema, David W. Chadwick, Stijn F. Lievens

 297-310

Designing Usable Online Privacy Mechanisms: What Can We Learn from Real World Behaviour?

Periambal L. Coopamootoo, Debi Ashenden

 311-324

PrimeLife Checkout - - A Privacy-Enabling e-Shopping User Interface.

Ulrich König

 325-337

Towards Displaying Privacy Information with Icons.

Leif-Erik Holtz, Katharina Nocun, Marit Hansen

 338-348

Andreas Pfitzmann 1958-2010: Pioneer of Technical Privacy Protection in the Information Society.

Hannes Federrath, Marit Hansen, Michael Waidner

 349-352