Privacy and Identity Management for Life

7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Trento, Italy, September 5-9, 2011, Revised Selected Papers

ISBN: 978-3-642-31667-8 (Print) 978-3-642-31668-5 (Online)

Table of contents (22 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Invited Talks

    1. No Access

      Book Chapter

      Pages 1-13

      Are They Making Our Privates Public? – Emerging Risks of Governmental Open Data Initiatives

    2. No Access

      Book Chapter

      Pages 14-31

      Top 10 Mistakes in System Design from a Privacy Perspective and Privacy Protection Goals

  3. Privacy Metrics and Comparison

    1. No Access

      Book Chapter

      Pages 32-44

      Developing a Strategy for Automated Privacy Testing Suites

    2. No Access

      Book Chapter

      Pages 45-58

      Assessing Formal Independence of Data Protection Authorities in a Comparative Perspective

  4. Policies

    1. No Access

      Book Chapter

      Pages 59-72

      Extracting Access Control and Conflict Resolution Policies from European Data Protection Law

    2. No Access

      Book Chapter

      Pages 73-87

      Early Lessons Learned in the ENDORSE Project: Legal Challenges and Possibilities in Developing Data Protection Compliance Software

  5. Privacy and Transparency in the Age of Cloud Computing

    1. No Access

      Book Chapter

      Pages 88-101

      The Infrastructure Level of Cloud Computing as a Basis for Privacy and Security of Software Services

    2. No Access

      Book Chapter

      Pages 102-115

      (More) Side Channels in Cloud Storage

    3. No Access

      Book Chapter

      Pages 116-129

      Who Got All of My Personal Data? Enabling Users to Monitor the Proliferation of Shared Personally Identifiable Information

  6. Privacy for Mobile Applications

    1. No Access

      Book Chapter

      Pages 130-143

      Exploring Touch-Screen Biometrics for User Identification on Smart Phones

    2. No Access

      Book Chapter

      Pages 144-156

      Using a Smartphone to Access Personalized Web Services on a Workstation

    3. No Access

      Book Chapter

      Pages 157-170

      Designing Privacy-Enhancing Mobile Applications

  7. Consumer Privacy

    1. No Access

      Book Chapter

      Pages 171-186

      Extending Comparison Shopping Sites by Privacy Information on Retailers

    2. No Access

      Book Chapter

      Pages 187-196

      Do-Not-Track Techniques for Browsers and Their Implications for Consumers

  8. Privacy for Online Communities

    1. No Access

      Book Chapter

      Pages 197-206

      P2P Social Networks with Broadcast Encryption Protected Privacy

    2. No Access

      Book Chapter

      Pages 207-220

      Privacy by Design: Does It Matter for Social Networks?

  9. Privacy for eHealth and eID Applications

    1. No Access

      Book Chapter

      Pages 221-231

      Privacy Preserving Mechanisms for a Pervasive eHealth System

    2. No Access

      Book Chapter

      Pages 232-244

      Formalising Requirements for a Biobank Case Study Using a Logic for Consent and Revocation

    3. No Access

      Book Chapter

      Pages 245-260

      Privacy Protection Goals and Their Implications for eID Systems

  10. Privacy Attacks and Problems

    1. No Access

      Book Chapter

      Pages 261-273

      Avoiding Man-in-the-Middle Attacks When Verifying Public Terminals

previous Page of 2