Privacy and Identity Management for Life Michele Bezzi, Penny Duquenoy, Simone Fischer-Hübner, Marit Hansen |
Front Matter |
Lifelong Privacy
|
Lifelong Privacy: Privacy and Identity Management for Life Andreas Pfitzmann, Katrin Borcea-Pfitzmann |
1-17 |
Delegation for Privacy Management from Womb to Tomb - A European Perspective Marit Hansen, Maren Raguse, Katalin Storf, Harald Zwingelberg |
18-33 |
Saving On-Line Privacy Jan Camenisch, Gregory Neven |
34-47 |
Privacy for Social Network Sites and Collaborative Systems
|
Context Is Everything Sociality and Privacy in Online Social Network Sites Ronald Leenes |
48-65 |
The Freddi Staurs of Social Networking - A Legal Approach Eleni Kosta |
66-74 |
Facebook and its EU users - Applicability of the EU data protection law to US based SNS Aleksandra Kuczerawy |
75-85 |
On the Security and Feasibility of Safebook: A Distributed Privacy-Preserving Online Social Network Leucio Antonio Cutillo, Refik Molva, Thorsten Strufe |
86-101 |
Privacy-Respecting Access Control in Collaborative Workspaces Stefanie Pötzsch, Katrin Borcea-Pfitzmann |
102-111 |
Privacy for eGovernment Applications
|
A Three-Dimensional Framework to Analyse the Governance of Population Registers José Formaz, Olivier Glassey |
112-121 |
Use of ePassport for Identity Management in Network-Based Citizen-Life Processes Pravir Chawdhry, Ioannis Vakalis |
122-133 |
The Use of Privacy Enhancing Technologies for Biometric Systems Analysed from a Legal Perspective Els J. Kindt |
134-145 |
Privacy and Identity Management for eHealth and Ambient Assisted Living Applications
|
Assuring Privacy of Medical Records in an Open Collaborative Environment - A Case Study of Walloon Region's eHealth Platform Syed Naqvi, Gautier Dallons, Arnaud Michot, Christophe Ponsard |
146-159 |
Goal-Oriented Access Control Model for Ambient Assisted Living Fabio Massacci, Viet Hung Nguyen |
160-173 |
Anonymisation and Privacy-Enhancing Technologies
|
Privacy of Outsourced Data Sabrina Capitani Di Vimercati, Sara Foresti |
174-187 |
Sharing Data for Public Security Michele Bezzi, Gilles Montagnon, Vincent Salzgeber, Slim Trabelsi |
188-197 |
An Analysis for Anonymity and Unlinkability for a VoIP Conversation Ge Zhang |
198-212 |
PRIvacy LEakage Methodology (PRILE) for IDS Rules Nills Ulltveit-Moe, Vladimir Oleshchuk |
213-225 |
Identity Management and Multilateral Security
|
Digital Personae and Profiles as Representations of Individuals Arnold Roosendaal |
226-236 |
Anonymous Credentials in Web Applications - A Child's Play with the PRIME Core Benjamin Kellermann, Immanuel Scholz |
237-245 |
Reaching for Informed Revocation: Shutting Off the Tap on Personal Data Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith, Nick Papanikolaou |
246-258 |
Multilateral Privacy in Clouds: Requirements for Use in Industry Ina Schiering, Markus Hansen |
259-265 |
Usability, Awareness and Transparency Tools
|
PET-USES: Privacy-Enhancing Technology - Users' Self-Estimation Scale Erik Wästlund, Peter Wolkerstorfer, Christina Köffel |
266-274 |
Addressing the Privacy Paradox by Expanded Privacy Awareness - The Example of Context-Aware Services André Deuker |
275-283 |
Secure Logging of Retained Data for an Anonymity Service Stefan KÖpsell, Petr Švenda |
284-298 |
Adding Secure Transparency Logging to the PRIME Core Hans Hedbom, Tobias Pulls, Peter Hjärtquist, Andreas Lavén |
299-314 |