Articles
Title |
Author(s) |
Date |
||||
"Enforcing Confidentiality and Data Visibilty Constraints: An OBDD Approach", Proceedings of the 25th Annual WG 11.3 Conference on Data and Applications Security and Privacy (DBSec 2011), Richmond, USA, July 11-13th, 2011 |
V. Ciriani, S. De Capitani di Vimercati, S. Foresti, G. Livraga, P. Samarati |
July 2011 |
||||
"Privacy-respecting Reputation for Wiki Users", IFIP Trust Management, Copenhagen, Denmark, June 29-July 1, 2011 |
B.Kellermann, S. Pötzsch, S. Steinbrecher | July 2011 |
||||
"Efficient and Private Access to Outsourced Data", Proceedings of the 31st International Conference on Distributed Computer Systems (ICDS 2011), Minneapolis, USA, June 20-24th, 2011 | S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, G. Pelosi, P. Samarati | June 2011 | ||||
"Abstract Privacy Policy Framework: Addressing Privacy Problems in SOA", in proceedings of iNetSec 2011, June 2011 | L. Bussard, U. Pinsdorf | June 2011 | ||||
"Privacy and Identity Management for Life", Proceedings of the 6th IFIP/PrimeLife International Summer School, Helsingborg, August 1-6, 2010, revised selected papers, published by Springer in May 2011 |
Simone Fischer-Hübner, Penny Duquenoy, Marit Hansen, Ronald Leenes, Ge Zhang |
May 2011 | ||||
"The Uncanny Valley Everywhere? On Privacy Perception and Expectation Management", Proceedings of the 6th IFIP/PrimeLife International Summer School, Helsingborg, August 1-6, 2010, revised selected papers, published by Springer in May 2011 | B. van den Berg | May 2011 | ||||
"Implementability of the Identity Management Part in Pfitzmann/Hansen’s Terminology for a Complex Digital World", Proceedings of the 6th IFIP/PrimeLife International Summer School, Helsingborg, August 1-6, 2010, Springer, 2011 | M. Berg, K. Borcea-Pfitzmann | May 2011 |
||||
"Towards a Formal Language for Privacy Options" in: "Privacy and Identity Management for Life", Proceedings of the 6th IFIP/PrimeLife International Summer School, Helsingborg, August 1-6, 2010, Springer, 2011 |
S. Berthold | May 2011 |
||||
"Privacy Settings in Social Networking Sites: Is It Fair?", Proceedings of the 6th IFIP/PrimeLife International Summer School, Helsingborg, August 1-6, 2010, Springer, 2011 | A. Kuczerawy, F. Coudert | May 2011 | ||||
"Privacy Effects of Web Bugs Amplified by Web 2.0", Proceedings of the 6th IFIP/PrimeLife International Summer School, Helsingborg, August 1-6, 2010, Springer, 2011 |
J. Dobias | May 2011 | ||||
"PrimeLife Checkout – A Privacy-Enabling e-Shopping User Interface", Proceedings of the 6th IFIP/PrimeLife International Summer School, Helsingborg, August 1-6, 2010, Springer, 2011 |
U. König | May 2011 |
||||
"Towards Displaying Privacy Information with Icons", Proceedings of the 6th IFIP/PrimeLife International Summer School, Helsingborg, August 1-6, 2010, Springer, 2011 | L.-E. Holtz, K. Nocun, M. Hansen: | May 2011 | ||||
"Necessary processing of personal data – The need-to-know principle and processing data from the new German identity card", Proceedings of the 6th IFIP/PrimeLife International Summer School, Helsingborg, August 1-6, 2010, Springer, 2011 | H. Zwingelberg | May 2011 | ||||
"A Data-Centric Approach for Privacy-Aware Business Process Enablement", Enterprise Interoperability, Lecture Notes in Business Information Processing, Volume 76, Part 2, Part 5, 2011, pp. 191-203 | S. Short, S. P. Kaluvuri | April 2011 | ||||
"Data Usage Control in the Future Internet Cloud", Lecture Notes in Computer Science, Volume 6656, 2011, pp. 223-231 | M. Bezzi, S. Trabelsi | April 2011 | ||||
"Collective Exposure: Peer Effects in Voluntary Disclosure of Personal Data", Financial Cryptography, St. Lucia, February 28 - March 4, 2011 |
R. Böhme, S. Pötzsch | Mach 2011 | ||||
"Privacy, Accountability and Trust – Challenges and Opportunities", chapter contribution in the named ENISA report, 2011 | S. Fischer-Hübner | February 2011 | ||||
"An Obfuscation-based Approach for Protecting Location Privacy", in IEEE Transactions on Dependable and Secure Computing, January-February, 2011 |
C.A. Ardagna, M. Cremonini, S. De Capitani di Vimercati, P. Samarati | January 2011 | ||||
"Requirements for Identity Management from the Perspective of Multilateral Interactions", in J. Camenisch, R. Leenes, D. Sommer (Eds.): Privacy and Identity Management for Europe (PRIME), Lecture Notes in Computer Science, Vol. 6545, Chapter 22, p. 597-635, Springer, 2011 | S. Pötzsch, K. Borcea-Pfitzmann, M. Hansen, K. Liesebach, S. Steinbrecher | January 2011 | ||||
"Commercial Data Privacy and Innovation in the Internet Economy: A Dynamic Policy Framework", Response to Department of Commerce Green Paper, 2011 | R. Wenning | January 2011 | ||||
"Anonymization of Statistical Data", IT - Information Technology, 2011 | S. de Capitani di Vimercati, S. Foresti, G. Livraga, P. Samarati | January 2011 | ||||
"Privacy 3.0 := Data Minimization + User Control + Contextual Integrity", it – Information Technology 53/1 (2011), Oldenbourg Wissenschaftsverlag, pp. 34-40 |
K. Borcea-Pfitzmann, A. Pfitzmann, M. Berg | January 2011 | ||||
"Minimizing Disclosure of Client Information in Credential-Based Interactions", International Journal of Information Privacy, Security and Integrity (IJIPSI), 2011 | C.A. Ardagna, S. De Capitani die Vimercati, S. Foresti, S. Paraboschi, P. Samarati | 2011 | ||||
"Grant Option", Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia, Springer, 2011 | S. De Capitani di Vimercati, G. Livraga | 2011 | ||||
