Privacy and Identity Management for Life

6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Helsingborg, Sweden, August 2-6, 2010, Revised Selected Papers

ISBN: 978-3-642-20768-6 (Print) 978-3-642-20769-3 (Online)

Table of contents (28 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Terminology

    1. Chapter

      Pages 1-14

      Privacy: What Are We Actually Talking About?

    2. Chapter

      Pages 15-26

      Implementability of the Identity Management Part in Pfitzmann/Hansen’s Terminology for a Complex Digital World

  3. Privacy Metrics

    1. Chapter

      Pages 27-40

      Towards a Formal Language for Privacy Options

    2. Chapter

      Pages 41-51

      Using Game Theory to Analyze Risk to Privacy: An Initial Insight

    3. Chapter

      Pages 52-63

      A Taxonomy of Privacy and Security Risks Contributing Factors

  4. Ethical, Social, and Legal Aspects

    1. Chapter

      Pages 64-77

      ETICA Workshop on Computer Ethics: Exploring Normative Issues

    2. Chapter

      Pages 78-89

      Contextualised Concerns: The Online Privacy Attitudes of Young Adults

    3. Chapter

      Pages 90-107

      Data Protection, Privacy and Identity: Distinguishing Concepts and Articulating Rights

  5. Data Protection and Identity Management

    1. Chapter

      Pages 108-119

      Oops - We Didn’t Mean to Do That! – How Unintended Consequences Can Hijack Good Privacy and Security Policies

    2. Chapter

      Pages 120-129

      Supporting Semi-automated Compliance Control by a System Design Based on the Concept of Separation of Concerns

    3. Chapter

      Pages 130-143

      Security Levels for Web Authentication Using Mobile Phones

  6. eID Cards and eID Interoperability

    1. Chapter

      Pages 144-150

      Challenges of eID Interoperability: The STORK Project

    2. Chapter

      Pages 151-163

      Necessary Processing of Personal Data: The Need-to-Know Principle and Processing Data from the New German Identity Card

    3. Chapter

      Pages 164-177

      A Smart Card Based Solution for User-Centric Identity Management

  7. Emerging Technologies

    1. Chapter

      Pages 178-191

      The Uncanny Valley Everywhere? On Privacy Perception and Expectation Management

    2. Chapter

      Pages 192-205

      50 Ways to Break RFID Privacy

  8. Privacy for eGovernment and AAL Applications

    1. Chapter

      Pages 206-218

      The Limits of Control – (Governmental) Identity Management from a Privacy Perspective

    2. Chapter

      Pages 219-230

      Privacy Concerns in a Remote Monitoring and Social Networking Platform for Assisted Living

  9. Social Networks and Privacy

    1. Chapter

      Pages 231-243

      Privacy Settings in Social Networking Sites: Is It Fair?

    2. Chapter

      Pages 244-257

      Privacy Effects of Web Bugs Amplified by Web 2.0

previous Page of 2