Privacy and Identity Management. Time for a Revolution? 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers / [electronic resource] : edited by David Aspinall, Jan Camenisch, Marit Hansen, Simone Fischer-H�ubner, Charles Raab. - XII, 359 p. 78 illus. online resource. - IFIP Advances in Information and Communication Technology, 476 1868-4238 ; . - IFIP Advances in Information and Communication Technology, 476 .

Modelling the Relationship between Privacy and Security Perceptions and the Acceptance of Surveillance Practices -- The US Privacy Strategy -- Smart Society: Collaboration between Humans and Machines, Promises and Perils -- An Experience with a De-identifying Task to Inform about Privacy Issues -- A4CloudWorkshop: Accountability in the Cloud -- Signatures for Privacy, Trust and Accountability in the Cloud: Applications and Requirements -- Report on the Workshop on Assessing the Maturity of Privacy Enhancing Technologies -- Smart Technologies: Workshop on Challenges and Trends for Privacy in a Hyper-connected World -- Privacy Pattern Catalogue: A Tool for Integrating Privacy Principles of ISO/IEC 29100 into the Software Development Process -- Developing a Structured Metric to Measure Privacy Risk in Privacy Impact Assessments -- Accountability in the EU Data Protection Reform - Moving from Theory to Practice -- Towards Authenticity and Privacy Preserving Accountable Workflows -- A Technique for Enhanced Provision of Appropriate Access to Evidence across Service Provision Chains -- Evidence-Based Security and Privacy Assurance in Cloud Ecosystems -- Enhanced Assurance about Cloud Service Provision Promises -- ALOC: Attribute Level of Confidence for a User-Centric Attribute Assurance -- Identity Theft through e-Government Services: Government to Pay the Bill? -- "All Your Data Are Belong to Us ". European Perspectives on Privacy Issues in Free Online Machine Translation Services -- Identification of Online Gamblers in the EU: A Two-Edged Sword -- Can Courts Provide Effective Remedies against Violations of Fundamental Rights by Mass Surveillance? The Case of the United Kingdom -- Automated Log Audits for Privacy Compliance Validation: A Literature Survey -- Privacy-Preserving Access Control in Publicly Readable Storage Systems -- Ontology-Based Obfuscation and Anonymisation for Privacy - A Case Study on Healthcare.

This book contains a range of keynote papers and submitted papers presented at the 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, held in Edinburgh, UK, in August 2015. The 14 revised full papers included in this volume were carefully selected from a total of 43 submissions and were subject to a two-step review process. In addition, the volume contains 4 invited keynote papers. The papers cover a wide range of topics: cloud computing, privacy-enhancing technologies, accountability, measuring privacy and understanding risks, the future of privacy and data protection regulation, the US privacy perspective, privacy and security, the PRISMS Decision System, engineering privacy, cryptography, surveillance, identity management, the European General Data Protection Regulation framework, communicating privacy issues to the general population, smart technologies, technology users' privacy preferences, sensitive applications, collaboration between humans and machines, and privacy and ethics.

9783319417639

10.1007/978-3-319-41763-9 doi


Computer science.
Computer security.
Computers and civilization.
Management information systems.
Computer Science.
Systems and Data Security.
Management of Computing and Information Systems.
Computers and Society.

QA76.9.A25

005.8