"Selective Data Outsourcing for Enforcing Privacy", Journal of Computer Security, 2011 | V. Ciriani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati | 2011 | ||||
"Discretionary Access Control Policies (DAC)", Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia, Springer, 2011 | S. De Capitani di Vimercati | 2011 | ||||
"A Privacy-preserving ID-based Group Key Agreement Scheme applied in VPAN", in SOFSEM 2011: 37th Conference on Current Trends in Theory and Practice of Informatics,Lecture Notes in Computer Science 6543, J. Hromkovič, and R. Královič (eds.), Springer, pp. 214-222, 2011 |
Y. De Mulder, K. Wouters, B. Preneel | 2011 | ||||
"Privileges in SQL", Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia, Springer, 2011 | S. de Capitani di Vimercati, G. Livraga | 2011 | ||||
"Advances in Access Control Policies", Privacy and Identity Management for Life, J. Camenisch, S. Fischer-Hübner, K. Ranneberg, Springer, 2011 | C. Ardagna, S. De Capitani die Vimercati, G. Neven, S. Paraboschi, E. Pedrini, F.-S. Preiss, P. Samarati, M. Verdicchio | 2011 | ||||
"Data Privacy", Privacy and Identity Management for Life, J. Camenisch, S. Fischer-Hübner, K. Rannenberg, Springer, 2011 | M. Bezzi, S. De Capitani di Vimercati, S. Foresti, G. Livraga, S. Paraboschi, P. Samarati | 2011 | ||||
"Least Privilege", Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia, Springer, 2011 | S. De Capitani di Vimercati | 2011 | ||||
"k-anonymity", Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia, Springer, 2011 | P. Samarati | 2011 | ||||
"Authorization Enforcement in Distributed Query Evaluation", Journal of Computer Security, 2011 | S. De Capitani di Vimercati, S. Foresti, S. Jajoda, S. Paraboschi, P. Samarati | 2011 | ||||
"Privacy-Aware Access Control Policies", Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia, Springer, 2011 | S. De Capitani di Vimercati | 2011 | ||||
"Flexible Authorization Framework (FAF)", Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia, Springer, 2011 | P. Samarati | 2011 | ||||
"SQL Access Control Model", Encyclopdia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia, Springer, 2011 | S. De Capitani di Vimercati, G. Livraga | 2011 | ||||
"Implementability of the Identity Management Part in Pfitzmann/Hansen's Terminology for a Complex Digital World", Proceedings of PrimeLife/IFIP SummerSchool 2010 | M. Berg, K. Borcea-Pfitzmann | 2011 | ||||
"Privacy-Aware Access Control System: Evaluation and Decision", Digital Privacy: PRIME - Privacy and Identity Management for Europe, J. Camenisch, R. Leenes, D. Sommer, Springer, 2011 | C.A. Ardagna, S. De Capitani di Vimercati, E. Pedrini, P. Samarati | 2011 | ||||
"Clark and Wilson", Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia, Springer, 2011 | S. De Capitani di Vimercati, P. Samarati | 2011 | ||||
"Multilevel Database", Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia, Springer, 2011 | G. Livraga, P. Samarati | 2011 | ||||
"Policy Composition", Encyclopdia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia, Springer, 2011 | S. De Capitani di Vimercati | 2011 | ||||
"Privacy Models and Languages: Access Control and Data Handling Policies", Digital Privacy: PRIME - Privacy and Identity Management for Europe, J. Camenisch, R. Leenes, D. Sommer, Springer, 2011 | C.A. Ardagna, S. De Capitani di Vimercati, P. Samarati | 2011 | ||||
"Chinese Wall", Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia, Springer, 2011 | S. De Capitani di Vimercati, P. Samarati | 2011 | ||||
"Scramble! your social network data", In Privacy Enhancing Technologies International Symposium, PETS 2011, Lecture Notes in Computer Science, Simone Fischer-Hübner, and N. J. Hopper (eds.), Springer-Verlag, 15 pages, 2011 | F. Beato, M. Kohlweiss, K. Wouters | 2011 | ||||
"Mandatory Access Control Policies (MAC)", Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia, Springer, 2011 | S. De Capitani di Vimercati, P. Samarati | 2011 | ||||
"Recursive Revoke", Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia, Springer, 2011 | P. Samarati | 2011 | ||||
"Selective Exchange of Confidential Data in the Outsourcing Scenario", Privacy and Identity Management for Life, J. Camenisch, S. Fischer-Hübner, K. Rannenberg, Springer, 2011 | S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, G. Pelosi, P. Samarati | 2011 | ||||
"Differentially Private Billing with Rebates", in Information Hiding, International Workshop, IH 2011, Lecture Notes in Computer Science, Springer-Verlag, 21 pages, 2011 |
G. Danezis, M. Kohlweiss, A. Rial | 2011 |
||||
"Polyinstantiation", Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia, Springer, 2011 | S. De Capitani die Vimercati, P. Samarati | 2011 | ||||
"Policy Requirements and State of the Art", Privacy and Identity Management for Life, J. Camenisch, S. Fischer-Hübner, K. Rannenberg, Springer, 2011 | C. Bournez, C.A. Ardagna | 2011 | ||||
"Authorizations", Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia, Springer, 2011 | S. De Capitani di Vimercati | 2011 | ||||
"Location information (privacy of)", Encyclopedia of Cryptography and Security, H.C.A. van Tilborg, S. Jajodia, Springer, 2011 | C.A. Ardagna | 2011 | ||||
"Privacy in Data Publishing", Data Privacy Management and Autonomous Spontaneous Security, J. Gracia-Alfaro, G. Navarro-Arribas, A. Cavalli, J. Leneutre, Springer, 2011 | S. De Capitani di Vimercati, S. Foresti, G. Livraga | 2011 | ||||
"XML-based access control languages", Encyclopedia of Cryptography and Security, H.C.A. van Tilborg, S. Jajodia, Springer, 2011 | C.A. Ardagna | 2011 | ||||
