Limit search to available items
Book Cover
Author IFIP WG 9.2, 9.6/11.4, 11.6, 11.7/PrimeLife International Summer School (7th : 2011 : Trento, Italy)

Title Privacy and identity management for life : 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Trento, Italy, September 5-9, 2011, Revised selected papers / Jan Camenisch [and others] (eds.)
Published Berlin ; New York : Springer, [2012]
Online access available from:
Springer eBooks    View Resource Record  


Description 1 online resource
Series IFIP advances in information and communication technology, 1868-4238 ; 375
IFIP advances in information and communication technology ; 375
Contents Are They Making Our Privates Public? -- Emerging Risks of Governmental Open Data Initiatives / Thomas P. Keenan -- Top 10 Mistakes in System Design from a Privacy Perspective and Privacy Protection Goals / Marit Hansen -- Developing a Strategy for Automated Privacy Testing Suites / Ioannis Agrafiotis, Sadie Creese and Michael Goldsmith -- Assessing Formal Independence of Data Protection Authorities in a Comparative Perspective / Philip Schütz -- Extracting Access Control and Conflict Resolution Policies from European Data Protection Law / Kaniz Fatema, David W. Chadwick and Brendan Van Alsenoy -- Early Lessons Learned in the ENDORSE Project: Legal Challenges and Possibilities in Developing Data Protection Compliance Software / Sandra Olislaegers -- The Infrastructure Level of Cloud Computing as a Basis for Privacy and Security of Software Services / Ina Schiering and Jan Kretschmer -- (More) Side Channels in Cloud Storage: Linking Data to Users / Tobias Pulls -- Who Got All of My Personal Data? Enabling Users to Monitor the Proliferation of Shared Personally Identifiable Information / Sebastian Labitzke -- Exploring Touch-Screen Biometrics for User Identification on Smart Phones / Julio Angulo and Erik Wästlund -- Using a Smartphone to Access Personalized Web Services on a Workstation / Faysal Boukayoua, Jan Vossaert, Bart De Decker and Vincent Naessens -- Designing Privacy-Enhancing Mobile Applications / Koen Decroix, Bart De Decker and Vincent Naessens -- Extending Comparison Shopping Sites by Privacy Information on Retailers / Ulrich König and Marit Hansen -- Do-Not-Track Techniques for Browsers and Their Implications for Consumers / Martin Beck and Michael Marhöfer -- P2P Social Networks with Broadcast Encryption Protected Privacy / Oleksandr Bodriagov and Sonja Buchegger -- Privacy by Design: Does It Matter for Social Networks? / Mohammad Badiul Islam and Renato Iannella -- Privacy Preserving Mechanisms for a Pervasive eHealth System / Milica Milutinovic, Koen Decroix, Vincent Naessens and Bart De Decker -- Formalising Requirements for a Biobank Case Study Using a Logic for Consent and Revocation / Ioannis Agrafiotis, Sadie Creese and Michael Goldsmith -- Privacy Protection Goals and Their Implications for eID Systems / Harald Zwingelberg and Marit Hansen -- Avoiding Man-in-the-Middle Attacks When Verifying Public Terminals / Gergely Alpár and Jaap-Henk Hoepman -- Massive Data Collection by Mistake? / Arnold Roosendaal -- Addressing Governance and Ethics in European Technology Development Projects through Scenarios / Aygen Kurt and Penny Duquenoy
Summary This book constitutes the thoroughly refereed post-conference proceedings of the 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6 International Summer School, held in Trento, Italy, in September 2011. The 20 revised papers were carefully selected from numerous submissions during two rounds of reviewing. The book also contains two invited talks. The papers are organized in topical sections on privacy metrics and comparison, policies, privacy transparency in the age of cloud computing, privacy for mobile applications, consumer privacy, privacy for online communities, privacy for eHealth and eID applications, privacy attacks and problems, and ethics
Analysis Computer science
Computer Communication Networks
Data encryption (Computer science)
Computer software
Information Systems
Management of Computing and Information Systems
Computers and Society
Information Systems Applications (incl. Internet)
Algorithm Analysis and Problem Complexity
Bibliography Includes bibliographical references and author index
Subject Data protection -- Congresses.
Computer security -- Congresses.
Internet -- Security measures -- Congresses.
Genre/Form Conference papers and proceedings.
Computer software.
Conference papers and proceedings.
Form Electronic book
Author Camenisch, Jan.
LC no. 2012941094
ISBN 9783642316685 (electronic bk.)
3642316689 (electronic bk.)