Abstract is missing.
- An Introduction to Privacy-Enhancing Identity ManagementJan Camenisch, Ronald Leenes, Marit Hansen, Jan Schallaböck. 3-21 [doi]
- Overview and Introduction Part IIRonald Leenes. 27-31 [doi]
- The Identity LandscapeBart Priem, Ronald Leenes, Eleni Kosta, Aleksandra Kuczerawy. 33-51 [doi]
- The Need for Privacy-Enhancing Identity ManagementBart Priem, Ronald Leenes, Alea M. Fairchild, Eleni Kosta. 53-71 [doi]
- Regulating Identity ManagementEleni Kosta, Aleksandra Kuczerawy, Ronald Leenes, Jos Dumortier. 73-89 [doi]
- User-Centric Privacy-Enhancing Identity ManagementBart Priem, Eleni Kosta, Aleksandra Kuczerawy, Jos Dumortier, Ronald Leenes. 91-106 [doi]
- Privacy-Enhancing Identity Management in BusinessAlea M. Fairchild, Pieter M. A. Ribbers. 107-129 [doi]
- Introduction: Privacy, Trust, and Identity ManagementStephen Crane, Siani Pearson, Dieter Sommer. 141-149 [doi]
- ArchitectureDieter Sommer. 151-288 [doi]
- Pseudonyms and Private CredentialsJan Camenisch, Markulf Kohlweiss, Dieter Sommer. 289-308 [doi]
- Privacy Models and Languages: Access Control and Data Handling PoliciesClaudio Agostino Ardagna, Sabrina De Capitani di Vimercati, Pierangela Samarati. 309-329 [doi]
- Privacy Models and Languages: Obligation PoliciesMarco Casassa Mont. 331-361 [doi]
- Privacy Models and Languages: Assurance Checking PoliciesSiani Pearson. 363-375 [doi]
- Privacy-Aware Access Control System: Evaluation and DecisionClaudio Agostino Ardagna, Sabrina De Capitani di Vimercati, Eros Pedrini, Pierangela Samarati. 377-395 [doi]
- Privacy-Aware Identity Lifecycle ManagementMarco Casassa Mont. 397-426 [doi]
- Privacy Assurance CheckingSiani Pearson, Tariq Ehsan Elahi. 427-456 [doi]
- Security/Trustworthiness Assessment of PlatformsStephen Crane, Siani Pearson. 457-483 [doi]
- Further Privacy MechanismsAnas Abou El Kalam, Carlos Aguilar Melchor, Stefan Berthold, Jan Camenisch, Sebastian Clauß, Yves Deswarte, Markulf Kohlweiss, Andriy Panchenko, Lexi Pimenidis, Matthieu Roy. 485-555 [doi]
- Reputation Management as an Extension of Future Identity ManagementSandra Steinbrecher, Franziska Pingel, Andreas Juschka. 557-568 [doi]
- Human-Computer InteractionSimone Fischer-Hübner, John Sören Pettersson, Mike Bergmann, Marit Hansen, Siani Pearson, Marco Casassa Mont. 569-595 [doi]
- Technology AssuranceTobias Scherner, Lothar Fritsch. 597-607 [doi]
- Requirements for Identity Management from the Perspective of Multilateral InteractionsStefanie Pötzsch, Katrin Borcea-Pfitzmann, Marit Hansen, Katja Liesebach, Andreas Pfitzmann, Sandra Steinbrecher. 609-626 [doi]
- IntroductionPete Bramhall. 653-656 [doi]
- Collaborative E-LearningKatja Liesebach, Elke Franz, Anne-Katrin Stange, Andreas Juschka, Katrin Borcea-Pfitzmann, Alexander Böttcher, Hagen Wahrig. 657-677 [doi]
- Location-Based ServicesJan Zibuschka, Kai Rannenberg, Tobias Kölsch. 679-695 [doi]
- e-HealthAlberto Sanna, Riccardo Serafin, Nicola Maganetti. 697-720 [doi]
- Airport Security Controls - Prototype SummaryIoannis Vakalis. 721-734 [doi]
- Privacy and Identity Management Requirements: An Application Prototype PerspectiveTobias Kölsch, Jan Zibuschka, Kai Rannenberg. 735-749 [doi]
- Conclusion and OutlookJan Camenisch, Andreas Pfitzmann. 759-764 [doi]