"Quasi-identifier", Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia, Springer, 2011 | S. De Capitani di Vimercati, S. Foresti | 2011 | ||||
"Privacy, Liveliness and Fairness for Reputation", in Cerna et al. (Eds.): Proceedings of SOFSEM 2011, LNCS 6543, p. 506-519, Springer, 2011 | S. Schiffner, S. Clauß, S. Steinbrecher | 2011 | ||||
"Personal Privacy in Mobile Networks", Mobile Technologies for Conflict Management: Online Dispute Resolution, Governance, Participation, M. Problet, Law, Governance and Technology Series 2, Springer Science+Business Media B.V., 2011 | C.A. Ardagna, S. De Capitani di Vimercati, P. Samarati | 2011 | ||||
"Access Matrix", Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia, Springer, 2011 | S. De Capitani di Vimercati | 2011 | ||||
"Privacy-Enhanced Web-Based Event Scheduling with Majority Agreement", Proceedings of IFIC-SEC 2011: Future Challenges in Security and Privacy for Academia and Industry | B. Kellermann | 2011 | ||||
"Microdata Protection", Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia, Springer, 2011 | S. Foresti | 2011 | ||||
"Administrative Policies", Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia, Springer, 2011 | S. De Capitani di Vimercati, P. Samarati | 2011 | ||||
"Privacy Effects of Web Bugs Amplified by Web 2.0", in S. Fischer-Hübner et al. (Eds.): Proceedings of Privacy and Identity 2010, IFIP AICT 352, p. 244-257, Springer, 2011 | J. Dobias | 2011 | ||||
"Privacy-Aware Languages", Encyclopedia of Cryptography and Security, H.C.A. van Tilborg, S. Jajodia, Springer, 2011 | C.A. Ardagna | 2011 | ||||
"Access Control Policies, Models, and Mechanisms", Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia, Springer, 2011 | S. De Capitani di Vimercati | 2011 | ||||
"Mixing Identities with Ease", Proceedings of Policies and Reserach in Identity Management, IFIP Advances in Information and Communication Technology, Vol. 343, p. 1-17, 2010 | P. Bichsel, J. Camenisch | November 2010 | ||||
"Privacy in personal applications", Proceedings of SENSYBLE/ITG/GI Workshop 2010 | K. Rannenberg | November 2010 | ||||
"Usable Security and Privacy", Datenschutz und Datensicherheit (DuD) 11/2010 | S. Fischer-Hübner, L. L. Iocano, S. Möller | November 2010 | ||||
"Geolokalisierung und Geotracking - Herausforderungen für Location Privacy", in DANA Datenschutz Nachrichten 3/2010, p. 100-105, 2010 | M. Hansen | October 2010 | ||||
"Privacy Awareness Information for Web Forums: Results from an Empirical Study", Proceedings of 6th Nordic Conference on Human Computer Interaction: Extending Boundaries (NORDiCHI'10), p. 363-372, ACM, 2010 | S. Pötzsch, P. Wolkerstorfer, C. Graf | October 2010 | ||||
"Towards future-proof privacy-respecting identity management systems", in Proceedings of N. Pohlmann, H. Reimer, W. Schneider (eds.): ISSE 2010 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2010 Conference, p. 182-190, 2010 | M. Hansen | October 2010 | ||||
"PPL Engine: A Symmetric Architecture for Privacy Policy Handling", Position Paper and article in Proceedings of W3C Workshop on Privacy and data usage control, 2010 | S. Trabelsi, A. Njeh, L. Bussard, G. Neven | October 2010 | ||||
"Social Lending aus der Perspektive des Datenschutzes", Proceedings of SICHERHEIT 2010 - Sicherheit, Schutz und Zuverlässigkeit, LNI 170, p. 317-328, Köllen, 2010 | R. Böhme, S. Pötzsch | October 2010 | ||||
"Data Handling: Dependencies between Authorizations and Obligations", Position Paper at W3C Workshop on Privacy and data usage control, 2010 | L. Bussard, G. Neven, J. Schallaböck | October 2010 | ||||
"Get Shorty via Group Signatures without Encryption", Proceedings of Security and Cryptography for Networks, p. 318-396, Springer LNCS, Vol. 6280, 2010 | P. Bichsel, J. Camenisch, G. Neven, N.P. Smart, B. Warinschi | September 2010 | ||||
"Einfluss wahrgenommener Privatsphäre und Anonymität auf Forennutzer", in U. Schroeder Ulrik (Ed.): Interaktive Kulturen, Berlin, 2010 | S. Pötzsch | September 2010 | ||||
"Analyzing Causes of Privacy Mismatches in Service Oriented Architecture", Master thesis Rheinisch-Westfälische Technische Hochschule European Microsoft Innovation Center Aachen, Germany |
Sharif Tanvir Rahman |
September 2010 |
||||
"Protecting Privacy of Sensitive Value Distributions in Data Release", Proceedings of the 6th Workshop on Security and Trust Management (STM 2010) | M. Bezzi, S. De Capitani di Vimercati, G. Livraga, P. Samarati | September 2010 | ||||
"Surveillance and Privacy", What kind of Information Society? Governance, Virtuality, Surveillance, Substainability, Resilience - Proceedings of the IFIP TC9 International Conference HCC9 2010, Springer, 2010 | Y. Giorgiadou, S. Fischer-Hübner | September 2010 | ||||
"The Role of Soft Information in Trust Building: Evidence from Online Social Lending", in A. Aquisti, S.W. Smith (Eds.): Trust 2010, LNCS 6101, p. 381-395, Springer, 2010 | S. Pötzsch, R. Böhme | August 2010 | ||||
"Towards an Economic Valuation of Telco-based Identity Management Enablers", Proceedings of PrimeLife/IFIP SummerSchool 2010 | K. Rannenberg | August 2010 | ||||
"Controlling the Flow of PII to Web 2.0 beyond current Identity Service Provisioning", Proceedings of PrimeLife/IFIP SummerSchool 2010 | M. Marhoefer, G. Bal | August 2010 | ||||
"eScience and Shared Workspaces: Enabler for next generation research environment", Proceedings of PrimeLife/IFIP SummerSchool 2010 | C. Weber | August 2010 | ||||
"W3C Geolocation API calls for Better User Privacy Protection", Proceedings of W3C Workshop on Privacy for Advanced Web APIs | I. Krontiris, A. Albers, K. Rannenberg | July 2010 | ||||
