Abstract is missing.
- A Problem-Based Approach for Computer-Aided Privacy Threat IdentificationKristian Beckers, Stephan Faßbender, Maritta Heisel, Rene Meis. 1-16 [doi]
- Conceptual Framework and Architecture for Privacy AuditKsenya Kveler, Kirsten Bock, Pietro Colombo, Tamar Domany, Elena Ferrari, Alan Hartman. 17-40 [doi]
- Privacy-Preserving Computation - (Position Paper)Florian Kerschbaum. 41-54 [doi]
- Designing Privacy-by-DesignJeroen van Rest, Daniel Boonstra, Maarten Everts, Martin van Rijn, Ron van Paassen. 55-72 [doi]
- Enhancing Privacy by Design from a Developer's PerspectiveChristoph Bier, Pascal Birnstill, Erik Krempel, Hauke Vagts, Jürgen Beyerer. 73-85 [doi]
- A Solution, But Not a Panacea for Defending Privacy: The Challenges, Criticism and Limitations of Privacy by DesignDemetrius Klitou. 86-110 [doi]
- Integrating Anonymous Credentials with eIDs for Privacy-Respecting Online AuthenticationRonny Bjones, Ioannis Krontiris, Pascal Paillier, Kai Rannenberg. 111-124 [doi]
- Federated Identity as CapabilitiesHarry Halpin, Blaine Cook. 125-139 [doi]
- Privacy Preserving Course Evaluations in Greek Higher Education Institutes: An e-Participation Case Study with the Empowerment of Attribute Based CredentialsVasiliki Liagkou, George Metakides, Apostolos Pyrgelis, Christoforos Raptopoulos, Paul G. Spirakis, Yannis C. Stamatiou. 140-156 [doi]
- Collection and Storage of Personal Data: A Critical View on Current Practices in the Transportation SectorEleni Kosta, Hans Graux, Jos Dumortier. 157-176 [doi]
- ICT and Privacy: BarriersAntonio Kung. 177-186 [doi]
- A Method for Analysing Traceability between Privacy Policies and Privacy Controls of Online Social NetworksPauline Anthonysamy, Phil Greenwood, Awais Rashid. 187-202 [doi]
- Electronic Footprints in the Sand: Technologies for Assisting Domestic Violence SurvivorsMartin Emms, Budi Arief, Aad P. A. van Moorsel. 203-214 [doi]