IFIP TC6 Open Digital Library

PrimeLife 2011: Trento, Italy

Privacy and Identity Management for Life - 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Trento, Italy, September 5-9, 2011, Revised Selected Papers

Jan Camenisch, Bruno Crispo, Simone Fischer-Hübner, Ronald Leenes, Giovanni Russello

Springer, IFIP Advances in Information and Communication Technology 375, ISBN: 978-3-642-31667-8



Contents

Invited Talks

Are They Making Our Privates Public? - Emerging Risks of Governmental Open Data Initiatives.

Thomas P. Keenan

 1-13

Top 10 Mistakes in System Design from a Privacy Perspective and Privacy Protection Goals.

Marit Hansen

 14-31

Privacy Metrics and Comparison

Developing a Strategy for Automated Privacy Testing Suites.

Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith

 32-44

Assessing Formal Independence of Data Protection Authorities in a Comparative Perspective.

Philip Schütz

 45-58

Policies

Extracting Access Control and Conflict Resolution Policies from European Data Protection Law.

Kaniz Fatema, David W. Chadwick, Brendan Van Alsenoy

 59-72

Early Lessons Learned in the ENDORSE Project: Legal Challenges and Possibilities in Developing Data Protection Compliance Software.

Sandra Olislaegers

 73-87

Privacy and Transparency in the Age of Cloud Computing

The Infrastructure Level of Cloud Computing as a Basis for Privacy and Security of Software Services.

Ina Schiering, Jan Kretschmer

 88-101

(More) Side Channels in Cloud Storage - Linking Data to Users.

Tobias Pulls

 102-115

Who Got All of My Personal Data? Enabling Users to Monitor the Proliferation of Shared Personally Identifiable Information.

Sebastian Labitzke

 116-129

Privacy for Mobile Applications

Exploring Touch-Screen Biometrics for User Identification on Smart Phones.

Julio Angulo, Erik Wästlund

 130-143

Using a Smartphone to Access Personalized Web Services on a Workstation.

Faysal Boukayoua, Jan Vossaert, Bart De Decker, Vincent Naessens

 144-156

Designing Privacy-Enhancing Mobile Applications.

Koen Decroix, Bart De Decker, Vincent Naessens

 157-170

Consumer Privacy

Extending Comparison Shopping Sites by Privacy Information on Retailers.

Ulrich König, Marit Hansen

 171-186

Do-Not-Track Techniques for Browsers and Their Implications for Consumers.

Martin Beck, Michael Marhöfer

 187-196

Privacy for Online Communities

P2P Social Networks with Broadcast Encryption Protected Privacy.

Oleksandr Bodriagov, Sonja Buchegger

 197-206

Privacy by Design: Does It Matter for Social Networks?

Mohammad Badiul Islam, Renato Iannella

 207-220

Privacy for eHealth and eID Applications

Privacy Preserving Mechanisms for a Pervasive eHealth System.

Milica Milutinovic, Koen Decroix, Vincent Naessens, Bart De Decker

 221-231

Formalising Requirements for a Biobank Case Study Using a Logic for Consent and Revocation.

Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith

 232-244

Privacy Protection Goals and Their Implications for eID Systems.

Harald Zwingelberg, Marit Hansen

 245-260

Privacy Attacks and Problems

Avoiding Man-in-the-Middle Attacks When Verifying Public Terminals.

Gergely Alpár, Jaap-Henk Hoepman

 261-273

Massive Data Collection by Mistake?

Arnold Roosendaal

 274-282

Ethics

Addressing Governance and Ethics in European Technology Development Projects through Scenarios.

Aygen Kurt, Penny Duquenoy

 283-292