"Privacy in mobile applications and beyond", Proceedings of Journée ADREAM, Architectures dynamiques reconfigurables pour systèmes embarqués autonomes mobiles, LAAS CNRS | K. Rannenberg | July 2010 | ||||
"Downstream Usage Control", in proceedings of IEEE Policy 2010, July 2010 (download) | L. Bussard, G. Neven, F.-S- Preis | July 2010 | ||||
"Datenschutzkonformes Social Networking: Clique und Scramble!", in: Datenschutz und Datensicherheit 34 (2010) 7, pp. 439-443 | L.-E. Holtz | July 2010 | ||||
"Delegation for Privacy Management from Womb to Tomb - A European Perspective", in M. Bezzi, P. Duquenoy, S. Fischer-Hübner, M. Hansen, G. Zhang (Eds.): Privacy and Identity Management for Life, Proceedings of the 5th IFIP WG 9.2,9.6/11.4, 11.6, 11.7/PrimeLife International Summer School 2009, IFIP AICT 320, p. 18-33, Springer, 2010 | M. Hansen, M. Raguse, K. Storf, H. Zwingelberg | June 2010 | ||||
"The Role of Soft Information in Trust Building: Evidence from Online Social Lending", in A. Acquisti, S.W. Smith, and A.-R. Sadeghi (eds.), Proceedings of TRUST 2010, LNCS 6101, pp. 381-395, Springer, 2010 |
S. Pötzsch, R. Böhme | June 2010 | ||||
"Spuren im Netz - der Schutz der Privatspähre", in: D. Korczak (ed.): Spurensuche - Kulturwissenschaftliche Interpretationen und gesellschaftliche Rezeption, Proceedings und Tagungsband zur 66. Jahrestagung, p. 105-128, 2010 | M. Hansen | June 2010 | ||||
"Privacy-Aware Policy Matching", Proceedings of IEEE Symposium on Computers and Communications 2010, 2010 | S. Trabelsi, E. Weil, A. Sorniotti, S. Short, M. Bezzi | June 2010 | ||||
"Lebenslanger Datenschutz – Anforderungen an vertrauenswürdige Infrastrukturen", in: Datenschutz und Datensicherheit (DuD) 34 (2010) 5, pp. 283-288. |
Marit Hansen, Sven Thomsen | May 2010 | ||||
"A Formal Model of Identity Mixer", Lecture Notes in Computer Science, Volume 6371/2010, p. 198-214, 2010 | Jan Camenisch, Sebastian Mödersheim and Dieter Sommer | 2010 | ||||
"A terminology for talking about privacy by data minimiztion: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonimity, and Identity Management", Working paper v0.33, 2010 | A. Pfitzmann, M. Hansen | April 2010 | ||||
"Role management in a privacy-enhanced collaborative environment", in P. Kommers, P. Isarias (Eds.): Proceedings of e-Society, IADIS, 2010 | A. Lorenz, K. Borcea-Pfitzmann | March 2010 | ||||
"Technik für mehr Transparenz"; in: digma – Zeitschrift für Datenrecht und Informationssicherheit 1/2010, Schulthess 2010 |
Simone Fischer-Hübner, Marit Hansen, Hans Hedbom | March 2010 | ||||
"Privacy in Online Social Lending", Proceedings of the AAAI 2010 Spring Symposium on Intelligent Information Privacy Management, p. 23-28 | R. Böhme, S. Pötzsch | March 2010 | ||||
"Get Shorty via Group Signatures without Encryption", Lecture Notes in Computer Science, Volume 6280/2010, p. 381-398, 2010 |
Patrik Bichsel, Jan Camenisch, Gregory Neven, Nigel P. Smart and Bogdan Warinschi | 2010 | ||||
"Context is everything: sociality in Online Social Network Sites", Proceedings of Privacy and Identity, IFIP AICT 320, p. 48-65, Springer, 2010 | R. Leenes | 2010 | ||||
"Privacy and Liveliness for reputation Systems", Lecture Notes in Computer Science 2010, Vol. 6391/2010, p. 209-224, Springer, 2010 | S. Schiffner, S. Clauß, S. Steinbrecher | 2010 | ||||
"Privacy-Enhancing Cryptography: From Theory into Practice", Lecture Notes in Computer Science Notes,Volume 5978/2010, p.498, 2010 | Jan Camenisch |
2010 | ||||
"Audience segregation in social network sites", Proceedings for SocialCom2010/PASSAT2010, p. 1111-1117, Washington, USA, 2010 | B. van den Berg, R. Leenes | 2010 | ||||
"Downstream Usage Control", Proceedings of IEEE Policy 2010 | L. Bussard, G. Neven, F.-S. Preiss | 2010 | ||||
"Privacy and Identity Management for Life", Proceedings of the 5th IFIP/PrimeLife SummerSchool 2009, Springer, 2010 | M. Bezzi, P. Duquenoy, S. Fischer-Hübner, M. Hansen, G. Zhang | 2010 | ||||
"Solving Revocation with Efficient Update of Anonymous Credentials", Lecture Notes in Computer Science,Volume 6280/2010, p. 454-471, 2010 | Jan Camenisch, Markulf Kohlweiss and Claudio Soriente | 2010 | ||||
"Lifelong Privacy: Privacy and Identity Management for Life", Proceedings of M. Bezzi, P. Duquenoy, S. Fischer-Hübner, M. Hansen, G. Zhang (Eds.:): Privacy and Identity Management for Life, IFIP Advances in Information and Communication Technology, Vol. 320, Springer, 2010 | A. Pfitzmann, K. Borcea-Pfitzmann | 2010 | ||||
"Policies and Research in Identity Management", Proceedings of the 2nd IFIP WG11.6 working conference IDMAN 2010, Oslo, Norway, Springer, 2010 | E. de Leeuw, S. Fischer-Hübner, L. Fritsch | 2010 | ||||
"Efficiency Limitations for Σ-Protocols for Group Homomorphisms", Lecture Notes in Computer Science, Volume 5978/2010, p. 553-571, 2010 | Endre Bangerter, Jan Camenisch and Stephan Krenn | 2010 | ||||
"JCS special issue on EU-funded ICT research on Trust and Security", Journal of Computer Security, 2010 |
Jan Camenisch, Javier Lopez, Fabio Massacci, Massimo Ciscato, Thomas Skordas | 2010 | ||||
"The Conflict between Privacy and Digital Forensics", Wirtschafts- und Finanzstrafrecht in der Praxis, Bd. 4 - 2010, Linde, 2010 | S. Fischer-Hübner | 2010 | ||||
"Efficiency Limitations for Σ-Protocols for Group Homomorphisms", Proceedings of TCC 2010, p. 553-571 | E. Bangerter, J. Camenisch, S. Krenn | 2010 | ||||
"Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project", Journal of Computer Security, Volume 18, Number 1, p. 123-160, 2010 | Claudio A. Ardagna, Jan Camenisch, Markulf Kohlweiss, Ronald Leenes, Gregory Neven, Bart Priem, Pierangela Samarati, Dieter Sommer, Mario Verdicchio | 2010 | ||||
"Cryptographic Protocols For Privacy Enhanced Identity Management", PhD thesis, B. Preneel (promoter), 2010 |
M. Kohlweiss | 2010 | ||||
"Credential Authenticated Identification and key Exchange", Proceedings of CRYPTO 2010, p. 255-276 | J. Camenisch, N. Casati, T. Groß, V. Shoup | 2010 | ||||
"Robust Encryption" Lecture Notes in Computer Science, 2010, Volume 5978/2010, p. 480-497, TCC, 2010 |
Michel Abdalla, Mihir Bellare, Gregory Neven | 2010 | ||||
"Privacy-Preserving Credential-Based Access Control and How to enable it with XACML and SAML",Proceedings of IEEE International Symposium on trust, Security and Privacy for Emerging Applications 2010 (TSP-10), 2010 | C.A. Ardagna, S. De Capitani di Vimercati, G. Neven, S. Paraboschi, F.-S. Preiss, P. Samarati, M. Verdicchio | 2010 | ||||
"Performance Analysis of Accumulator-based Revocation Mechanisms", Proceedings of the 25th International Conference on Information Security (SEC 2010), IFIP Conference Proceedings, Kluwer, 2010 | J. Lapon, M. Kohlweiss, B. De Decker, V. Naessens | 2010 | ||||
"Unlinkable priced oblivious transfer with rechargable wallets", R. Sion (Ed.): Proceedings of 14th International Conference on Financial Cryptography and Data Security - FC 2010, Vol. 6052 of Lecture Notes in Computer Science, p. 66-81, Springer, 2010 | J. Camenisch, M. Dubovitskaya, G. Neven | 2010 | ||||
"Privacy-Respecting Access Control in Collaborative Workspaces", IFIP Advances in Information and Communication Technology, Volume 320/2010, p. 102-111, 2010 |
2010 | |||||
"Encrypting Keys Securely", Proceedings of IEEE Security & Privacy 8 (4), p. 66-69, 2010 | C. Cachin, J. Camenisch | 2010 | ||||
"Enabling privacy-preserving credential-based access control with XACML and SAML", Proceedings of 10th International Conference on Computer and Information Technology - CIT 2010, p. 1090-1095, IEE Computer Society, 2010 | C.A. Ardagna, S. De Capitani die Vimercati, G. Neven, S. Paraboschi, F.-S. Preiss, P. Samarati, M. Verdicchio | 2010 | ||||
"Credential Authenticated Identification and Key Exchange", Lecture Notes in Computer Science, 2010 |
Jan Camenisch, Nathalie Casati, Thomas Gross and Victor Shoup |
2010 |
||||
"A Pattern Collection for Privacy Enhanced Technology", 2010 | C. Graf, P. Wolkerstorfer, A. Geven, M. Tscheligi | 2010 | ||||
"A Card Requirements Language Enabling Privacy-Preserving Access Control", Proceedings of the 15th ACM Symposium on Access Control Models and Technologies "SACMAT 2010", p. 119-128, 2010 | J. Camenisch, S. Moedersheim, G. Neven, F.-S. Preiss, D. Sommer | 2010 | ||||
“Identitätsmanagement in Netzwelten”, in: Dieter Klumpp, Herbert Kubicek, Alexander Roßnagel, Wolfgang Schulz (Hg.): Netzwelt – Wege, Werte, Wandel; Springer, Berlin Heidelberg 2010, 245–263. |
Sandra Steinbecher, Andreas Pfitzmann, Sebastian Clauß |
January 2010 | ||||
"Usable Privacy-Enhancing Identity Management: Challenges and Approaches", in: Information and Communication Technologies, Society and Human Beings: Theory and Framework. Honouring Professor Gunilla Bradley, IGI Global, 2010 |
Simone Fischer-Huebner, John Sören Pettersson |
2010 | ||||
"Saving online privacy", M. Bezzi, P. Duquoenoy, S. Fischer-Hübner, M. Hansen, G. Zhang (eds.): Proceedings of Privacy and Identity Management for Life, Vol. 320 of IFIP Advaces in Information and Communication Technology, p. 34-47, Springer, 2010 |
J. Camenisch, G. Neven | 2010 | ||||
"Fine-grained disclosure of access policies", M. Soriano, S. Qing, J. Lopez (eds.): Proceedings of 12th International Conference on Information and Communications Security - ICICS 2010, Vol. 6476 of Lecture Notes in Computer Science, p. 16-30, Springer, 2010 | C.A. Ardagna, S. De Capitani di Vimercati, S. Foresti, G. Neven, S. Paraboschi, F.-S. Preiss, P. Samarati, M. Verdicchio | 2010 | ||||
"An XACML-based privacy-centered access control system", in proceedings of the 1st ACM Workshop on Information Security Governance (WISG 2009), Chicago, IL, USA. | C. A. Ardagna, S. De Capitani di Vimercati, S. Paraboschi, E. Pedrini, P. Samarati | November 2009 | ||||
"SpotAFriendNow: Social interaction through location-based social networks", in Information, Communication and Society | Bibi van den Berg, M.E. Pekárek | 18.11.2009 | ||||
"Anonymous credentials on a standard java card", in Proceedings of the 2009 ACM Conference on Computer and Communications Security, p. 600-610, ACM Press, 2009 | Patrik Bichsel, Jan Camenisch, Thomas Gross, Victor Shoup: | 13.11.2009 | ||||
"A Netiquette for Social Networks", Joint presentation at Re-Publica 2009 and 2nd European Privacy Open Space, 2009 |
Jan Schallaböck | 2009 | ||||
"Privacy on Mobile Devices: Present and Future Technologies", at ETSI Security Workshop in Sophia-Antipolis, France | Stephan Spitz | 2009 | ||||
"Credential-based access control extensions to XACML", presentation at PrimeLife & W3C Workshop on Access Control Application Scenarios, Abbaye de Neumünster, Luxemburg | Jan Camenisch, Sebastian Mödersheim, Gregory Neven, Franz-Stefan Preiss, Dieter Sommer | 2009 |
||||
"Internet of Things - Strategic Roadmap", 43p, IoT Cluster of European Research Projects, 15 September 2009 | P. Guillemin, P. Friess, O. Vermesan, M. Harrison, H. Vogt, K. Konstantinos, M. Tomasella, S. Gusmeroli, K. Wouters, S. Haller | September 2009 |
||||
