default search action
Privacy and Identity Management 2013: Nijmegen, The Netherlands
- Marit Hansen, Jaap-Henk Hoepman, Ronald E. Leenes, Diane Whitehouse:
Privacy and Identity Management for Emerging Services and Technologies - 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers. IFIP Advances in Information and Communication Technology 421, Springer 2014, ISBN 978-3-642-55136-9
Invited Papers
- Bart Jacobs:
Two of the Grand Changes through Computer and Network Technology. 1-11 - Eleni Kosta, Colette Cuijpers:
The Draft Data Protection Regulation and the Development of Data Processing Applications. 12-32 - Siani Pearson:
Privacy Management and Accountability in Global Organisations. 33-52 - Jan Camenisch:
Concepts Around Privacy-Preserving Attribute-Based Credentials - Making Authentication with Anonymous Credentials Practical. 53-63 - Yannis C. Stamatiou:
Privacy Respecting ICT Innovations in Education: Electronic Course Evaluations in Higher Education and Beyond. 64-76 - Simone Fischer-Hübner, Julio Angulo, Tobias Pulls:
How can Cloud Users be Supported in Deciding on, Tracking and Controlling How their Data are Used? 77-92
Challenges to Privacy, Security, and Identity
- Bas van Schoonhoven, Arnold Roosendaal, Noor Huijboom:
Privacy Versus Collective Security - Drivers and Barriers Behind a Trade-off. 93-101 - Saskia Viktoria Rother, Ina Schiering:
Privacy in the Life-Cycle of IT Services - An Investigation of Process Reference Models. 102-113 - Paulan Korenhof:
Forgetting Bits and Pieces - An Exploration of the "Right to Be Forgotten" as Implementation of "Forgetting" in Online Memory Processes. 114-127 - Milica Milutinovic, Italo Dacosta, Andreas Put, Bart De Decker:
An Advanced, Privacy-Friendly Loyalty System. 128-138 - Jens Köhler, Konrad Jünemann:
Securus: From Confidentiality and Access Requirements to Data Outsourcing Solutions. 139-149
Preserving Privacy
- Rene Meis:
Problem-Based Consideration of Privacy-Relevant Domain Knowledge. 150-164 - Emmanuelle Anceaume, Gilles Guette, Paul Lajoie-Mazenc, Thomas Sirvent, Valérie Viet Triem Tong:
Extending Signatures of Reputation. 165-176 - Moritz Christian Müller:
Preserving Privacy in Production. 177-187
Social Networks
- Benjamin Greschbach, Gunnar Kreitz, Sonja Buchegger:
User Search with Knowledge Thresholds in Decentralized Online Social Networks. 188-202 - Rob Heyman, Jo Pierson:
An Explorative Mapping of the Belgian Social Media Marketing Value Network and Its Usage of Personal Identifiable Information. 203-213
Identity and Identity Management
- Svetlana Sapelova, Borka Jerman-Blazic:
Privacy Issues in Cross-Border Identity Management Systems: Pan-European Case. 214-223 - Mariana S. Gustafsson:
Constructing Security: Reflections on the Margins of a Case Study of the Use of Electronic Identification in ICT Platforms in Schools. 224-236 - Gergely Alpár, Maarten H. Everts:
Mobile Devices to the Identity Rescue. 237-247
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.