Privacy and Identity Management for Life: 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Helsingborg, Sweden, August 2-6, 2010, Revised Selected Papers

Overview

This book constitutes the thoroughly refereed post conference proceedings of the 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, held in Helsingborg, Sweden, in August 2010. The 27 revised papers were carefully selected from numerous submissions during two rounds of reviewing. They are organized in topical sections on terminology, privacy metrics, ethical, social, and legal aspects, data protection and identity management, eID cards and eID interoperability, emerging technologies, ...

See more details below
Paperback (2011)
$121.96
BN.com price
(Save 12%)$140.00 List Price
Other sellers (Paperback)
  • All (3) from $103.66   
  • New (3) from $103.66   
Sending request ...

Overview

This book constitutes the thoroughly refereed post conference proceedings of the 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, held in Helsingborg, Sweden, in August 2010. The 27 revised papers were carefully selected from numerous submissions during two rounds of reviewing. They are organized in topical sections on terminology, privacy metrics, ethical, social, and legal aspects, data protection and identity management, eID cards and eID interoperability, emerging technologies, privacy for eGovernment and AAL applications, social networks and privacy, privacy policies, and usable privacy.

Read More Show Less

Product Details

Table of Contents

Terminology

Privacy: What Are We Actually Talking About? A Multidisciplinary Approach Philip Schutz Michael Friedewald 1

Implementability of the Identity Management Part in Pfitzmann/Hansen's Terminology for a Complex Digital World Manuela Berg Katrin Borcea-Pfitzmann 15

Privacy Metrics

Towards a Formal Language for Privacy Options Stefan Berthold 27

Using Game Theory to Analyze Risk to Privacy: An Initial Insight Lisa Rajbhandari Einar Arthur Snekkenes 41

A Taxonomy of Privacy and Security Risks Contributing Factors Ebenezer Paintsil Lothar Fritsch 52

Ethical, Social, and Legal Aspects

ETICA Workshop on Computer Ethics: Exploring Normative Issues Bernd Carsten Stahl Catherine Flick 64

Contextualised Concerns: The Online Privacy Attitudes of Young Adults Michael Dowd 78

Data Protection, Privacy and Identity: Distinguishing Concepts and Articulating Rights Norberto Nuno Gomes de Andrade 90

Data Protection and Identity Management

Oops - We Didn't Mean to Do That! - How Unintended Consequences Can Hijack Good Privacy and Security Policies Thomas P. Keenan 108

Supporting Semi-automated Compliance Control by a System Design Based on the Concept of Separation of Concerns Sebastian Haas Ralph-Herkenhoner Denis Royer Ammar Alkassar Hermann de Meer Günter Müller 120

Security Levels for Web Authentication Using Mobile Phones Anna Vapen Nahid Shahmehri 130

eID Cards and eID Interoperability

Challenges of eID Interoperability: The STORK Project (Keynote) Herbert Leitold 144

Necessary Processing of Personal Data: The Need-to-Know Principle and Processing Data from the New German Identity Card Harold Zwingelberg 151

A Smart Card Based Solution for User-Centric Identity Management Jan Vossaert Pieter Verhaeghe Bart De Decker Vincent Naessens 164

Emerging Technologies

The Uncanny Valley Everywhere? On Privacy Perception and Expectation Management (Keynote) Bibi van den Berg 178

50 Ways to Break R.FID Privacy Ton van Deursen 192

Privacy for eGovernment and AAL Applications

The Limits of Control - (Governmental) Identity Management from a Privacy Perspective Stefan Strauβ 206

Privacy Concerns in a Remote Monitoring and Social Networking Platform for Assisted Living Peter Rothenpieler Claudia Becker Stefan Fischer 219

Social Networks and Privacy Privacy

Settings in Social Networking Sites: Is It Fair? Aleksandra Kuczerawy Fanny Coudert 231

Privacy Effects of Web Bugs Amplified by Web 2.0 Jaromir Dobias 244

Privacy Policies

A Conceptual Model for Privacy Policies with Consent and Revocation Requirements Marco Casassa Mont Siani Pearson Sadie Creese Michael Goldsmith Nick Papanicolaou 258

Applying Formal Methods to Detect and Resolve Ambiguities in Privacy Requirements loannis Agrafiotis Sadie Creese Michael Goldsmith Nick Papanikolaou 271

A Decision Support System for Design for Privacy Siani Pearson Azzedine Benameur 283

A Multi-privacy Policy Enforcement System Kaniz Fatema David W. Chadwick Stijn Lievens 297

Usable Privacy

Designing Usable Online Privacy Mechanisms: What Can We Learn from Real World Behaviour? Periambal L. Coopamootoo Debi Ashenden 311

PrimeLife Checkout - A Privacy-Enabling e-Shopping User Interface Ulrich König 325

Towards Displaying Privacy Information with Icons Leif-Erik Holtz Katharina Nocun Marit Hansen 338

Obituary

Andreas Pfitzmann 1958-2010: Pioneer of Technical Privacy Protection in the Information Society Hannes Federrath Marit Hansen Michael Waidner 349

Author Index 353

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)