"Private Intersection of Certified Sets", in Proceedings of Financial Cryptography, p. 108-127, Springer LNCS, 2009 | Jan Camenisch and Gregory M. Zaverucha | 2009 |
||||
"Exploring Trust, Security and Privacy in Digital Business", Inauguration edition of the Journal: "Transactions on Large Scale Data and Knowledge Centered Systems" , Vol.1, No.1, published by Springer Verlag within the LNCS journal subline 5729, September 2009 | Simone Fischer-Hübner, Steven Furnell, Costas Lambrinoudakis | September 2009 | ||||
"Privacy-Respecting Access Control in Collaborative Workspaces", published in Pre-Proceedings of Fifth IFIP/PrimeLife, Summer School, Nice, France, 2009 | Stefanie Pötzsch and Katrin Borcea-Pfitzmann | September 2009 | ||||
"Putting Privacy Pictograms into Practice - A European Perspective", in Stefan Fischer, Erik Maehle, Rüdiger Reischuk (eds.): "INFORMATIK 2009 - Im Focus das Leben"; LNI P-154, Gesellschaft für Informatik, Bonn 2009 | Marit Hansen | 21.09.2009 | ||||
"Keep a Few: Outsourcing Data While Maintaining Confidentiality", in proceedings of the 14th European Symposium On Research In Computer Security (ESORICS 2009), Saint Malo, France |
V. Ciriani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati | 21.09.2009 | ||||
"Anonymous Credentials in Web Applications - A Child's Play with the PRIME Core", published in Pre-Proceedings of Fifth IFIP/PrimeLife Summer School, Nice, France, 2009 | Benjamin Kellermann and Immanuel Scholz | 07.09.2009 - 11.09.2009 | ||||
"Digital Personae and Profiles as Representations of Individuals", published in Pre-Proceedings of Fifth IFIP/PrimeLife Summer School, Nice, France, 2009 | Arnold Roosendaal | 07.09.2009 - 11.09.2009 | ||||
"PET-USES: The Privacy Enhancing Technology Users' Self-Estimation Scale", published in Pre-Proceedings of Fifth IFIP/PrimeLife Summer School, Nice, France, 2009. | Erik Wästlund, Peter Wolkerstorfer | 07.09.2009 - 11.09.2009 | ||||
"Facebook and its EU Users - Applicability of the EU Data Protection Law to US Based SNS" published in Pre-Proceedings of Fifth IFIP/PrimeLife Summer School, Nice, France, 2009. | Aleksandra Kuczerawy | 07.09.2009 - 11.09.2009 | ||||
"Adding Secure Transparency Logging to the Prime Core", published in Pre-Proceedings of Fifth IFIP/PrimeLife Summer School, Nice, France, 2009 | Hans Hedbom, Tobias Pulls, Peter Hjärtquist and Andreas Lavén | 07.09.2009 - 11.09.2009 | ||||
"Addressing the Privacy Paradox by Expanded Privacy Awareness - The Example of Context-Aware Services", published in Pre-Proceedings of Fifth IFIP/PrimeLife Summer School, Nice, France, 2009. | Andre Deuker | 07.09.2009 - 11.09.2009 | ||||
"Privacy from Womb to Tomb - Delegation from a European Perspective" published in Pre-Proceedings of Fifth IFIP/PrimeLife Summer School, Nice, France, 2009 |
Marit Hansen, Maren Raguse, Katalin Storf, Harald Zwingelberg | 07.09.2009 - 11.09.2009 | ||||
"Privacy-enhanced event scheduling", at IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT '09), 3:52 59, 2009. | Benjamin Kellermann, Rainer Bohme | 29.08.2009 | ||||
"Universally composable adaptive priced oblivious transfer". In: Pairing-Based Cryptography - Pairing 2009, Lecture Notes in Computer Science, page 24, Palo Alto,CA,USA, Springer, 2009 |
A. Rial, M. Kohlweiss, B. Preneel | 12.08.- 14.08.2009 | ||||
"Compact e-cash and simulatable vrfs revisited", in: Pairing-Based Cryptography - Pairing 2009, Lecture Notes in Computer Science, p. 27, Palo Alto,CA,USA, Springer, 2009 | M. Belenkiy, M. Chase, M. Kohlweiss, A. Lysyanskaya | 12.08.- 14.08.2009 | ||||
"Protecting Information Privacy in the Electronic Society," in International Conference on Security and Cryptography (SECRYPT 2009), Milan, Italy, July, 2009 | Stefan Schiffner, Sebastian Clauß | 07.07.2009 | ||||
"Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients", in Proc. of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec 2009), Montreal, Quebec, Canada, 2009 |
V. Ciriani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Para- boschi, and P. Samarati |
July 2009 | ||||
"A Survey on Tansparency Tools for Enhancing Privacy", in: The Future of Identity in the Information Society, Proceedings of the 4th IFIP/FIDIS Summer School, Brno, September 2008. Published by Springer in 2009 | Hans Hedbom | 2009 | ||||
"Privacy Awareness: A Means to Solve the Privacy Paradox?", Volume 298 of IFIP Advances in Information and Communication Technology, pages 226 236., Springer, Boston, 2009 | Stefanie Pötzsch | July 2009 | ||||
"Valuating Privacy with Option Pricing Theory", Workshop on the Economics of Information Security, TU Dresden, (WEIS 2009) | Stefan Berthold, Rainer Böhme | June 2009 | ||||
"Data fusion for user presence identification", in IEEE International Conference on Computational Intelligence for Measurement Systems and Applications (CIMSA 2009), Hong Kong, 2009 |
V. Di Lecce, A. Amato, V. Piuri | May - July 2009 |
||||
"Proofs and Delegatable Anonymous Credentials", in Proceedings of CRYPTO 2009, p. 108-125, Springer LNCS, 2009 |
Mira Belenkiy, Jan Camenisch, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Hovav Shacham |
2009 | ||||
"Privacy preserving electronic petitions", in: Identity in the Information Society, 1(1):14, 2009 | Claudia Diaz, Eleni Kosta, Hannelore Dekeyser, Markulf Kohlweiss, Girma Nigusse | 2009 | ||||
"Oblivious transfer with access control", in E. Al-Shaer, S. Jha, and A. Keromytis, (eds.) Proceedings of the 2009 ACM Conference on Computer and Communications Security, pages 131-140. ACM Press, 2009 | J. Camenisch, M. Dubovitskaya and G. Neven | 2009 | ||||
