Privacy and Identity Management for Emerging Services and Technologies Marit Hansen, Jaap-Henk Hoepman, Ronald Leenes, Diane Whitehouse (Eds). |
Front matter |
Invited Papers
|
Two of the Grand Changes through Computer and Network Technology Bart Jacobs
|
1-11 |
The Draft Data Protection Regulation and the Development of Data Processing Applications Eleni Kosta, Colette Cuijpers
|
12-32 |
Privacy Management and Accountability in Global Organisations Siani Pearson
|
33-52 |
Concepts Around Privacy-Preserving Attribute-Based Credentials Jan Camenisch
|
53-63 |
Privacy Respecting ICT Innovations in Education: Electronic Course Evaluations in Higher Education and Beyond Yannis Stamatiou
|
64-76 |
How can Cloud Users be Supported in Deciding on, Tracking and Controlling How their Data are Used? Simone Fischer-Hübner, Julio Angulo, Tobias Pulls
|
77-92 |
Challenges to Privacy, Security, and Identity
|
Privacy Versus Collective Security: Drivers and Barriers Behind a Trade-off Bas Schoonhoven, Arnold Roosendaal, Noor Huijboom
|
93-101 |
Privacy in the Life-Cycle of IT Services – An Investigation of Process Reference Models Saskia Viktoria Rother, Ina Schiering |
102-113 |
Forgetting Bits and Pieces Paulan Korenhof
|
114-127 |
An Advanced, Privacy-Friendly Loyalty System Milica Milutinovic, Italo Dacosta, Andreas Put, Bart Decker
|
128-138 |
Securus: From Confidentiality and Access Requirements to Data Outsourcing Solutions Jens Köhler, Konrad Jünemann
|
139-149 |
Preserving Privacy
|
|
Problem-Based Consideration of Privacy-Relevant Domain Knowledge Rene Meis
|
150-164 |
Extending Signatures of Reputation Emmanuelle Anceaume, Gilles Guette, Paul Lajoie-Mazenc, Thomas Sirvent, Valérie Viet Triem Tong
|
165-176 |
Preserving Privacy in Production Moritz Müller |
177-187 |
Social Networks
|
User Search with Knowledge Thresholds in Decentralized Online Social Networks Benjamin Greschbach, Gunnar Kreitz, Sonja Buchegger
|
188-202 |
An Explorative Mapping of the Belgian Social Media Marketing Value Network and Its Usage of Personal Identifiable Information Rob Heyman, Jo Pierson
|
203-213 |
Identity and Identity Management
|
Privacy Issues in Cross-Border Identity Management Systems: Pan-European Case Svetlana Sapelova, Borka Jerman-Blažič
|
214-223 |
Constructing Security: Reflections on the Margins of a Case Study of the Use of Electronic Identification in ICT Platforms in Schools Mariana Gustafsson
|
224-236 |
Mobile Devices to the Identity Rescue Gergely Alpár, Maarten Everts |
237-247 |