Remarks on "Analysis of one popular group signature scheme" in Asiacrypt 2006, in: IJACT, Volume 1, Number 4, p. 320-322, 2009 |
Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik
|
2009 |
||||
"An Obfuscation-Based Approach for Protecting Location Privacy", in IEEE Transactions on Dependable and Secure Computing. |
C. Ardagna, M. Cremonini, S. De Capitani di Vimercati, P. Samarati | 2009 | ||||
"Social networks and web 2.0: are users also bound by data protection regulations?" in Identity in the Information Society (IDIS), 2009, special issue on Social Web and Identity, DOI 10.1007/s12394-009-0017-3 |
B. Van Alsenoy, J. Ballet, A. Kuczerawy, J. Dumortier |
2009 | ||||
"An Obligation Framework and Language for Data Handling in Service Composition", in Master Thesis, Rheinisch-Westfälische Technische Hochschule Aachen, Germany | Muhammad Ali | 10.06.2009 | ||||
"Fragmentation Design for Efficient Query Execution over Sensitive Distributed Databases", in Proc. of the 29th International Conference on Distributed Computing Systems (ICDCS 2009), Montreal, Quebec, Canada | V. Ciriani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati | 22.-26.06.2009 | ||||
"JASON: A Scalable Reputation System for the Semantic Web", in Proc. of the 24th IFIP TC-11 International Information Security Conference (SEC 2009), Cyprus, Greece | S. Steinbrecher, S. Groß, and M. Meichau | 18.-20.05.2009 | ||||
"Efficient Key Management for Enforcing Access Control in Outsourced Scenarios", in Proc. of the 24th IFIP TC-11 International Information Security Conference (SEC 2009), Cyprus, Greece | C. Blundo, S. Cimato, S. de Capitani di Vimercati, A. De Santis, S. Foresti, S. Paraboschi, and P. Samarati | 18.-20.05.2009 | ||||
"An ontology-based approach to human telepresence," in IEEE International Conference on Computational Intelligence for Measurement Systems and Applications (CIMSA 2009), Hong Kong, China, May 11-13, 2009. |
V. Di Lecce, M. Calabrese, V. Piuri | 11.-13.05.2009 | ||||
"Data Fusion for User Presence Identification," IEEE International Conference on Computational Intelligence for Measurement Systems and Applications (CIMSA 2009), Hong Kong, China, May 11-13, 2009. | V. Di Lecce, A. Amato, V. Piuri | 11.-13.05.2009 | ||||
"On the Portability of Generalized Schnorr Proofs", in Proc. of the 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2009), Cologne, Germany | J. Camenisch, A. Kiayias, and M. Yung | 26.4.-01.05.2009 | ||||
"Using Linkability Information to Attack Mix-based Anonymity Services", in: Proceedings of Privacy Enhancing Technologies 9th International Symposium, PETS 2009, Seattle, WA, USA, August 5-7, 2009, LNCS 5672, Springer, Berlin/Heidelberg, p. 94-107, 2009 | Stefan Schiffner, Sebastian Clauß | May 2009 | ||||
"A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks", in: Proceedings of EUROCRYPT 2009, p. 351-368, Springer LNCS, 2009 | Jan Camenisch, Nishanth Chandran, Victor Shoup | 26.04. - 30.04.2009 | ||||
"Datenschutzkontrolle durch Open Source" in: Datenschutz und Datensicherheit, DUD, Volume 3, Number 3 |
Jan Schallaböck | March 2009 | ||||
"An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials", in Proc. of the 12th International Conference on Practice and Theory in Public Key Cryptography (PKC 2009), Irvine, USA | J. Camenisch, M. Kohlweiss, and C. Soriente | 18.-20.03.2009 | ||||
"Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data", in Proc. of the 12th International Conference on Practice and Theory in Public Key Cryptography (PKC 2009), Irvine, USA | J. Camenisch, M. Kohlweiss, A. Rial, and C. Sheedy | 18.-20.03.2009 | ||||
"Cryptographic Protocols of the Identity Mixer Library, v. 1.0", in IBM Research Report RZ3730 | P. Bichsel, C. Binding, J. Camenisch, T. Groß, T. Heydt-Benjamin, D. Sommer, and G. Zaverucha | 19.03.2009 | ||||
"User-centric Identity Management as an indispensable tool for privacy protection", in: International Journal of Intellectual Property Management, Vol.2, No. 4, 2009, pp. 345 - 371 | R. Leenes | January 2009 | ||||
"User-controlled Identity Management: The Key to the future of Privacy?", in: International Journal of Intellectual Property Management, Vol.2, No. 4, 2009, pp. 325 - 244 | M. Hansen | January 2009 | ||||
"Data Retention and Anonymity Services - Introducing a New Class of Realistic Adversary Models", in P. Svenda (Editor), The Future of Identity in the Information Society - Challenges for Privacy and Security, 2009 |
S. Berthold, R. Böhme, and S. Köpsell | 2009 |
||||
"Rethinking accountable privacy supporting services", in Identity in the Information Society (IDIS), 2009 | J. Camenisch, T. Groß, and T. S. Scott-Heydt Benjamin | 2009 | ||||
"A Comparison of Privacy Issues in Collaborative Workspaces And Social Networks", in Identity in the Information Society (IDIS), 2009, special issue on Social Web and Identity | M. Pekarek, and S. Poetzsch | 2009 | ||||
"Privacy Preservation over Untrusted Mobile Networks", in Privacy in Location Based Applications, Springer, 2009 | C.A. Ardagna, S. Jajodia, P. Samarati, and A. Stavrou |
2009 | ||||
"Access Control in Location-Based Services", in Privacy in Location Based Applications, C. Bettini, S. Jajodia, P. Samarati, and S. Wang (Eds.), Springer, 2009 | C. A. Ardagna, M. Cremonini, S. De Capitani di Vimercati, and P. Samarati | 2009 | ||||
"Exploiting Cryptography for Privacy-Enhanced Access Control: A result of the PRIME Project", in: Journal of Computer Security (JCS), 2009 | C.A. Ardagna, J. Camenisch, M. Kohlweiss, R. Leenes, G. Neven, B. Priem, P. Samarati, D. Sommer, and M. Verdicchio | 2009 | ||||
"Net Privacy", in Computer and Information Security Handbook, Morgan Kaufmann, 2009 | C.A. Ardagna, C. Braghin, and M. Cremonini | 2009 | ||||
“Privacy-aware Biometrics: Design and Implementation of a Multimodal Verification System,” in Proc of the Annual Computer Security Applications Conference (ACSAC24), Anaheim, California, USA | S. Cimato, M. Gamassi, V. Piuri, R. Sassi, F. Scotti | 08.-12.12.2008 | ||||
"Rethinking accountable privacy supporting services", in: Proceedings of the 4th ACM workshop on digital identity management, Alexandria, Virginia, USA, 99. 1- 8 | J. Camenisch, T. Groß and T.S. Heydt-Benjamin | 31.10.2008 | ||||
"Efficient Attributes for anonymous credentials", in: Proc. of the 15th ACM Conference Conference on Computer and Communications Security (CCS 2008), Alexandria, Virginia, USA, pp. 345 - 356 | J. Camenisch and T. Groß | 27.-31.10.2008 | ||||
"Assessing Query Privileges via Safe and Efficient Permission Composition", in: Proc. of the 15th ACM Conference Conference on Computer and Communications Security (CCS 2008), Alexandria, Virginia, USA | S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati | 27.-31.10.2008 | ||||
“Preserving Confidentiality of Security Policies in Data Outsourcing” in Proc. of the Workshop on Privacy in the Electronic Society (WPES’08), Alexandria, Virginia, USA | S. De Capitani di Vimercati (UNIMI), S. Foresti (UNIMI), S. Jajodia, S. Paraboschi (UNIBG), G. Pelosi (UNIBG), and P. Samarati (UNIMI) | 27.10.2008 | ||||
“A Multi-Biometric Verification System for the Privacy Protection of Iris Templates,” in Proc. of the International Workshop on Computational Intelligence in Security for Information Systems (CISIS’08), Genoa, Italy | S. Cimato, M. Gamassi, V. Piuri, R. Sassi, F. Scotti | 23.-.24.10.2008 | ||||
"A Multi-Path Approach for k-Anonymity in Mobile Hybrid Networks" in Proc. of the International Workshop on Privacy in Location-Based Applications (PILBA 2008), Malaga, Spain | C.A. Ardagna, A. Stavrou, S. Jajodia, P. Samarati, and R. Martin | 09.10.2008 | ||||
"Image Processing for Fingerprint Biometrics via Low-cost Cameras and Webcams," in IEEE International Conference on Biometrics: Theory, Applications and Systems, Washington DC, USA | V. Piuri and F. Scotti | 29.09.-01.10.2008 | ||||
"Testing Privacy Awareness", in Proc. of the IFIP/FIDIS Internet Security and Privacy Summer School, Brno, Czech Republic, to appear 2009 | M. Bergmann | 01.-07.09.2008 | ||||
"Enhancing Multilateral Security in and by Reputation Systems", in Proc. of the IFIP/FIDIS Internet Security and Privacy Summer School, Brno, Czech Republic, 2008/09 |
S. Steinbrecher | 01.-07.09.2008 | ||||
"Privacy Awareness - A Means To Solve The Privacy Paradox?", in Proc. of the IFIP/FIDIS Internet Security and Privacy Summer School, Brno, Czech Republic, to appear 2009 | S. Poetzsch | 01.-07.09.2008 | ||||
"Multilateral Secure Cross-Community Reputation Systems for Internet Communities", Trust and Privacy in Digital Business, Fifth International Conference (TrustBus 2008), LNCS 5185, Springer Verlag Berlin, pp. 69 - 78 | F. Pingel and S. Steinbrecher | 25.08.2008 | ||||
“Regulating Exceptions in Healthcare using Policy Spaces”, in Proc. of the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, London, U.K. | C.A. Ardagna, S. De Capitani di Vimercati, T. Grandison, S. Jajodia, P. Samarati | 13.-16.7.2008 | ||||
"Identity Management throughout one's whole life", in Information Security Technical Report 13/2, 2008, pp. 83 - 94 | M. Hansen, A. Pfitzmann and S. Steinbrecher | 26.06.2008 | ||||
"Controlled Information Sharing in Collaborative Distributed Query Processing", in Proc. of the 28th International Conference on Distributed Computing Systems (ICDCS 2008), Beijing, China | S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati | 17.-20.6.2008 | ||||
"A Self-certified and Sybil-Free Framework for Secure Digital Identity Domain Buildup", in Proc. of the Second IFIP WG 11.2 International Workshop on Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks (WISTP 2008), Seville, Spain | C. Andersson, M. Kohlweiss, L. A. Martucci, and A. Panchenko | 13.-16.05.2008 | ||||
"Self-certified Sybil-free Pseudonyms", in Proc. of the First ACM Conference on Wireless Network Security (WISEC 2008), Alexandria, USA | L. A. Martucci, M. Kohlweiss, C. Andersson, and A. Panchenko | 31.03.-02.04.2008 | ||||
"P-signatures and Noninteractive Anonymous Credentials", in Proc. of the Fifth Theory of Cryptography Conference (TCC 2008), New York, USA | M. Belenkiy, M. Chase, M. Kohlweiss, and A. Lysyanskaya | 19.-21.03.2008 | ||||
"Location Privacy in Pervasive Computing", in Security and Privacy in Mobile and Wireless Networking, S. Gritzalis, T. Karygiannis, and C. Skianis (eds.), Troubador Publishing |
C. A. Ardagna, M. Cremonini, S. De Capitani di Vimercati, and P. Samarati |
2008 |
||||
"Managing Privacy in Location-based Access Control Systems,"in Mobile Intelligence: Mobile Computing and Computational Intelligence, John Wiley & Sons, Inc. |
C.A. Ardagna, M. Cremonini, S. De Capitani di Vimercati, and P. Samarati |
2008 |
||||
"Theory of Privacy and Anonymity," in Algorithms and Theory of Computation Handbook, second edition, M. Atallah and M. Blanton (eds), CRC Press |
V. Ciriani, S. De Capitani di Vimercati, S. Foresti, P. Samarati |
2008 |
||||
"A Privacy-Aware Access Control System" in Journal of Computer Security (JCS), vol. 16, n. 4, 2008, pp. 369-392 |
C.A. Ardagna, M. Cremonini, S. De Capitani di Vimercati, and P. Samarati |
2008 |
||||